New Malware Tool ‘Stanley’ Hijacks Browsers, Masquerades as Legitimate Extension on Chrome Web Store

Stanley Malware Toolkit: A New Threat Hijacking Browsers with Stealth

In January 2026, cybersecurity researchers uncovered a sophisticated malware-as-a-service (MaaS) toolkit named Stanley, which poses a significant threat to internet users worldwide. This malicious software is designed to deceive users by displaying counterfeit websites while the browser’s address bar continues to show the legitimate URL, thereby facilitating the theft of sensitive information such as login credentials and financial data.

Emergence and Distribution

Stanley first surfaced on January 12, 2026, within Russian-language cybercrime forums, marketed by an individual using the alias Стэнли. The toolkit is offered at prices ranging from $2,000 to $6,000, with higher-tier packages promising guaranteed publication on the Chrome Web Store. This assurance implies that the malicious extension could be downloaded directly from Google’s official platform, significantly increasing its potential reach and impact.

To enhance its disguise, Stanley masquerades as Notely, a seemingly innocuous notes and bookmarks application. This facade allows it to perform website spoofing attacks without raising immediate suspicion among users.

Technical Capabilities and Control Mechanisms

Security analysts from Varonis have conducted in-depth examinations of Stanley’s functionalities and methods of distribution. The toolkit operates through a web-based control panel, enabling attackers to select specific victims and configure rules for website hijacking. The process involves setting a source URL (the legitimate site to be hijacked) and a target URL (the attacker’s phishing page).

Once these parameters are established, the extension intercepts user visits to the legitimate website, overlaying a full-screen iframe that contains the fraudulent version. Throughout this process, the browser’s address bar continues to display the authentic domain, effectively concealing the attack from the user’s perspective.

Infection Process and Victim Control

Stanley’s infection strategy relies heavily on browser extension permissions that grant extensive control over a user’s browsing activities. Upon installation, the malicious code executes at the earliest possible stage during page loading, preceding the appearance of any legitimate content.

The extension utilizes the victim’s IP address as a unique identifier, allowing attackers to target individuals specifically and correlate user activities across multiple browsers and devices. Every ten seconds, Stanley communicates with the attacker’s command and control server to receive updated instructions for hijacking.

To maintain operational control even if authorities dismantle the primary server, Stanley employs a backup domain rotation mechanism. This feature enables the extension to cycle through alternative domains, ensuring the malware’s persistence and functionality.

Scope of Compromise and Recommendations

The Stanley toolkit has already compromised thousands of users. The command and control panel associated with the malware displays victim IP addresses, online statuses, and timestamps of last activities, indicating a widespread and active threat.

To mitigate the risks posed by such sophisticated browser-based attacks, enterprises are advised to implement strict extension allowlisting policies. This approach involves permitting only pre-approved extensions to be installed within organizational systems, thereby reducing the likelihood of malicious software infiltration.

Individual users should exercise caution by minimizing the number of installed browser extensions and thoroughly reviewing permission requests before installation. Given that browser extension marketplaces often approve extensions upon initial submission and allow subsequent updates without rigorous review, there exists a vulnerability where malicious updates can be introduced post-approval.

Conclusion

The discovery of the Stanley malware toolkit underscores the evolving and increasingly sophisticated nature of cyber threats targeting internet users. By exploiting browser vulnerabilities and employing deceptive tactics, such malware can effectively compromise sensitive information without immediate detection. Vigilance, combined with proactive security measures, remains crucial in defending against such insidious attacks.