These five Google Chrome extensions are stealing your data

Google Chrome offers support for hundreds of extensions that make web browsing safer and more productive. Image

If you have installed them, it is recommended to uninstall them immediately

Although Google scans these extensions for security before making them available in its web browser, some malicious extensions that have the potential to steal user data or interfere with user privacy manage to slip through the company’s strict security from time to time. In a more recent incident, reports detailed new malicious Chrome extensions that managed to bypass Google’s protections to steal user data. Cyber ​​security firm McAfee has discovered a total of five malicious extensions for Google Chrome that have a total install base of over 1,400,000 and are stealing data from their users. The report says that while these extensions offer various features such as allowing users to watch Netflix shows together, website coupons, and taking screenshots of a website, they also track a user’s browsing activity.

“Every website visited is sent to servers owned by the extension’s creator. They do this so they can insert the code into the eCommerce websites they visit. This action modifies the site’s cookies so that extension authors receive an affiliate payment for all items purchased,” McAfee wrote in his blog post.

These 5 malicious extensions are:

— Netflix Party which has collected 800,000 downloads so far.

— Netflix Party 2 which has collected 300,000 downloads so far.

— FlipShope which has collected 80,000 downloads so far.

— Full Page Screenshot Capture which now has 200,000 downloads.

— AutoBuy Flash Sales which has collected 20,000 downloads so far.

The cybersecurity firm also said that while the malware in these Google Chrome extensions disguised its presence by offering the promised functionality, some of the extensions in question used a mechanism that would prevent them from being identified in automated analysis environments. “We discovered an interesting trick in several extensions that would prevent malicious activity from being identified in automated analysis environments. They contained a time check before performing any malicious activity. This is done by checking if the current date is > 15 days from the time of installation,” the company added. It is recommended that Google Chrome users who have installed these extensions should uninstall them immediately.

Source: Bgr

Source: PC Press by

*The article has been translated based on the content of PC Press by If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!