Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Kaspersky reveals malicious Chrome extensions
#1
Information 
Quote:Kaspersky has revealed a list of malicious Google Chrome extensions in its blog post. The company has discovered over 30 Google Chrome extensions with malicious payloads that have received a combined 87 million downloads. One of the apps even had over 9 million downloads. The blog post also suggested users ways to defend themselves against these kinds of situations

The company's investigation was sparked by the discovery of the PDF Toolbox plugin, which allowed users to view any page and have any code placed on it. Additional investigations turned up a total of 34 harmful extensions, each of which was advertised as performing a particular function.

Although the browser add-ons have already been taken down from the Chrome Web Store, Kaspersky is quick to stress that users should check the list of suspicious add-ons and take any harmful ones off their devices because they will still be present. Here is the full list of extensions:
  • Autoskip for Youtube
  • Soundboost
  • Crystal Adblock
  • Brisk VPN
  • Clipboard Helper
  • Maxi Refresher
  • Quick Translation
  • Easyview Reader view
  • PDF Toolbox
  • Epsilon Ad blocker
  • Craft Cursors
  • Alfablocker ad blocker
  • Zoom Plus
  • Base Image Downloader
  • Clickish fun cursors
  • Cursor-A custom cursor
  • Amazing Dark Mode
  • Maximum Color Changer for Youtube
  • Awesome Auto Refresh
  • Venus Adblock
  • Adblock Dragon
  • Readl Reader mode
  • Volume Frenzy
  • Image download center
  • Font Customizer
  • Easy Undo Closed Tabs
  • Screence screen recorder
  • OneCleaner
  • Repeat button
  • Leap Video Downloader
  • Tap Image Downloader
  • Qspeed Video Speed Controller
  • HyperVolume
  • Light picture-in-picture
[Image: kaspersky-rebranding-in-details-featured-scaled.jpg]Kaspersky

Palant found an "additional functionality"

"It all began when cybersecurity researcher Vladimir Palant found an extension called PDF Toolbox containing suspicious code in the Chrome Web Store. At first glance, it was a perfectly respectable plugin for converting Office documents and performing other simple operations with PDF files," said Kaspersky in the blog post.

"PDF Toolbox boasted an impressive user base and good reviews, with close to two million downloads and an average score of 4.2. However, inside this extension interesting “additional functionality” was discovered: the plugin accessed a serasearchtop[.]com site, from where it loaded arbitrary code on all pages viewed by the user," it continued.

According to the blog post, Palant found "a couple dozen" extensions on the Chrome Web Store accessing the same server. All these extensions had over 87 million downloads.
..
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
How to turn off App Promotions in Windo...
disable app promotio...marcojanson42 — 09:42
Microsoft Edge 125.0.2535.51
Version 125.0.2535...harlan4096 — 06:59
NoVirusThanks OSArmor 1.9.9
OSArmor v1.9.9 rel...harlan4096 — 06:00
INTEL Arc Graphics 31.0.101.5522
Highlights Gami...harlan4096 — 05:58
Malwarebytes 5.1.4.112
We have released a...Mohammad.Poorya — 21:27

[-]
Birthdays
Today's Birthdays
avatar (26)akiratoriyama
avatar (46)Jerrycix
avatar (38)awedoli
avatar (80)WinRARHowTo
Upcoming Birthdays
avatar (37)axuben
avatar (38)ihijudu
avatar (48)Mirzojap
avatar (34)idilysaju
avatar (38)GregoryRog
avatar (38)odukoromu
avatar (44)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>