More than 30 malicious extensions have been found in the Chrome Web Store potentially affecting millions of users

Web browsers have become an essential tool for work, communication, and entertainment in the digital age. However, with the increasing use of technology, cybercriminals have also developed new ways to exploit vulnerabilities and infiltrate users’ devices. Recently, security researchers identified malicious extensions in the Chrome Web Store, potentially affecting millions of users. In this article, we will explore the details of the attack and what you can do to protect yourself.

Extensions are small software programs that can modify and enhance the functionality of a web browser. They can add new features, block ads, or improve security. However, not all extensions are safe and some may contain malicious code that can harm users’ devices. Google’s Chrome Web Store is a popular platform for distributing extensions to millions of users.

More than 30 malicious extensions have been identified in the Chrome Web Store

Recently, security researchers discovered more than 30 malicious extensions in the Chrome web store. These extensions had made their way into the store by disguising themselves as legitimate tools. Once installed, they could modify users’ browsing experience, display unwanted ads, and hijack search results. What’s more, these extensions could collect users’ sensitive information and send it to third-party servers. If left unchecked, these extensions could compromise users’ privacy and security.

The installed base of identified extensions is around 87 million users

The identified extensions had an install base of roughly 87 million users, according to cybersecurity firm Avast, which discovered the malicious extensions. Most of the identified extensions had more than one million downloads each. This indicates that a significant number of users could have potentially been affected by the attack.

Suspiciously low number of reviews compared to installs

One of the red flags identified was the suspiciously low number of reviews compared to installations. According to Avast, the number of reviews these extensions had in the Chrome Web Store was significantly lower than the number of installations. This suggests that users did not leave reviews after installing the extensions, which could be due to the fact that the extensions were hiding their true purpose.

A large number of extensions have been found to contain obfuscated code

Another concerning aspect of the attack was the large number of extensions that contained obfuscated code. Obfuscation is a technique used to make the code harder to read and understand, which can make it difficult for security researchers to detect and analyze malicious behavior. According to Avast, apart from the 32 extensions that it identified, 50 more extensions were removed from the Chrome web store on the same grounds.

The purpose of the malicious code was related to displaying unwanted ads and hijacking search results

The purpose of the malicious code appears to be related to displaying unwanted ads and hijacking search results to display sponsored links. These extensions can modify the content of web pages and inject additional ads or links without users’ consent, which could lead to a poor user experience and potentially expose users to more dangerous content.

Researchers have yet to analyze the full scope of the attack

While the security researchers have undoubtedly identified a significant number of malicious extensions, there could be more lurking in the Chrome web store. According to reports, the attackers behind the extensions used a complex and multi-step approach to hide their activities and evade detection. Thus, it will take more time and effort to understand the full scope of the attack and its potential impact on users.

Google has removed all the malicious extensions from the Chrome Web Store

Thankfully, Google has acted promptly to remove all of the malicious extensions from the Chrome Web Store. However, this incident should serve as a reminder that users must remain vigilant and cautious when downloading extensions. Not all extensions are safe, and some may contain hidden malware or have data-stealing capabilities.

Importance of being cautious when downloading extensions and checking for security risks regularly

To protect yourself from extensions that can harm your device or compromise your privacy, it is essential to be cautious when downloading and reviewing extensions. Always read the reviews and check the ratings of extensions before installing them. Avoid installing extensions from unknown or untrusted sources. Additionally, it is essential to keep your browser and extensions up-to-date and regularly check for potential security risks.

In conclusion, the recent discovery of malicious extensions in the Chrome Web Store is a reminder that cybersecurity threats are ever-present in the digital world. By being vigilant and informed, users can protect themselves and their devices from falling prey to nefarious activities.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the