technology technology

technology technology


Your web browser is an ecosystem of its own. It stores your passwords, search history, financial details like credit card numbers, addresses and more. Just like how malicious apps and services can compromise data on your phone or PC, malicious extensions can expose the data stored in your browser. 

There are a ton of extensions out there that do more harm than good. In fact, security researchers have just found a dangerous new campaign that is going after browser extensions. So far, around 36 extensions have been compromised, putting over 2.6 million Chrome users at risk of having their browsing data and account credentials exposed.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Hacked Chrome extensions put 2.6 million users at risk of data leak

A person using a Chrome browser extension (Kurt “CyberGuy” Knutsson)

How hackers are targeting browser extensions

Hackers are exploiting browser extensions as a gateway to steal sensitive user data through a variety of methods. These compromised extensions are exposing over 2.6 million users to data exposure and credential theft, as reported by The Hacker News. 

One common attack involves phishing campaigns targeting the publishers of legitimate extensions on platforms like the Chrome Web Store. In these campaigns, attackers trick developers into granting permissions to malicious applications, which then insert harmful code into popular extensions. This code can steal cookies, access tokens and other user data.

The first company to shed light on the campaign was cybersecurity firm Cyberhaven, one of whose employees were targeted by a phishing attack on December 24, allowing the threat actors to publish a malicious version of the extension.

Once these malicious extensions are published and pass the Chrome Web Store’s security review, they are made available to millions of users, putting them at risk of data theft. Attackers can use these extensions to exfiltrate browsing data, monitor user activity and even bypass security measures such as two-factor authentication.

In some cases, developers themselves may unknowingly include data-gathering code as part of a monetization software development kit, which stealthily exfiltrates detailed browsing data. This makes it difficult to determine whether a compromise is the result of a hacking campaign or an intentional inclusion by the developer.

Hacked Chrome extensions put 2.6 million users at risk of data leak

Image of a Chrome browser on a cellphone (Kurt “CyberGuy” Knutsson)

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Remove these extensions from your web browser

The browser extension security platform Secure Annex has launched its own investigation into this hacking campaign. So far, it has uncovered over twenty additional compromised extensions, which are listed below. If you have any of the compromised extensions listed in Secure Annex’s investigation installed on your browser, it’s essential to remove them immediately to protect your data.

  1. AI Assistant – ChatGPT and Gemini for Chrome
  2. Bard AI Chat Extension
  3. GPT 4 Summary with OpenAI
  4. Search Copilot AI Assistant for Chrome
  5. TinaMInd AI Assistant
  6. Wayin AI
  7. VPNCity
  8. Internxt VPN
  9. Vindoz Flex Video Recorder
  10. VidHelper Video Downloader
  11. Bookmark Favicon Changer
  12. Castorus
  13. Uvoice
  14. Reader Mode
  15. Parrot Talks
  16. Primus
  17. Tackker – online keylogger tool
  18. AI Shop Buddy
  19. Sort by Oldest
  20. Rewards Search Automator
  21. ChatGPT Assistant – Smart Search
  22. Keyboard History Recorder
  23. Email Hunter
  24. Visual Effects for Google Meet
  25. Earny – Up to 20% Cash Back
  26. Cyberhaven security extension V3
  27. GraphQL Network Inspector
  28. Vidnoz Flex – Video recorder & Video share
  29. YesCaptcha assistant
  30. Proxy SwitchyOmega (V3)
  31. ChatGPT App
  32. Web Mirror
  33. Hi AI

Keeping these extensions installed is a serious risk since hackers can still access your data even if the malicious version has been taken down from the Chrome Web Store. Secure Annex is still investigating and has shared a public Google Sheet with details about the malicious extensions it has found so far, like whether they’ve been updated or removed. They’re also adding new extensions to the list as they discover them.

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

How to remove an extension from Google Chrome

If you have installed one of the above-mentioned extensions on your browser, remove it as soon as possible. To remove an extension from Google Chrome, follow these steps:

  • Open Chrome and click the icon that looks like a piece of a puzzle. You’ll find it in the top-right corner of the browser.
  • You can see all the active extensions now. Click the three dots icon next to the extension you want to remove and select Remove from Chrome.
  • Click Remove to confirm
Hacked Chrome extensions put 2.6 million users at risk of data leak

Steps to remove an extension from Google Chrome (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS

7 ways to stay safe from malicious software

1) Verify emails and links before clicking: Many attacks begin with phishing emails that impersonate trusted entities like Google Chrome Web Store Developer Support. These emails often create a false sense of urgency, urging you to click on malicious links. Always verify the sender’s email address and avoid clicking on links without double-checking their authenticity. When in doubt, go directly to the official website rather than using a provided link.

