Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Tech

Google Chrome users warned to delete 16 popular extensions due to ‘malicious’ threat risk

Google Chrome users have been warned to delete 16 “malicious” browser extensions that could lead to a security threat and “fraud” at the hands of a prolific “threat actor.”

The extensions affect functionality involving screen capture, ad blocking, emoji keyboards and more, with a potential impact on at least 3.2 million users, according to GitLab Threat Intelligence, which first reported the threat.

The extensions inject code and harmful scripts into browsers, allowing hackers to steal user data and engage in search-engine fraud involving ad revenue, according to Tom’s Guide.

The affected extensions deal with screen capture, ad blocking, emoji keyboards and more. Take Production – stock.adobe.com

After users granted permission to use them, the extensions, while legitimate, were infected with malicious updates that corrupted them.

According to tech site Notebook Check, the attack was traced to developer accounts that unknowingly transferred control of extensions to the attackers, whose dangerous updates were available through official browser extension stores.

The dangerous extensions include:

  • Blipshot
  • Emojis (Emoji Keyboard)
  • Color Changer for YouTube
  • Video Effects for YouTube and Audio Enhancer
  • Themes for Chrome and YouTube Picture in Picture
  • Mike Adblock für Chrome
  • Super Dark Mode
  • Emoji Keyboard Emojis for Chrome
  • Adblocker for Chrome (NoAds)
  • Adblock for You
  • Adblock for Chrome
  • Nimble Capture
  • KProxy
  • Page Refresh
  • Wistia Video Downloader 
  • WAToolkit

The legitimate extensions were infected with malicious updates.
The legitimate extensions were infected with malicious updates. SHOTPRIME STUDIO – stock.adobe.com

The targeted extensions already have been removed from the Chrome Web Store, but users should manually delete them if they are still installed on their browsers.

Tom’s Guide advises then using antivirus software to scan for malware or other viruses.

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button