Security researchers revealed this week that Google recently removed more than 500 extensions from its Chrome Web Store after learning that they injected malicious ads into people’s browsing sessions.
Independent researcher Jamila Kaya worked with Cisco’s Duo Security team on the investigation (initially shared with ZDNet), which uncovered what Duo described as “a large-scale campaign of copycat Chrome extensions that infected users’ browsers.”
The extensions were able to exist on the Chrome store as they were designed in a way to beat Google’s fraud detection systems. But they were eventually exposed by Kaya and Duo’s own research methods, which made use of the latter’s free Chrome extension security assessment tool, called CRXcavator.
During the course of their joint investigation, the pair were able to find 70 malicious extensions with a total of around 1.7 million installs globally. After informing Google, the company continued with the case and was able to locate a further 500 similar extensions, all of which it removed from the Chrome Web Store. The web giant was also able to deactivate the extensions on browsers that had them installed, and mark them as malicious to encourage users to remove them entirely.
While the malicious code injected by the extensions sometimes led to ads for sites like Macy’s, Dell, or BestBuy, it wasn’t always the case. Duo said the extensions’ activity could be considered as malvertising and ad fraud rather than legitimate advertising because, 1) it involved a large amount of ad content, 2) many of the ads were hidden from the user, and 3) the user was sometimes redirected to malware and phishing sites.
In a statement, Google said it appreciated the work of the research community on such matters, adding, “When we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses. The company also said that it does regular sweeps to search for malicious extensions and removes any that it finds.
The troubling incident is a good reminder to take a moment to review all of the extensions that you currently have on your computer. If you’re unsure about any of them, do a spot of research before deciding if they’re legitimate, and uninstall any that you no longer use.
“As part of good security hygiene, we recommend users regularly audit what extensions they have installed, remove ones they no longer use, and report ones they do not recognize,” Duo Security said. “Being more mindful and having access to more easily accessible information on extensions can help keep both enterprises and users safe.”
- The best VPN services for 2022
- Whatsapp iOS beta brings update for message reactions
- How to use AirDrop on a Mac
- Firefox Focus unveils ‘total cookie protection’ for Android
- Texas parking payment problems now include scammy QR codes