MITRE ATT&CK / T1176.001
T1176.001
Browser Extensions
Description
Adversaries may abuse internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality to and customize aspects of internet browsers. They can be installed directly via a local file or custom URL or through a browser's app store - an official online platform where users can browse, install, and manage extensions for a specific web browser. Extensions generally inherit the web browser's permissions previously granted.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) Malicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores, so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary-controlled server or manipulate the mobile configuration file to silently install additional extensions.Adversaries may abuse how chromium-based browsers load extensions by modifying or replacing the Preferences and/or Secure Preferences files to silently install malicious extensions. When the browser is not running, adversaries can alter these files, ensuring the extension is loaded, grant…
Platforms
Mitigations
- M1033 — Limit Software Installation
- M1047 — Audit
- M1051 — Update Software
- M1017 — User Training
- M1038 — Execution Prevention
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures
- Google Chrome Downloads 4GB Gemini Nano AI to Your Device Without Asking
- ClaudeBleed: Flaw in Anthropic's Claude Chrome Extension Lets Any Plugin Hijack Your AI
- ClaudeBleed: Claude Chrome Extension Flaw Lets Attackers Steal Gmail and GitHub Data
- Vidar Stealer Detection 2026: YARA Rules, C2 Signatures, and Post-Compromise Credential Checklist
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →