Risky Chrome Extensions Put Millions of Users at Risk: Here’s What You Need to Know

In a concerning discovery, a set of 57 Chrome extensions, with a combined user base of over 6 million, have been flagged for containing alarming security risks. These extensions, while disguised as tools for enhancing user experience, carry dangerous capabilities like monitoring browsing behavior, accessing sensitive cookies, and executing remote scripts. They are not visible in standard Chrome Web Store searches and can only be installed through direct URLs, raising suspicions of deliberate attempts to bypass detection. In this article, we will explore what makes these extensions so dangerous, their potential impact, and the actions you can take to protect yourself.

Uncovering the Hidden Risks of These Extensions

Recent findings by cybersecurity researcher John Tuckner reveal that 57 Chrome extensions, affecting millions of users, are exhibiting highly risky behavior. While some of these extensions present themselves as legitimate tools offering privacy protection or ad-blocking services, their capabilities go far beyond what users might expect.

These extensions are “hidden,” meaning they don’t appear in the standard search results of the Chrome Web Store, and can only be installed via a direct URL. Typically, this setup is used for private software such as internal company tools or products still in development. However, researchers suspect that these extensions may have been deliberately designed to evade detection, allowing attackers to push them onto unsuspecting users through targeted ads or malicious websites.

Tuckner’s research began with an investigation into one suspicious extension named “Fire Shield Extension Protection.” This particular extension, heavily obfuscated to obscure its true function, was found to contain callbacks that could send data collected from users’ browsers to remote servers. Tuckner’s subsequent analysis uncovered 35 more extensions connected to the same domain, “unknow.com,” all claiming to provide security services like ad-blocking, but with far too many dangerous permissions. These permissions include:

  • Access to sensitive cookies and headers, including authentication data

– Monitoring of user browsing behavior

– Modifying search providers and results

  • Injecting and executing remote scripts on visited websites

– Activating advanced tracking mechanisms remotely

Although no extensions were found to be stealing passwords or cookies, the excessive permissions and obfuscated code were enough to raise alarms. The potential for spyware-like behavior was clear, and Tuckner warned that these extensions could be used to monitor and control user activities.

What Undercode Says:

Tuckner’s discovery raises significant concerns about the security of Chrome extensions. While Google’s Chrome Web Store is often considered a trusted source for add-ons, the recent findings reveal how even seemingly harmless extensions can hide dangerous functions. The fact that these extensions are not visible in Chrome’s search results adds an additional layer of risk, making them even more difficult for users to detect.

The use of obfuscation techniques in these extensions is a red flag. Obfuscation is often employed by malicious actors to conceal their activities from detection by both users and security software. The presence of callbacks to external APIs further suggests that these extensions are designed to gather and transmit sensitive data from users without their knowledge.

One of the most concerning aspects of this discovery is the ability of these extensions to execute remote scripts via iframes on visited web pages. This feature gives attackers the potential to manipulate what users see and interact with online, making it possible for them to inject malicious content into otherwise legitimate sites.

Tuckner’s discovery highlights the vulnerability of Chrome users to these types of attacks. Even though Google has removed many of the extensions from the Chrome Web Store in response to the report, some are still active, and millions of users are at risk. This underscores the importance of exercising caution when installing browser extensions, especially those that are not widely known or easily accessible.

It’s also worth noting that many of the affected extensions were initially labeled as offering security benefits—such as privacy protection or ad-blocking—which is ironic given their true nature. This tactic, often referred to as “social engineering,” takes advantage of users’ trust in security-related tools to disguise harmful activities.

For users, the recommendation is simple: if you have any of the extensions mentioned in the report, remove them immediately. It’s also wise to reset passwords for online accounts as a precautionary measure, especially if you’ve used any of the affected extensions.

Fact Checker Results

– Researcher John

  • Google has confirmed they are investigating the issue and have already removed some extensions from the Web Store.
  • No direct evidence of stolen passwords or cookies has been found, but the extensive permissions and obfuscation raise serious concerns about privacy violations.

References:

Reported By: www.bleepingcomputer.com
Extra Source Hub:
https://www.linkedin.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image