Malicious Chrome extensions on 500.000 computers

Researchers at the American security company ICEBRG have identified four Chrome extensions containing malicious code. All four extensions were available via the Chrome Web Store.

According to the researchers, the four extensions of Chróme designed to allow attackers to send malicious commands to users' browsers in JavaScript format. Chrome

Attackers used this feature to make click fraud, loading a page in the background that contained ads.

The names of the four extensions are:

Change HTTP Request Header (ppmibgfeefcglejjlpeihfdimbkfbbnm), Nyoogle - Custom Logo for Google (ginfoagmgomhccdaclfbbbhfjgmphkph), Lite Bookmarks (mpneoicaochhlckfkackiigepakdgapm -) - Stick ()

Of the four, Nyoogle is still available on the Chróme Web Store, up to now.

Extensions have been down altogether over 500.000 times by Google's browser users. When the ICEBRG researchers detected malicious behavior of addons, they informed the National Center for Internet Security in the Netherlands (NCSC-NL) and US-CERT.

  ESET diachronic survey TeleBots Petya

While three of the four extensions were removed directly from the Chrome Web Store, many of Chrome's users are still using them in their browsers.

The company published a detailed report for the malicious behavior of extensions in the hope that users will spend some time controlling their browser and removing malicious extensions from their computers.

Registration in via email

Your email for sending each new post

Follow us on Google News at Google news

Leave a reply

Your email address Will not be published.

  + 3 = 6

Previous Story

Ubuntu 18.04 LTS: Sign up for Bionic Beaver

Next Story

BitTorrent: Vulnerability allows full access to computers