Kaspersky reveals malicious Chrome extensions
#1
Information 
Quote:Kaspersky has revealed a list of malicious Google Chrome extensions in its blog post. The company has discovered over 30 Google Chrome extensions with malicious payloads that have received a combined 87 million downloads. One of the apps even had over 9 million downloads. The blog post also suggested users ways to defend themselves against these kinds of situations

The company's investigation was sparked by the discovery of the PDF Toolbox plugin, which allowed users to view any page and have any code placed on it. Additional investigations turned up a total of 34 harmful extensions, each of which was advertised as performing a particular function.

Although the browser add-ons have already been taken down from the Chrome Web Store, Kaspersky is quick to stress that users should check the list of suspicious add-ons and take any harmful ones off their devices because they will still be present. Here is the full list of extensions:
  • Autoskip for Youtube
  • Soundboost
  • Crystal Adblock
  • Brisk VPN
  • Clipboard Helper
  • Maxi Refresher
  • Quick Translation
  • Easyview Reader view
  • PDF Toolbox
  • Epsilon Ad blocker
  • Craft Cursors
  • Alfablocker ad blocker
  • Zoom Plus
  • Base Image Downloader
  • Clickish fun cursors
  • Cursor-A custom cursor
  • Amazing Dark Mode
  • Maximum Color Changer for Youtube
  • Awesome Auto Refresh
  • Venus Adblock
  • Adblock Dragon
  • Readl Reader mode
  • Volume Frenzy
  • Image download center
  • Font Customizer
  • Easy Undo Closed Tabs
  • Screence screen recorder
  • OneCleaner
  • Repeat button
  • Leap Video Downloader
  • Tap Image Downloader
  • Qspeed Video Speed Controller
  • HyperVolume
  • Light picture-in-picture
[Image: kaspersky-rebranding-in-details-featured-scaled.jpg]Kaspersky

Palant found an "additional functionality"

"It all began when cybersecurity researcher Vladimir Palant found an extension called PDF Toolbox containing suspicious code in the Chrome Web Store. At first glance, it was a perfectly respectable plugin for converting Office documents and performing other simple operations with PDF files," said Kaspersky in the blog post.

"PDF Toolbox boasted an impressive user base and good reviews, with close to two million downloads and an average score of 4.2. However, inside this extension interesting “additional functionality” was discovered: the plugin accessed a serasearchtop[.]com site, from where it loaded arbitrary code on all pages viewed by the user," it continued.

According to the blog post, Palant found "a couple dozen" extensions on the Chrome Web Store accessing the same server. All these extensions had over 87 million downloads.
..
Continue Reading
Reply


Forum Jump:


Users browsing this thread:
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
QOwnNotes 19.1.6
25.5.9   The p...Kool — 15:38
XYplorer
What's new in Rele...Kool — 15:30
FastestVPN PRO Lifetime Plan 15 Logins +...
Link: https://fastes...siriyax320 — 10:40
F-Secure 25.5
Version 25.5 ​R...harlan4096 — 09:31
uBOLite_2025.601.2131
uBOLite_2025.601.2...harlan4096 — 08:54

[-]
Birthdays
Today's Birthdays
avatar (50)nteriageda
Upcoming Birthdays
avatar (47)BrantgoG
avatar (41)tapedDow
avatar (49)eapedDow
avatar (46)Carlosskake
avatar (48)rapedDow
avatar (43)Johnsonsyday
avatar (48)Groktus
avatar (40)efodo
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (50)smudloquask
avatar (45)benchJem
avatar (38)biobdam
avatar (41)zacforat
avatar (46)NemrokReks
avatar (49)Jasoncedia
avatar (37)Barrackleve
avatar (39)Julioagopy
avatar (49)aolaupitt2558
avatar (47)vadimTob
avatar (37)leannauu4
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>