2) Use strong antivirus software: Having strong antivirus software is an essential line of defense against malicious software. These tools can detect and block malicious code, even if it has been embedded in browser extensions. The best way to safeguard yourself from malicious links that install strong malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Limit extension permissions: Be cautious about the permissions you grant to browser extensions. Many require access to sensitive data like browsing history, cookies or account information, but not all requests are necessary. Review what each extension asks for and deny permissions that seem excessive. If possible, opt for extensions with limited access to ensure your data remains protected.

4) Limit the number of extensions: Only install extensions that are genuinely needed and regularly review and uninstall those no longer in use.

5) Keep your browser updated: Always update your browser to the latest version. Updates often include critical security patches that protect against vulnerabilities exploited by malicious software. Using an outdated browser increases the risk of being targeted by attacks that could have been prevented with a simple update. Enable automatic updates to ensure you’re always protected. If you are unsure how to update your browser, check out my detailed guide for Google Chrome.

6) Regularly audit your extensions: Conduct periodic reviews of installed extensions and remove any that are unnecessary or pose potential security risks.

7) Report suspicious extensions: If you encounter a suspicious extension, report it to the official browser extension marketplace.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaway

Hackers are getting smarter, and browser extensions have become a new favorite target for stealing sensitive data. The discovery of over 35 compromised Chrome extensions, putting 2.6 million users at risk, is a wake-up call for everyone. Removing suspicious extensions is an essential step to protect your data. This also puts Google’s Chrome Web Store review process under scrutiny, proving that even trusted platforms can be exploited. 

How often do you review and remove unused or suspicious browser extensions? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Add comment

Categories

0219a4e0-1ca3-52c9-a503-50763f233af7 1 035363ed-b098-5de5-a223-f3a5d32dc035 1 0586f978-27d1-50a3-a6f9-b5622233596c 1 1262d853-829e-532c-986c-d8e8512583b5 1 15ad1585-a6fb-5d85-93bd-95945671fcd6 1 1af06e34-5799-528d-b431-9a999532d3ef 1 1d6da571-5203-5046-bdd7-09136f7d4028 1 29600f07-55aa-5fd1-8cc8-820e594d9044 1 35c40733-e901-59ed-8365-827cc66201dc 1 3644a004-6db7-5c67-94ec-1c774c356ce9 1 37adbb61-469d-5ac9-8972-c54be5420deb 1 37cb5ed3-b6dd-5635-98c7-24201b1523e4 1 37cca5fc-a00e-5af6-8407-d2f372679799 1 4c9a0e87-ae9e-5308-ab60-d024674f9b91 1 518dc926-eb88-56a8-9393-c0636e44930a 1 52292919-6bb1-5171-a6fe-77d9bc949cec 1 5271a8ac-ee78-5644-a814-b93e2702e697 1 54896d56-5758-505c-be6a-287a0a1c7f78 1 599b0251-5f3c-52f0-96ac-282885dc20cb 1 5b1f2b8b-1924-585b-86fb-0f5083a389bb 1 5e2d9a78-3fa2-534a-a902-cd6e710a9e0e 1 68f20594-f140-50bb-8e40-33e23f460649 1 6b13cd90-ed63-544d-8eb9-3179faff7d50 1 6d779721-8480-5f9f-b208-5e3c98fefa80 1 71886128-cfe4-50b9-811f-a390e466be1e 1 76e4ca57-e726-57e6-9afe-09f66892a8b2 1 7e07d9a3-6ce1-50ee-8019-e7e93b435ae7 1 80ea51f9-2ffc-5e63-b716-08060ed838e6 1 8523635f-96e4-5ad7-a12b-b315143868ac 1 8d1c184c-e8a8-5919-908a-c2e612a0ee69 1 8f569b60-71cd-5d67-b6cf-b67855498d1c 1 93348cb4-d286-5486-94a3-ce95ddc06653 1 97e06c80-2bed-5abb-90e0-49ddbc4d1f26 1 a128d530-bdba-5f6d-8d28-b0f2f20d185d 1 a1757f75-76f7-5484-86e2-2f9e4bfe7c82 1 a328a851-ea6a-5e26-be2e-5f4f1c31658d 1 a5450a08-1023-57a6-a675-fdc194dc9d60 1 Acquisitions and Divestitures 2 ad6916f5-c01d-5410-a835-82709c5d7727 1 Advertising and Marketing 1 af83f998-47c6-5db8-afae-380980658cbd 1 Alternative and Renewable Energy 1 Altman 1 Amazon Labor Union 1 Amazon.com Inc 5 Amit P 2 Amodei 1 Andreessen Horowitz 1 Android (Operating System) 3 Anthropic AI LLC 2 Antibiotics 1 Antitrust Laws and Competition Issues 2 Appeals Courts (US) 1 Apple Inc 1 Appointments and Executive Changes 2 Art 1 article 51 Artificial Intelligence 16 Austin (Tex) 1 Australia 1 Automobile Renting and Leasing 1 Automobiles 4 Axiom Space Inc 1 b00f7177-73de-5bd5-85d0-3ba420dabf58 1 b96cd921-9021-5ff0-901d-6399f97f087e 1 Baker 1 Banking and Financial Institutions 1 Barnaby J 1 Beijing Bytedance Technology Co Ltd 1 Bezos 5 Biden 1 Bill 1 Bitzer 1 BlackRock Inc 1 Blue Origin 2 Bluesky (Social Network) 1 Books and Literature 1 Brendan Thomas (1979- ) 1 Brett 1 Brooklyn (NYC) 1 Brooklyn Academy of Music 1 Business 2 c4ff002e-1bb5-5430-bd7c-877e76e83142 1 Cameras 1 Carbon 1 Carr 1 Censorship 2 Charlie 1 ChatGPT 3 Child Abuse and Neglect 2 Child Pornography 1 Children and Childhood 1 China 6 Chrome (Browser) 2 Chrome (Operating System) 1 Chunghwa Telecom Co 1 Clegg 1 Clergy 1 Clinton 1 College Station (Tex) 1 Colleges and Universities 1 Columbia River (Pacific Northwest) 1 Commerce Department 1 Computer Chips 2 Computer Monitors 1 Computer Security 2 Computers and the Internet 32 Conservatism (US Politics) 3 Conservative Party (Great Britain) 1 Conspiracy Theories 1 Consumer Protection 1 Content Type: Service 1 Corporate Social Responsibility 2 Corporations 2 Cosmetics and Toiletries 1 Creativity 1 Crime and Criminals 1 Crowdsourcing (Internet) 1 CrowdTangle Inc 1 Cuba 1 Customer Relations 1 Cyberattacks and Hackers 1 Cyberwarfare and Defense 2 d82e36d0-86aa-5988-a24e-40cd16430e07 1 d9870aaa-4982-52f0-b487-e0d3392fc72b 1 Da Costa 1 DaimlerChrysler AG 1 Dana (1969- ) 1 Daniela 1 Dario 1 Data Centers 1 Data-Mining and Database Marketing 1 Databricks Inc 1 David 1 David (1962- ) 1 David O 1 Deaths (Obituaries) 1 Decisions and Verdicts 1 Deductions and Exemptions 1 DeepMind Technologies Ltd 1 Delivery Services 2 Demis 1 Democratic Party 1 df4bf239-cb8e-50c3-a1cd-fdb5b80d0463 1 Dinkins 1 Documentary Films and Programs 1 Donald (1934-2024) 1 Donald J 12 Driverless and Semiautonomous Vehicles 2 Drones (Pilotless Planes) 2 Durov 1 E-Commerce 2 e4724a7e-a9f7-5ad1-abf9-7c46688b43a7 1 e5c52334-1ec2-53f3-8c24-0592c889f09e 