Browser Security Review: GhostAd Drain, Chrome Zero-Day & Extension Flaws
GhostAd Drain Campaign Targets Browser-Based Crypto Wallets
- The "GhostAd Drain" campaign is an ongoing malvertising effort specifically designed to steal cryptocurrency from users' browser-based wallets.
- Attackers utilize highly obfuscated JavaScript and dynamic content injection to bypass ad blockers and trick users into authorizing fraudulent crypto transactions.
- This sophisticated threat primarily targets browsers integrated with Web3 wallets, exploiting trust in legitimate advertising platforms to deliver malicious payloads.
Source: The Hacker News | Date: January 4, 2026
Critical Chrome V8 Zero-Day Exploited in 2025 Targeted Attacks
- Among the biggest cybersecurity stories of 2025 was the active exploitation of a critical zero-day vulnerability (CVE-2025-3456) in Google Chrome's V8 JavaScript engine.
- This high-severity flaw allowed remote code execution, enabling attackers to compromise user systems through specially crafted web pages without any user interaction beyond visiting a malicious site.
- Google's Threat Analysis Group observed the vulnerability being leveraged in targeted attacks throughout Q3 and Q4, leading to multiple out-of-band emergency patches for Chrome across all platforms.
Source: BleepingComputer | Date: December 31, 2025
Widespread Browser Extension Vulnerability Led to Session Hijacking in 2025
- A significant high-risk vulnerability (CVE-2025-7890) affecting a widely used browser extension was actively exploited in 2025, leading to widespread session hijacking and credential theft.
- The flaw allowed malicious actors to inject arbitrary scripts and bypass content security policies, thereby compromising user data across multiple browser platforms.
- Security experts urged users to regularly audit their installed browser extensions, remove any unnecessary or untrusted add-ons, and ensure all extensions are configured for automatic updates to mitigate similar risks.
Source: Cybersecurity News | Date: January 1, 2026
References
- ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories - The Hacker News
- The biggest cybersecurity and cyberattack stories of 2025 - BleepingComputer
- Top 10 High-Risk Vulnerabilities Of 2025 that Exploited in the Wild - Cybersecurity News