Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Google Cleans Chrome Web Store off Eighty Nine Rogue Browser Extensions

 

A security company recently spotted as many as 89 malware tainted browser extensions within the web store of Chrome. In response, Google has eliminated all those extensions in the same way it did last year when it removed unwanted Android apps from the Play Store.

 

Additionally, Google has as well deactivated the malicious extensions that were being used on more than 420K Chrome users' devices in which the browsers had contracted malware.

 

Last year during November, the Center for Information Technology of Princeton emphasized how intermediate analytics companies employed lawful session-replay codes when they browsed widely-visited websites that hosted high volume traffic. The codes helped comprehend and play again the visits to online sites by end-users. The replays included keystrokes, scrolling and mouse clicks by which the website owners managed determining everything the end-users saw.

 

Evidently, security company Trend Micro has noticed the said session-replay codes being abused during when the hackers manage seeing everything a victim performs while browsing different websites. To do so, the hackers start by utilizing malvertising in combination with social engineering -typically fake error messages such as those directing end-users towards taking down certain extension onto the Web-browser running on their devices, to dupe the surreptitious extensions of Chrome. After loading, the extension verifies whether the C&C (command-and-control) system is active, takes down all the configuration codes required followed with informing the server every detail. Ibtimes.co.uk posted this, February 3, 2018.

 

By combining malevolent ads and socially-engineered tactics, the attackers planted the Droidclub extensions onto the web-browsers of end-users. The malverts, like always, exhibited bogus error missives which got end-users towards loading the destructive extensions onto their browsers. If end-users responded to the false download instructions, there would occur the downloading of damaging extensions from Chrome repository.

 

After downloading and installation, the rogue extensions interacted with the attacker's C&C server to take more commands. The malicious extensions would at intervals deliver cheap advertisements such as ones which related to pornographic websites.

 

Google eliminated 89 rogue extensions existing in Chrome's Web Store which precisely 423,992 end-users installed. Besides eliminating these extensions, Google further deactivated them on every system that had installed one.

» SPAMfighter News - 2/12/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next