Urban VPN Proxy caught stealing AI conversations from 8 million Chrome and Edge users

Reviewed byNidhi Govil

4 Sources

Share

A Google Chrome Featured extension is harvesting AI chatbot conversations from millions of users without their knowledge. Security researchers at Koi discovered that Urban VPN Proxy and three related browser extensions are secretly collecting user prompts and responses from ChatGPT, Claude, Gemini, and seven other AI platforms, then selling the data to third-party brokers despite Chrome Web Store policies prohibiting such practices.

News article

Browser Extensions Turn Privacy Tools Into Surveillance Systems

Urban VPN Proxy, a Google Chrome extension with over 6 million installations and a Chrome Featured badge, has been caught secretly collecting AI chatbot conversations from users and selling the data to third parties. Security researchers at Koi Security uncovered that the extension, along with three related tools—1ClickVPN Proxy, Urban Browser Guard, and Urban Ad Blocker—are harvesting AI conversations from more than 8 million people across Chrome and Microsoft Edge Add-ons platforms

1

. The discovery reveals a troubling privacy breach affecting users who believed they were protecting themselves with VPN and ad-blocking tools.

The data harvesting targets 10 major AI platforms, including ChatGPT, Claude, Gemini, Microsoft Copilot, Perplexity, DeepSeek, Grok, and Meta AI

1

2

. According to Idan Dardikman, co-founder and CTO of Koi, each platform has a dedicated "executor" script designed to intercept and capture conversations. The data collection practices occur whether users are connected to the VPN or not, and there is no user-facing toggle to disable the feature—the only way to stop it is complete uninstallation

1

.

How Script Injection Enables Data Harvesting

The mechanism behind this data harvesting involves aggressive technical methods that override fundamental browser security. Urban VPN Proxy monitors users' browser tabs continuously, and when someone visits one of the targeted AI platforms like chatgpt.com, it injects the executor script into the page

1

. Once injected, the script overrides fetch() and XMLHttpRequest—the fundamental browser APIs that handle all network requests. "This is an aggressive technique," Dardikman explained. "The script wraps the original functions so that every network request and response on that page passes through the extension's code first"

1

.

The intercepted data includes user prompts and responses, conversation identifiers, timestamps, session metadata, and information about which AI platform and model was used

3

. After parsing the API responses, the script packages and transmits the data via window.postMessage to the extension's content script, tagged with the identifier PANELOS_MESSAGE. The content script then passes this information to a background service worker for exfiltration over the network to endpoints at analytics.urban-vpn.com and stats.urban-vpn.com

1

.

Silent Update Introduced Malicious Code in July 2025

The malicious AI harvesting code wasn't always present in these browser extensions. Koi's investigation found that the script was added via an update on July 9, 2025, with version 5.5.0

3

4

. This timing is significant because anyone who installed Urban VPN prior to July 2025 would never have seen the consent prompt that was added with this version

1

. With Google Chrome and Microsoft Edge extensions updating automatically without notification of new permissions, most users remained unaware of this silent infiltration

2

.

Archived pages from the Wayback Machine show that Urban VPN Proxy had received its Chrome Featured badge before the data-collection scripts were rolled out in July, suggesting the malicious code was added after Google's initial review

4

. This raises serious questions about post-approval monitoring of Featured extensions in the Google Chrome Web Store.

Privacy Policy Contradictions and BiScience Connection

While Urban VPN does disclose AI data collection in its privacy policy, the transparency is questionable at best. The company states it "may collect your web browsing data" and that AI prompts and outputs are disclosed "for marketing analytics purposes"

2

. However, Dardikman points out significant discrepancies: "The consent prompt frames AI monitoring as protective. The privacy policy reveals the data is sold for marketing"

1

.

The collected user data is shared with BiScience (B.I Science (2009) Ltd.), an affiliated company that Urban VPN describes as providing marketing and data insights

2

. BiScience uses the raw data to create insights "which are commercially used and shared with Business Partners"

2

. This directly contradicts the Chrome Web Store listing, which indicates that data is not being sold to third parties outside approved use cases

1

. The Chrome Web Store policies explicitly prohibit transferring or selling user data to third-party data brokers like BiScience

1

.

Featured Badge Raises Questions About Google's Review Process

The fact that Urban VPN Proxy received a Featured Badge from the Chrome Web Store team adds another troubling dimension to this privacy breach. "This means a human at Google reviewed Urban VPN Proxy and concluded it met their standards," Dardikman noted. "Either the review didn't examine the code that harvests conversations from Google's own AI product (Gemini), or it did and didn't consider this a problem"

1

. The issue appears to stem from a loophole in Google's Chrome Web Store Limited Use policy, which allows data transfer to third parties for limited scenarios like security purposes—exceptions that bad actors falsely claim to sell user data

1

.

Security researcher Wladimir Palant suggested that BiScience and its affiliated partners implement user-facing features that allegedly require access to browsing history to claim the "necessary to providing or improving your single purpose" exception. Alternatively, they claim the security exception by implementing safe browsing or ad-blocking features

1

. This isn't Koi's first discovery of a rogue Featured extension—in August 2025, the firm revealed FreeVPN had secretly started collecting screenshots of browsing sessions

4

.

Immediate Action Required for Affected Users

The total impact spans across four extensions with combined installations exceeding 8 million users. Urban VPN Proxy alone accounts for 6 million Chrome users and 1.3 million Microsoft Edge users, while 1ClickVPN Proxy has approximately 636,000 users, Urban Browser Guard has 52,000 users, and Urban Ad Blocker has 16,000 users

4

. Sam Soares, Chief Revenue Officer at CultureAI, emphasized the broader lesson: "The Urban VPN story is a classic example of what happens when people put blind trust in 'free' tools. If you don't know how a tool makes money, assume it's monetising your data"

2

.

Security researchers strongly recommend immediate uninstallation of all four extensions. The invasive nature of their design means removal is the only effective protection method

2

. Users concerned about their data being sold can consider data removal services like Incogni, which contact data brokers and submit deletion requests on behalf of users

2

. This incident serves as a critical reminder to scrutinize what information gets shared with AI tools and to thoroughly investigate browser extensions before installation, including reading privacy policies and checking for consent discrepancies.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo