Supply ChainPublished Mar 3, 2026

Chrome extension auto-updates from a now-abandoned publisher account

HighAARM tierConfirmed
Seen34times across7customers
jiffy-ti-2026-000098

Summary

Extension was acquired by a new maintainer who pushed a malicious update through the Chrome Web Store auto-update channel. Users who installed under the original trusted publisher received the compromised version silently.

Severity & confidence

Severity
High

High

Credible abuse path with meaningful impact on confidentiality, integrity, or availability. Remediate on a short timeline; do not wait for the next sprint cycle.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?i)update_url\s*:\s*"?[^"]+chrome\.google\.com

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000098
{
    meta:
        source = "jiffy-intel"
        severity = "high"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $content_pattern_0 = "(?i)update_url\\s*:\\s*\"?[^\"]+chrome\\.google\\.com"
    condition:
        $content_pattern_0
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Chrome / Chromium*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • ReadLater PlusExtension
    Removed
    Source
    Chrome Web Store
    First observed
    Feb 15, 2026
    Last observed
    Mar 8, 2026

    Original maintainer sold account; buyer pushed malicious update.

  • Page Translate ProExtension
    Still live
    Source
    Chrome Web Store
    First observed
    Feb 19, 2026

    Maintainer change flagged; awaiting Google response.

How to remediate

  1. 01Pin trusted extension versions via enterprise policy.
  2. 02Review extension update logs via `chrome://extensions` and enterprise MDM.

Timeline & sources

Timeline

  1. First observedFeb 15, 20262 months ago
  2. Last updatedApr 16, 20261 day ago
  3. PublishedMar 3, 20261 month ago

Sources

curated

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan