BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Data Breach Roundup: Fake ChatGPT Extension Spies on Users, North Korean GitHub Campaign, AI Firm Mercor Confirms 4TB Breach

Data Breach Roundup: Fake ChatGPT Extension Spies on Users, North Korean GitHub Campaign, AI Firm Mercor Confirms 4TB Breach

highData Breaches & Incidents|April 4, 20262 min read

Originally reported by Hackread

#browser-extensions#north-korea#supply-chain-attacks#ai-security#data-theft#espionage#github-abuse
Share

TL;DR

Security researchers have identified three significant threats this week: a fake ChatGPT ad blocker extension stealing user conversations, North Korean hackers using GitHub to target South Korean companies, and AI firm Mercor confirming a breach linked to a LiteLLM supply chain attack with 4TB of data allegedly stolen.

Why high?

Multiple active campaigns with confirmed data theft, including a North Korean state-sponsored operation and a supply chain attack affecting an AI firm with 4TB of stolen data.

Fake ChatGPT Ad Blocker Extension Harvests User Conversations

Security researchers have discovered a malicious Chrome browser extension masquerading as 'ChatGPT Ad Blocker' that was covertly harvesting ChatGPT conversations from unsuspecting users. The fraudulent extension promised an ad-free ChatGPT experience while secretly exfiltrating sensitive user data in the background.

The extension represents a growing trend of threat actors exploiting the popularity of AI tools to distribute malware and steal user data. Browser extensions remain a particularly effective attack vector due to their privileged access to web content and user interactions.

Users should verify extension authenticity through official channels and review permission requests carefully before installation.

North Korean Threat Actors Weaponize GitHub for Corporate Espionage

FortiGuard Labs researchers have uncovered a sophisticated espionage campaign targeting South Korean companies, with North Korean threat actors abusing GitHub's infrastructure for command and control operations. The campaign demonstrates the advanced persistent threat capabilities of state-sponsored groups in leveraging legitimate platforms to evade detection.

The use of GitHub for malicious purposes highlights the challenge security teams face when threat actors abuse trusted development platforms. Organizations should implement enhanced monitoring for unusual GitHub activity and consider implementing additional controls around code repository access.

AI Firm Mercor Confirms Breach Following Supply Chain Attack

AI company Mercor has confirmed a security breach linked to a LiteLLM supply chain attack, with threat actors claiming to have exfiltrated 4TB of sensitive data and gained access to internal systems. The incident underscores the growing risks facing AI companies and the critical importance of securing software supply chains.

Supply chain attacks targeting AI infrastructure represent an emerging threat vector as organizations increasingly rely on third-party AI libraries and frameworks. The breach demonstrates how vulnerabilities in upstream dependencies can cascade into significant data exposure incidents.

Organizations utilizing AI tools should conduct thorough security assessments of their supply chain dependencies and implement monitoring for suspicious activity in AI-related services.

Sources

  • https://hackread.com/fake-chatgpt-ad-blocker-chrome-extension-spy-users/
  • https://hackread.com/north-korean-hackers-github-spy-south-korean-firms/
  • https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/

Originally reported by Hackread

Tags

#browser-extensions#north-korea#supply-chain-attacks#ai-security#data-theft#espionage#github-abuse

Related Intelligence

  • Data Breach Roundup: AI Service Secrets Surge 81% on GitHub, Steam Games Hide Wallet Drainers, AWS Bedrock Leak Risk

    highMar 17, 2026
  • Nation-State Roundup: EU Commission Breach Exposes 30 Entities, North Korea Drains $285M from Crypto Exchange

    criticalApr 4, 2026
  • Data Breach Roundup: ShinyHunters Targets Cisco, New Yurei Ransomware Emerges, Storm Infostealer Goes Commercial

    highApr 3, 2026

Related Knowledge

  • DFIR & Threat Hunting Deep Training — NERF Knowledge Base

    dfir
  • Digital Forensics Artifacts — Deep Dive Reference

    dfir
  • NERF Incident Response Playbooks — Operational Reference

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Meta Suspends Mercor Partnership Following Data Breach Threatening AI Training Secrets

Next Article

AI-Powered prt-scan Campaign Exploits GitHub Supply Chain via pull_request_target→