If you are not redirected, click here.

Disclosed by SquareX, polymorphic extensions can mimic any other browser extension, perfectly replicating their icons and popup interfaces. Victims, believing they are interacting with the real extension, are tricked into entering their password manager or crypto wallet credentials. With additional permissions, these malicious extensions can even disable the legitimate one entirely.


Join our technical webinar for exclusive live demos on how polymorphic extensions work and the relevant mitigation strategies. There will also be a live Q&A session to clarify any doubts.

Webinar starts in:

days
hours
minutes
seconds
00
00
00
00
days
hours
minutes
seconds

What’s Covered

Overview of the browser security landscape

  • Introducing Browser Detection and Response (BDR)
  • The importance of threat research

Introduction to browser extensions

  • Evolution of browsers & browser extensions
  • Extensions architecture & data exposure

Deep dive into Polymorphic Extensions

  • Step-by-step demonstration
  • Mitigation using Browser Detection and Response
  • The research process behind Polymorphic Extensions
  • Working with browser vendors

Q&A 

Speakers

John Carse

Field CISO, SquareX

John Carse is Field CISO at SquareX, bringing over two decades of cybersecurity expertise to the role. His journey in cybersecurity began in 2003 while working with the US Navy, leading to extensive experience across Japan, Bahrain, Hawaii and Singapore. Prior to joining SquareX, John held executive security roles at major organizations including Dyson, Rakuten, Expedia Group, and JPMorgan.


At SquareX, John combines his deep technical knowledge and business experience to help enterprises understand and defend against browser-based attacks. A seasoned technologist with multiple cloud security patents, he holds an MBA in Entrepreneurship from IE Business School and a Bachelor's in Computer and Information Science from the University of Maryland Global Campus.

Given that polymorphic extensions operate fully in the browser and cannot be identified by permissions or involved sites, it can only be tackled with a browser-native solution that understands the runtime behaviour of each extension. 
Request a demo and see how SquareX's Browser Detection and Response (BDR) solution stops malicious extensions and other client-side threats.

Copyright © 2025. All rights reserved.