Skip to main content

Digital Trends may earn a commission when you buy through links on our site. Why trust us?

Google recently kicked 500 dodgy extensions from Chrome Store

Security researchers revealed this week that Google recently removed more than 500 extensions from its Chrome Web Store after learning that they injected malicious ads into people’s browsing sessions.

Independent researcher Jamila Kaya worked with Cisco’s Duo Security team on the investigation (initially shared with ZDNet), which uncovered what Duo described as “a large-scale campaign of copycat Chrome extensions that infected users’ browsers.”

The extensions were able to exist on the Chrome store as they were designed in a way to beat Google’s fraud detection systems. But they were eventually exposed by Kaya and Duo’s own research methods, which made use of the latter’s free Chrome extension security assessment tool, called CRXcavator.

During the course of their joint investigation, the pair were able to find 70 malicious extensions with a total of around 1.7 million installs globally. After informing Google, the company continued with the case and was able to locate a further 500 similar extensions, all of which it removed from the Chrome Web Store. The web giant was also able to deactivate the extensions on browsers that had them installed, and mark them as malicious to encourage users to remove them entirely.

While the malicious code injected by the extensions sometimes led to ads for sites like Macy’s, Dell, or BestBuy, it wasn’t always the case. Duo said the extensions’ activity could be considered as malvertising and ad fraud rather than legitimate advertising because, 1) it involved a large amount of ad content, 2) many of the ads were hidden from the user, and 3) the user was sometimes redirected to malware and phishing sites.

In a statement, Google said it appreciated the work of the research community on such matters, adding, “When we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses. The company also said that it does regular sweeps to search for malicious extensions and removes any that it finds.

The troubling incident is a good reminder to take a moment to review all of the extensions that you currently have on your computer. If you’re unsure about any of them, do a spot of research before deciding if they’re legitimate, and uninstall any that you no longer use.

“As part of good security hygiene, we recommend users regularly audit what extensions they have installed, remove ones they no longer use, and report ones they do not recognize,” Duo Security said. “Being more mindful and having access to more easily accessible information on extensions can help keep both enterprises and users safe.”

Editors' Recommendations

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
These 2 new Edge features are making Chrome look outdated
Copilot in Windows being used in the side panel.

Microsoft has announced a host of updates that will soon be available for its Edge browser, including the Microsoft 365 Copilot feature and Sidebar app support for developers.

The company is showcasing the new features during its annual Build developer conference, which is currently taking place from May 23 through May 25.

Read more
The best ChatGPT Chrome extensions to bring AI to your browser
GPT EZ themes.

Want ChatGPT closer to hand? One of the best ways to have quick and easy access to ChatGPT is through its range of Chrome extensions. They also give you better ways of using ChatGPT, including helping you to write better prompts to get improved responses, or granting ChatGPT the ability to search the internet, which provides access to more up-to-date information.

Here are the best ChatGPT Chrome extensions you can use right now.

Read more
Update Chrome now to avoid this major zero-day exploit
Google Chrome open with several tabs.

The Google Chrome browser has been hit by its first zero-day attack of 2023, and Google has begun rolling out an emergency update as of today to address the exploit.

Google detailed on its Chrome Release blog that it is aware that an exploit for CVE-2023-2033 exists in the wild. It has likely been circulating since the beginning of the year, according to Bleeping Computer.

Read more