More than 30 malicious extensions have been found in the Chrome Web Store potentially affecting millions of users

Web browsers have become an essential tool for work, communication, and entertainment in the digital age. However, with the increasing use of technology, cybercriminals have also developed new ways to exploit vulnerabilities and infiltrate users’ devices. Recently, security researchers identified malicious extensions in the Chrome Web Store, potentially affecting millions of users. In this article, we will explore the details of the attack and what you can do to protect yourself.

Extensions are small software programs that can modify and enhance the functionality of a web browser. They can add new features, block ads, or improve security. However, not all extensions are safe and some may contain malicious code that can harm users’ devices. Google’s Chrome Web Store is a popular platform for distributing extensions to millions of users.

More than 30 malicious extensions have been identified in the Chrome Web Store

Recently, security researchers discovered more than 30 malicious extensions in the Chrome web store. These extensions had made their way into the store by disguising themselves as legitimate tools. Once installed, they could modify users’ browsing experience, display unwanted ads, and hijack search results. What’s more, these extensions could collect users’ sensitive information and send it to third-party servers. If left unchecked, these extensions could compromise users’ privacy and security.

The installed base of identified extensions is around 87 million users

The identified extensions had an install base of roughly 87 million users, according to cybersecurity firm Avast, which discovered the malicious extensions. Most of the identified extensions had more than one million downloads each. This indicates that a significant number of users could have potentially been affected by the attack.

Suspiciously low number of reviews compared to installs

One of the red flags identified was the suspiciously low number of reviews compared to installations. According to Avast, the number of reviews these extensions had in the Chrome Web Store was significantly lower than the number of installations. This suggests that users did not leave reviews after installing the extensions, which could be due to the fact that the extensions were hiding their true purpose.

A large number of extensions have been found to contain obfuscated code

Another concerning aspect of the attack was the large number of extensions that contained obfuscated code. Obfuscation is a technique used to make the code harder to read and understand, which can make it difficult for security researchers to detect and analyze malicious behavior. According to Avast, apart from the 32 extensions that it identified, 50 more extensions were removed from the Chrome web store on the same grounds.

The purpose of the malicious code was related to displaying unwanted ads and hijacking search results

The purpose of the malicious code appears to be related to displaying unwanted ads and hijacking search results to display sponsored links. These extensions can modify the content of web pages and inject additional ads or links without users’ consent, which could lead to a poor user experience and potentially expose users to more dangerous content.

Researchers have yet to analyze the full scope of the attack

While the security researchers have undoubtedly identified a significant number of malicious extensions, there could be more lurking in the Chrome web store. According to reports, the attackers behind the extensions used a complex and multi-step approach to hide their activities and evade detection. Thus, it will take more time and effort to understand the full scope of the attack and its potential impact on users.

Google has removed all the malicious extensions from the Chrome Web Store

Thankfully, Google has acted promptly to remove all of the malicious extensions from the Chrome Web Store. However, this incident should serve as a reminder that users must remain vigilant and cautious when downloading extensions. Not all extensions are safe, and some may contain hidden malware or have data-stealing capabilities.

Importance of being cautious when downloading extensions and checking for security risks regularly

To protect yourself from extensions that can harm your device or compromise your privacy, it is essential to be cautious when downloading and reviewing extensions. Always read the reviews and check the ratings of extensions before installing them. Avoid installing extensions from unknown or untrusted sources. Additionally, it is essential to keep your browser and extensions up-to-date and regularly check for potential security risks.

In conclusion, the recent discovery of malicious extensions in the Chrome Web Store is a reminder that cybersecurity threats are ever-present in the digital world. By being vigilant and informed, users can protect themselves and their devices from falling prey to nefarious activities.

Explore more

How Will Google’s Reporting Transparency Boost Cybersecurity?

In an era where cyber threats evolve at an alarming pace, the discovery of a single vulnerability can expose millions of users to potential attacks if not addressed swiftly, and Google’s latest initiative seeks to combat this issue head-on. Known as Reporting Transparency and introduced through its Project Zero team, this program aims to reshape how security flaws are communicated

RenderShock: Zero-Click Exploit Targets File Previews

Unveiling a New Threat in Cybersecurity Imagine a scenario where simply browsing a folder on a computer could compromise an entire network, without ever clicking a single file. This chilling possibility is no longer just a concept but a reality with the emergence of RenderShock, an advanced zero-click exploit that targets passive file preview and indexing features in modern operating

How Is North Korea’s ScarCruft Evolving Cyber Threats?

What happens when a routine postal-code update notice turns into a digital trap, locking files and stealing sensitive data? This alarming scenario is not a distant possibility but a stark reality for South Korean users targeted by ScarCruft, a North Korean state-sponsored cyber threat group. With chilling precision, this shadowy entity has unleashed a sophisticated malware campaign that blends espionage

CyberArk and HashiCorp Flaws Allow Remote Vault Takeover

Introduction Imagine a scenario where an organization’s most sensitive data—enterprise secrets, tokens, and corporate identities—are stored in what is believed to be an impenetrable digital vault, only to discover that remote attackers can breach it without any credentials. This alarming reality has come to light with the identification of over a dozen critical vulnerabilities in secure vault solutions from CyberArk

How Can Mitigation Transform Cloud Security Strategies?

In an era where cloud environments underpin the operations of countless organizations worldwide, the cybersecurity challenges they present have never been more pressing, and with data breaches and sophisticated attacks making headlines regularly, security teams face a daunting reality. Traditional remediation methods, such as patching vulnerabilities or updating code, often encounter significant delays due to technical limitations, business priorities, or