{"id":96584,"date":"2018-01-17T16:52:31","date_gmt":"2018-01-17T15:52:31","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=96584"},"modified":"2025-07-01T23:41:27","modified_gmt":"2025-07-02T06:41:27","slug":"malware-filled-chrome-extensions-have-been-downloaded-500000-times","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/malware-filled-chrome-extensions-have-been-downloaded-500000-times\/","title":{"rendered":"Malware-filled Chrome extensions have been downloaded 500K times"},"content":{"rendered":"<p>Google Chrome is widely regarded as one of the <strong>most secure web browsers available<\/strong> today. If you add speed and reliability to Chrome\u2019s high-level security, you can see why it is<strong> the most popular browser<\/strong>. There is a chink in Chrome\u2019s armor, however, that has been exploited before and that has again seen <strong>hundreds of thousands of Chrome users exposed to malicious code<\/strong>. That weakness is the Google Chrome Web Store.<\/p>\n<p>We reported in October that <a href=\"https:\/\/en.softonic.com\/articles\/30000-google-chrome-users-have-been-tricked-into-downloading-a-fake-extension\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>30,000 Chrome users had downloaded a fake ad blocker extension<\/strong><\/a> that caused their browser to be inundated with ads. On Friday, researchers at security firm <a href=\"https:\/\/www.icebrg.io\/\"><strong>ICEBRG<\/strong><\/a> uncovered <strong>four Chrome extensions<\/strong> that contained malicious code that had already<strong> been downloaded 500,000 times from the Chrome Web Store<\/strong>.<\/p>\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"8 tricks to boost your security on Google Chrome\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/10\/blue-google-192.jpg\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">8 tricks to boost your security on Google Chrome<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-boost-your-security-on-google-chrome\" target=\"_self\" rel=\"noopener noreferrer\">Click Here to Read<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-boost-your-security-on-google-chrome\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n<p>The extensions in questions are the <strong>HHTP Request Header, Nyoogle, Stickies, and Lite Bookmarks<\/strong>. The researchers discovered that there had been a spike in outbound traffic from one of ICEBRG\u2019s customers and their investigations led them to the extensions mentioned. Each <strong>infected the victim\u2019s PC<\/strong> with code that forced the PC to \u201cclick\u201d certain advertisements that would generate revenue for the people behind it. According to ICEBRG<strong> a similar bot in 2013 generated $6,000,000 a month<\/strong>.<\/p>\n<figure id=\"attachment_96585\" aria-describedby=\"caption-attachment-96585\" style=\"width: 786px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-96585 size-full\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/01\/Malicious-Chrome-Extension-diagram.jpg\" alt=\"\" width=\"786\" height=\"434\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/01\/Malicious-Chrome-Extension-diagram.jpg 786w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/01\/Malicious-Chrome-Extension-diagram-300x166.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2018\/01\/Malicious-Chrome-Extension-diagram-768x424.jpg 768w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><figcaption id=\"caption-attachment-96585\" class=\"wp-caption-text\">(Image via: ICEBRG) &#8211; How the malicious extensions generate money<\/figcaption><\/figure>\n<p>Google <strong>removed the malicious extensions<\/strong> from the Chrome Web Store as soon as ICEBRG privately notified it of their presence. In ICEBRG&#8217;s report on their findings, however, they pointed out that <strong>this type of attack will continue to be attractive to cyber-criminals<\/strong> due to the high payoffs that they offer. They <a href=\"https:\/\/www.icebrg.io\/blog\/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses\" target=\"_blank\" rel=\"noopener noreferrer\">added<\/a>:<\/p>\n<p><em>&#8220;&#8230;without upstream review or control over this technique, malicious Chrome extensions will continue to pose a risk to enterprise networks.&#8221;<\/em><\/p>\n<p>The ball is definitely in Google&#8217;s court on this one. If they want to stamp out this type of scam,\u00a0<strong>they&#8217;re going to have to assess their review process for Chrome add-ons<\/strong>. In the meantime, take care when you&#8217;re downloading anything from the Chrome Web Store.<\/p>\n<p style=\"text-align: center\"><em>Follow me on Twitter:\u00a0<a class=\"ProfileHeaderCard-screennameLink u-linkComplex js-nav\" href=\"https:\/\/twitter.com\/PatrickDevaney_\"><span class=\"username u-dir\" dir=\"ltr\">@<b class=\"u-linkComplex-target\">PatrickDevaney_<\/b><\/span><\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Via: <a href=\"https:\/\/www.icebrg.io\/blog\/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses\" target=\"_blank\" rel=\"noopener noreferrer\">ICEBRG<\/a> and <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/01\/500000-chrome-users-fall-prey-to-malicious-extensions-in-google-web-store\/\" target=\"_blank\" rel=\"noopener noreferrer\">arstechnica<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Chrome is widely regarded as one of the most secure web browsers available today. If you add speed and reliability to Chrome\u2019s high-level security, you can see why it is the most popular browser. There is a chink in Chrome\u2019s armor, however, that has been exploited before and that has again seen hundreds of &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/malware-filled-chrome-extensions-have-been-downloaded-500000-times\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Malware-filled Chrome extensions have been downloaded 500K times&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9073,"featured_media":95111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-96584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/96584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9073"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=96584"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/96584\/revisions"}],"predecessor-version":[{"id":328346,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/96584\/revisions\/328346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/95111"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=96584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=96584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=96584"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=96584"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=96584"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=96584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}