Malicious Extensions Target 1.7M Chrome Users

Malicious Extensions Threaten Browser Safety

Malicious extensions create major risks for Chrome users. These dangerous add-ons, downloaded 1.7 million times, lurk in the Chrome Web Store. They disguise themselves as trusted tools, such as VPNs, emoji keyboards, or color pickers. However, they can steal personal data, track online activity, or redirect users to harmful websites.

Deceptive Add-Ons Trick Unsuspecting Users

Researchers discovered nearly a dozen malicious extensions. These tools appear legitimate, often featuring verified status and hundreds of positive reviews. For example, “Volume Max — Ultimate Sound Booster” and “Unlock TikTok” seem harmless at first glance. Yet, they contain hidden code that activates after installation, deceiving users who trust the store’s vetting process.

How Malicious Extensions Function

These extensions use a background service to monitor browsing behavior. Specifically, they capture the URLs of visited webpages and send them to remote servers. Additionally, they assign unique tracking IDs to each user. As a result, attackers can hijack browsing sessions or redirect users to unsafe sites. Fortunately, researchers have not observed active malicious redirections during testing.

Hidden Dangers in Automatic Updates

The threat often emerges through updates. Many extensions start safe but later receive malicious code via automatic updates. Google’s auto-update system installs these changes without user approval. Consequently, even long-trusted extensions can become dangerous if compromised by external attackers. This silent update process makes it hard for users to notice the shift.

The Threat Extends Beyond Chrome

The problem isn’t limited to Chrome browsers. Researchers found similar malicious extensions in Microsoft Edge’s store, affecting 600,000 users. Combined, these add-ons have impacted over 2.3 million people across both platforms. Therefore, this represents one of the largest browser hijacking campaigns ever documented. Users must stay cautious across all browsers.

Protect Yourself from Malicious Extensions

To avoid these risks, carefully evaluate extensions before installing them. Check developer credibility and read reviews with skepticism. Moreover, regularly review and delete unused extensions to minimize exposure. For stronger protection, use apply solution of Threat Intelligence or Penetration Testing services. These tools proactively detect malicious threats and test system vulnerabilities, ensuring safer browsing. By staying vigilant and leveraging specialized security solutions, users can significantly reduce the chances of falling victim to browser hijacking. Always prioritize trusted tools to safeguard your online experience.

Sleep well, we got you covered.

Scroll to Top