Palant uncovers 34 malicious browser extensions

Share post:

Palant has uncovered 34 malicious browser extensions that were cleverly disguised as essential utilities like ad blockers and browser themes and have been causing havoc on an estimated 87 million users globally.

Rather than collecting personal information, these extensions penetrated customers’ computers with malware, causing disruption. Some customers saw incomplete extension development, while others had their search results rerouted to unknown and potentially dangerous websites.

The extensive list of identified malicious extensions includes Autoskip for YouTube, Soundboost, Crystal Ad block, Brisk VPN, Clipboard Helper, and Maxi Refresher. Other deceptive extensions included Quick Translation, Easyview Reader view, PDF toolbox, Epsilon Ad blocker, Craft Cursors, Alfablocker ad blocker, Zoom Plus, Base Image Downloader, Clickish fun cursors, Cursor – A custom cursor, Amazing Dark Mode, Maximum Color Changer for YouTube, Awesome Auto Refresh, Venus Adblock, Adblock Dragon, Readl Reader mode, Volume Frenzy, Image download center, Font Customizer, Easy Undo Closed Tabs, Screence screen recorder, OneCleaner, Repeat button, Leap Video Downloader, Tap Image Downloader, Qspeed Video Speed Controller, HyperVolume, and Light picture-in-picture.

Palant discovered that specific extensions had been marketed via search page redirecting since 2021. According to Palant, Google swiftly deleted all 34 identified extensions from the Chrome Web Store by June 3.

Further examination found unusual behaviour relating to the number of extensions installed. It appears that the download counts were modified to make them appear more popular. The paucity of user evaluations on the Chrome Web Store for these extensions, as well as the disparity between reported threat encounters and official install counts, raises questions about the data’s veracity.

The sources for this piece include an article in TheSun.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways