Malicious browser extensions can exploit the monolithic and shared namespace design of browsers to steal sensitive user information. They use standard extension APIs and encrypted communications to update other extensions and access browser plugins and vulnerabilities. The browser architecture does not sufficiently restrict extensions' control over browser components or compartmentalize components with customized access policies.