The MelotellJS library transforms browser extensions into a distributed web scraping network, creating an unwitting botnet.
Monetization methods have evolved from just tracking clickstreams to paying developers for using users' unused bandwidth.
MelotellJS is open source (GPL licensed), which can give a false sense of security and trust to developers.
Integrating Melotell requires dangerous permissions (declarative net request and access to all URLs), allowing code to run on every site a user visits.
Most users are not made aware or asked for meaningful consent before their bandwidth and browser are used in the botnet.
Library installation can be hidden by auto-updates and no user-opt-in, depending on developer implementation.
Melotell works by injecting hidden iframes on every page a user visits, loading various target websites for scraping.
This technique leverages user browsers to distribute compute and bandwidth load, and—critically—IP addresses, which bypasses typical server-farm blocks.
Web security headers (like content security policy and x-frame options) are actively removed in real-time, exposing users to attacks like cross-site scripting.
Extensions with Melotell can act as man-in-the-middle agents, intercepting and modifying web requests and responses.
Such manipulation allows bot operators to bypass site restrictions and access content not otherwise available from data centers.
Arbitrary web requests through users' logged-in browsers could have serious security repercussions, such as posting to banking endpoints with user cookies.
Malicious actors can exploit these proxies for attacks while appearing as normal user traffic, evading detection.
Melotell claims to avoid sending cookies in iframes, but the safeguards are fragile and easily circumvented.
Browser extensions become new, difficult-to-detect points for attackers to obscure the origins of their internet traffic.
Melotell integration was proposed but ultimately rejected by popular extension platform Plasmo after concerns were raised.
Nonetheless, Melotell was included in several extensions (some only temporarily), with traces found in Chrome, Edge, and Firefox; removal by browser vendors remains limited.
As of reporting: 129 Edge and 71 Firefox extensions identified, with over 1 million users potentially affected.
Google has started removing some extensions, but many remain active, underscoring the inadequacy of current safeguards.