Malicious Google Chrome extensions installed on more than one million devices
Chrome extensions masquerade as genuine browser utilities
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
A set of maliciousGoogle Chromeextensions designed to monitor browsing activity have been installed on more than 1.4 million devices, researchers have reported.
As described in ablog postfrom security company McAfee, the purpose of the scam is to modify the victim’sbrowsercookies each time they visit an ecommerce website, thereby netting the operator an affiliate fee for any purchases made.
Although two extensions branded as “Netflix Party” have now been removed from the official extension marketplace, McAfee says the remainder are still available to download.
Chrome extensions scam
Although the malicious extensions do not pose an immediate security risk – they are not designed to exfiltrate sensitive data, nor installmalwarepayloads – they do represent a flagrant violation of privacy.
As demonstrated by the surging popularity ofVPNservices and other solutions designed to obscure web activity, modern web users are increasingly unwilling to part with their browsing data - and especially not, one would imagine, in these circumstances.
What makes this scam particularly difficult to spot is that the extensions all serve a legitimate purpose, on top of providing a foundation for the affiliate revenue ploy. They are also broadly well-reviewed, leaving potential victims with little indication of the scam playing out under their noses.
New Windows malware uses a cunning technique to avoid detection>Our list of the best firewalls available right now>LastPass hacked: Should you be worried about your passwords?
“The extensions offer various functions such as enabling users to watch Netflix shows together, website coupons, and taking screenshots of a website,” explained McAfee.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
“The users of the extensions are unaware of [the malicious functionality] and the privacy risk of every site being visited being sent to the servers of the extension authors.”
In an effort to evade detection by analysts, meanwhile, the operators programmed some of the extensions to begin meddling with browser cookies multiple weeks after the date of installation.
Chrome users that find they have installed the offending extensions are advised to perform a manual uninstall immediately.
Malicious extensions list:
Update: 09 September, 2022The original version of this article made reference to a browser extension that has since been updated to remove the functionality identified by McAfee as malicious.
In communication withTechRadar Proover email, McAfee provided the following statement:
“Since the original publication of the report on August 29, 2022, the browser extension was updated in the Chrome Store on September 6, 2022. McAfee has updated its blog accordingly.”
Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He’s responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.
Don’t search for information on cats at work — you could be at risk of being hacked
This dangerous new malware is hitting Windows devices by hiding in games
Nvidia’s GeForce Now Priority membership has upgraded to ‘Performance’ - introducing a 1440p resolution and ultrawide support