QuickLens Chrome Extension Steals Crypto Wallets in ClickFix Campaign


The QuickLens Chrome extension delivered malware to thousands of users starting February 17, 2026. It used ClickFix attacks and stole cryptocurrency from browsers. Google removed it from the Chrome Web Store after security reports.

QuickLens started as a legitimate tool for Google Lens searches in browsers. It reached about 7,000 users and earned a featured badge. Attackers bought it on ExtensionHub, changed ownership to LLC Quick Lens, and pushed version 5.8 with malicious code.

The update added broad permissions like webRequest and declarativeNetRequest. It stripped security headers such as Content-Security-Policy from all sites. This let scripts run everywhere. The extension phoned home to api.extensionanalyticspro.top every five minutes with device fingerprints and UUIDs.

Users saw fake Google Update popups on every page. These led to ClickFix tricks urging clipboard code runs. On Windows, it dropped googleupdate.exe signed by Hubei Da’e Zhidao Food Technology. That file ran hidden PowerShell to fetch more payloads from drivers.solutions.

Array of malicious JavaScript payloads

Attack Mechanics

The extension executed payloads via a 1×1 GIF onload trick. CSP removal ensured success on strict sites. Command servers delivered scripts for different goals.

Payload TypeTargetOutcome
Fake UpdateAll pagesClickFix prompting code execution
Crypto StealerMetaMask, Phantom, Coinbase, Trust, othersSeed phrases and activity exfiltrated
Credential GrabberLogin formsPasswords, payments captured
Data ScraperGmail, Facebook Business, YouTubeInbox, ad accounts, channel info stolen
Windows Droppergoogleupdate.exePowerShell chaining to second stage

Annex Security first flagged the compromise. They noted the new privacy policy on a sketchy domain. User reports on Reddit and Brave forums described nonstop alerts blocking site use.

BleepingComputer confirmed the C2 callbacks and payload arrays. macOS claims mentioned AMOS infostealer, but details stay unverified. Chrome now flags and disables QuickLens automatically.

Fake Google Update alert leading to a ClickFix attack Source: Reddit [12]

User Impact and Cleanup

Attackers hit crypto users hard. They targeted 11 wallet types including Solflare and Brave Wallet. Stolen seeds allowed full asset drains. Form scraping grabbed logins too.

  • Remove QuickLens fully from chrome://extensions.
  • Run antivirus scans on all devices.
  • Reset browser passwords and check for changes.
  • Move crypto to new wallets immediately.
  • Watch accounts for odd logins or transfers.
QuickLens disabled and flagged as malware by Chrome

This follows other extension attacks like fake ad-blockers crashing browsers for malware. Developers must vet sales. Users should avoid unknown extension updates.

FAQ

Extension ID for QuickLens?

kdenlnncndfnhkognokgfpabgkgehoddto – check and remove via chrome://extensions.

Targeted wallets?

MetaMask, Phantom, Coinbase, Trust, Solflare, Backpack, Brave, Exodus, Binance Chain, WalletConnect, Argon.

C2 domains?

api.extensionanalyticspro.top for payloads; google-update.icu for updates.

Windows payload details?

Signed googleupdate.exe runs PowerShell to drivers.solutions/META-INF/xuoa.sys with Katzilla UA.

Related attacks?

CrashFix variants and fake ad-blockers using similar browser crashes.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages