Malicious TikTok Downloader Extensions Expose 130,000 Users to Spyware in Stealthy StealTok Malware Campaign

StealTok: Malicious TikTok Video Downloader Extensions Compromise Over 130,000 Users

A sophisticated malware campaign, dubbed StealTok, has been uncovered, involving at least 12 browser extensions that masquerade as TikTok video downloaders. These malicious extensions have infiltrated the systems of over 130,000 users worldwide, with approximately 12,500 installations still active across Google Chrome and Microsoft Edge marketplaces.

Deceptive Tactics and Widespread Impact

The perpetrators behind StealTok employ a highly organized strategy by releasing multiple clones or slightly rebranded versions of the same core extension. This approach ensures the campaign’s resilience; when one extension is identified and removed, a new clone promptly replaces it. To gain user trust, these extensions initially function as advertised, allowing users to download TikTok videos without watermarks. Many even earned a Featured badge in official extension stores, significantly reducing user suspicion and boosting download numbers.

Delayed Malicious Activation

A particularly insidious aspect of this campaign is its use of delayed capability injection. For the first 6 to 12 months, the extensions behave legitimately, building a solid reputation and passing initial security reviews. Once enough time has passed, the extensions connect to external command-and-control servers to download dynamic remote configurations. This hidden mechanism allows the attackers to fundamentally alter the extension’s behavior, transforming a harmless video downloader into a powerful spyware tool without alerting the user or the marketplace.

Comprehensive User Surveillance

After activation, the extensions begin quietly gathering extensive telemetry on the user. They monitor usage patterns, track downloaded content, and collect high-entropy data, such as time zone, language settings, and even device battery status. By combining these specific data points, the attackers can create a highly accurate fingerprint of the user’s device, enabling them to track the user across different web sessions and services. To conceal this data theft, the extensions send the information to deceptive domains with misspelled names, like trafficreqort.com, to avoid casual detection.

Implications for Browser Security

This campaign highlights a critical weakness in current browser security: relying solely on installation-time validation is no longer sufficient. Because these extensions use remote configurations to evolve, the real risk emerges long after the initial download. Security experts recommend that organizations adopt continuous, behavior-based monitoring to detect suspicious network activity, hidden data collection, and unexpected permission usage in real-time.

Active and Removed Threats

LayerX security researchers identified several specific extensions involved in the StealTok campaign. On Google Chrome, active threats include TikTok Downloader – Save Videos, No Watermark with 3,000 installs, TikTok Video Downloader – Bulk Save with 1,000 installs, and Tiktok Downloader with 353 installs. On Microsoft Edge, active malicious extensions include Mass Tiktok Video Downloader with 77 installs and another version named TikTok Downloader – Save Videos, No Watermark with 47 installs.

Several highly popular versions of this malware have already been removed from Google Chrome, including TikTok Video Keeper, which had reached 60,000 installs, and Video Downloader for Tiktok, which had 20,000 installs. If you have any of these extensions installed, security experts advise removing them immediately and changing passwords for sensitive accounts.