More malicious extensions in #Chrome Web Store

At least 18 different malicious extensions (as of 30 MAY and this post) identified by @WPalant

Remember extensions have privileged access to the browser (and data in the browser). Choose your extensions wisely... they could be #spyware or #malware in disguise.

#cybersecurity #infosec #security #opsec #privacy

https://palant.info/2023/05/31/more-malicious-extensions-in-chrome-web-store/

More malicious extensions in Chrome Web Store

So far I discovered 18 malicious extensions with 55 million users in total. Most popular ones are: Autoskip for Youtube, Crystal Ad block and Brisk VPN. They have been active for two years, undetected by Google.

Almost Secure
@avoidthehack Actually, the article has been updated already. So now it’s 34 malicious extensions. And I think that it will stay this way: Google is finally moving, and they have better means of finding all the extensions I missed.

@WPalant thanks for the additional; I had read it when it was 18.

Honestly, if they take the same approach they do for the Play Store and their paid search ads, then they will probably only purge the reported/named ones. Doubt they will go hunting based on their track record.

@avoidthehack They already found some extensions that I didn’t mention in my original post. By the time I published the update they were already gone. Which is reassuring: they definitely did their own search.

Still weird that they missed one extension. Not surprising that they missed the other eight: it’s a significantly different code variant that I’ve only come across now.

@WPalant That’s actually refreshing and ultimately glad. Wish they’d take a similar approach to Play Store and their search ads - they usually only remove reported apps or ads after some pressure in my experience - but I guess we can’t have everything. 🙃

@avoidthehack Well, the pressure part is present here as well. I’ve never seen regular reporting work with Chrome Web Store. But action happens fairly quickly after it hits Hacker News. The beneficial interpretation is: their usual processing pipeline is massively understaffed, but Hacker News is usually read by some Google devs who care and will escalate internally.

There is one more aspect here: I think that the extensions haven’t been blocklisted yet. So those 87 million installs are still there, the extensions merely don’t gain any new users. Still waiting for my own install to vanish, so far it didn’t.

@WPalant I see. Always appreciate the insight. Still wish as a whole Google would act quicker, given their reputation in the general cybersecurity community.

Just in my experience/observation, there’s a lag between action on the Play Store and search ads, though seems to be slower with search ads. Search ads being the biggest offender - why let an ad pointing to a site blocked by Safe Browsing even create an ad on the platform… granted I know it can be whack a mole. Heh.

@avoidthehack Sadly, you were right. Google didn’t scan their extensions for other occurrences of the same code, Avast did. They removed the extensions that Avast found.

@WPalant A case where I absolutely do not want to be right.

In any case, thanks for your work. I like your posts. :)

Btw, you made it into this Ars Technica post: https://arstechnica.com/information-technology/2023/06/injecting-strange-code-into-websites-file-snooping-google-marketplaces-are-a-mess/

Google’s Android and Chrome extensions are a very sad place. Here’s why

It was a bad week for millions of people who rely on Google for apps and Chrome extensions.

Ars Technica

@avoidthehack Yes, seen it. They even put my quote into the article title.

Btw, going to publish another article on some ad blockers published by a company that specializes in “potentially unwanted software.” Google recently removed at least two of their ad blockers. Yet two others remain despite being almost identical code-wise.

@WPalant That’s awesome and I hope you’re proud of your great research. :) also as a side note… LOL at specializing in PUPs. I guess everything is possible.

Put me on the shortlist of notification for when it goes live. I would like to add considerable updates for my own post for adblocking, stressing the need to vet adblocking software.

@avoidthehack It went live today: https://palant.info/2023/06/05/introducing-pcvark-and-their-malicious-ad-blockers/

And there will be another article – there is really no end to malicious extensions…

Introducing PCVARK and their malicious ad blockers

The company PCVARK is known for developing “potentially unwanted software.” Chrome Web Store is offering two of their ad blockers regardless, despite having remove another two a year ago.

Almost Secure

@WPalant :D you know what… you bring up a good point. Malicious extensions are a privacy and security problem… time to put together another post on my end on top updating others.

Thanks for the idea/inspiration. 😝