Skip to main content

Digital Trends may earn a commission when you buy through links on our site. Why trust us?

Google recently kicked 500 dodgy extensions from Chrome Store

Security researchers revealed this week that Google recently removed more than 500 extensions from its Chrome Web Store after learning that they injected malicious ads into people’s browsing sessions.

Recommended Videos

Independent researcher Jamila Kaya worked with Cisco’s Duo Security team on the investigation (initially shared with ZDNet), which uncovered what Duo described as “a large-scale campaign of copycat Chrome extensions that infected users’ browsers.”

The extensions were able to exist on the Chrome store as they were designed in a way to beat Google’s fraud detection systems. But they were eventually exposed by Kaya and Duo’s own research methods, which made use of the latter’s free Chrome extension security assessment tool, called CRXcavator.

During the course of their joint investigation, the pair were able to find 70 malicious extensions with a total of around 1.7 million installs globally. After informing Google, the company continued with the case and was able to locate a further 500 similar extensions, all of which it removed from the Chrome Web Store. The web giant was also able to deactivate the extensions on browsers that had them installed, and mark them as malicious to encourage users to remove them entirely.

While the malicious code injected by the extensions sometimes led to ads for sites like Macy’s, Dell, or BestBuy, it wasn’t always the case. Duo said the extensions’ activity could be considered as malvertising and ad fraud rather than legitimate advertising because, 1) it involved a large amount of ad content, 2) many of the ads were hidden from the user, and 3) the user was sometimes redirected to malware and phishing sites.

In a statement, Google said it appreciated the work of the research community on such matters, adding, “When we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses. The company also said that it does regular sweeps to search for malicious extensions and removes any that it finds.

The troubling incident is a good reminder to take a moment to review all of the extensions that you currently have on your computer. If you’re unsure about any of them, do a spot of research before deciding if they’re legitimate, and uninstall any that you no longer use.

“As part of good security hygiene, we recommend users regularly audit what extensions they have installed, remove ones they no longer use, and report ones they do not recognize,” Duo Security said. “Being more mindful and having access to more easily accessible information on extensions can help keep both enterprises and users safe.”

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
Update your Chrome browser now to gain this critical security feature
Google Chrome icon in mac dock.

Yesterday, in a blog post on Google's security blog, Willian Harris from Chrome's Security Team said that Google is improving the security of Chrome cookies on Windows PCs by adopting a similar method used in macOS to help protect users from info-stealing malware.

The security update addresses session cookies that authenticate your identity when you switch apps without logging back in. Google wants to adopt the security system used by Keychain on macOS and start using "a new protection on Windows," which updates Data Protection API (DPAPI) and brings a new security tool called "application-bound" encryption.

Read more
This new Google Chrome security warning is very important
The Google Chrome logo on a black phone which is resting on a red book

Google is changing how it warns its users about suspicious files on Chrome by adding new full-page warnings and cloud scanning regarding suspicious downloads, according to Windows Report. This is an attempt to explain more precisely why it blocks specific downloads. Google says that the AI models will divide the warning into two categories: "suspicious" or "dangerous."

The new warning system primarily benefits those using the anti-phishing Enhanced protection feature. The files users upload to the cloud for an automatic scan and those that undergo a deep scan are 50 times more likely to have the AI flag them as malware.

Read more
Google just gave up on its proposed makeover of the internet
Google Chrome browser running on Android Automotive in a car.

Google announced on Monday that it will pull the brakes on phasing out the use of third-party cookies on its Chrome browser because of concerns from regulators, competitors, and privacy advocates, the tech giant said in a Privacy Sandbox post. Instead, Google will be going in a different direction that will let users choose how they interact with third-party cookies.

Blocking third-party cookies would have presented a hurdle for remarketing, which lets companies serve you ads based on your previous activity around the web.

Read more