1 e7df724f-84bc-59a6-8e8f-edbd8088a678 1 e91cc9dc-c295-501b-9040-d68d52ce3fc9 1 e922cf52-cded-5e45-aff8-12d800bcdd57 1 Elections 1 Electric and Hybrid Vehicles 3 Electric Light and Power 2 Elkann 1 Elon 9 Embargoes and Sanctions 1 Emmanuel (1977- ) 1 Energy and Power 1 Energy Department 1 Environmental Protection Agency 1 Espionage and Intelligence Services 1 Europe 1 European Union 1 Executives and Management (Theory) 1 f2704ac4-2580-5cb2-885d-b8ff4ec66c17 1 Facebook Inc 8 facevalue 1 Factories and Manufacturing 1 Farage 1 Feder 1 Federal Aid (US) 1 Federal Communications Commission 1 Federal Trade Commission 1 Fees and Rates) 2 Fiat Chrysler Automobiles NV 1 Fidelity Investments 1 Fielding 1 Firefly Aerospace 1 First Amendment (US Constitution) 1 Fla) 1 fnc 51 Foreign Workers 2 Fox News 51 fox-news/auto 1 fox-news/auto/attributes/electric 1 fox-news/auto/attributes/innovations 1 fox-news/columns/artificial-intelligence-newsletter 4 fox-news/columns/how-to-tech 3 fox-news/crime 6 fox-news/food-drink 1 fox-news/lifestyle 5 fox-news/politics 1 fox-news/politics/executive/homeland-security 3 fox-news/politics/finance 1 fox-news/science 1 fox-news/science/air-and-space 1 fox-news/science/air-and-space/mars 1 fox-news/science/air-and-space/nasa 1 fox-news/sports 1 fox-news/tech 51 fox-news/tech/artificial-intelligence 11 fox-news/tech/companies/apple 10 fox-news/tech/companies/google 10 fox-news/tech/companies/instagram 1 fox-news/tech/companies/microsoft 2 fox-news/tech/companies/samsung 2 fox-news/tech/technologies 1 fox-news/tech/technologies/android 6 fox-news/tech/technologies/apps 3 fox-news/tech/technologies/cellular 4 fox-news/tech/technologies/email 2 fox-news/tech/technologies/ipad 2 fox-news/tech/technologies/iphone 10 fox-news/tech/technologies/laptops 1 fox-news/tech/technologies/mac 2 fox-news/tech/technologies/robots 2 fox-news/tech/technologies/smartphones 6 fox-news/tech/technologies/tvs 1 fox-news/tech/technologies/websites 1 fox-news/tech/technologies/wifi 3 fox-news/tech/technologies/windows-os 1 fox-news/tech/topics/computers 6 fox-news/tech/topics/cybercrime 21 fox-news/tech/topics/fbi 1 fox-news/tech/topics/hackers 5 fox-news/tech/topics/innovation 9 fox-news/tech/topics/privacy 15 fox-news/tech/topics/security 31 fox-news/topic/mexican-cartel-violence 1 fox-news/travel 3 fox-news/travel/general/travel-safety 1 fox-news/us 7 fox-news/us/crime 2 fox-news/us/crime/police-and-law-enforcement 1 fox-news/us/personal-freedoms/privacy 13 fox-news/us/terror 1 fox-news/world/disasters/transportation 2 fox-news/world/global-economy/banking 1 fox-news/world/world-regions/china 1 France 2 Freedom of Speech and Expression 3 Fringe Groups and Movements 1 gaming 2 Gangs 1 General Motors 1 Germany 2 Global Warming 1 Godfrey 1 Google Inc 4 Google Street View 1 Great Britain 1 Great Britain Withdrawal from EU (Brexit) 1 Greenhouse Gas Emissions 1 Haley 1 hardware 1 Harris 1 Harvard University 1 Hassabis 1 Honda Motor Co Ltd 1 Hopkins 1 Huang 1 Hungary 1 Hydroelectric Power 1 Illegal Immigration 1 Immigration and Emigration 2 Inflation Reduction Act of 2022 1 Initial Public Offerings 1 Innovation 2 Instagram Inc 3 Instant Messaging 1 International Brotherhood of Electrical Workers 1 International Brotherhood of Teamsters 1 International Relations 1 International Trade and World Market 2 Intuitive Machines LLC 1 iPhone 1 ispace Inc 1 Italy 1 Japan 1 Jeffrey P 5 Jen-Hsun 1 Jessica 1 Joel D 1 John 1 Joseph R Jr 1 Justice Department 1 Kamala D 1 Kaplan 1 Karen Brooks 1 Keir 1 Kidnapping and Hostages 1 Kuiper Systems (Amazon.com Inc) 1 La 1 Labor and Jobs 4 Labour Party (Great Britain) 1 Large Synoptic Survey Telescope 1 Las Vegas (Nev) 1 Laura 1 Law and Legislation 2 Layoffs and Job Reductions 1 Loomer 1 Louisiana State University 1 Macron 1 Mar-a-Lago (Palm Beach 1 Marc (Artist) 1 Maritime Accidents and Safety 1 Mark E 7 Massachusetts Institute of Technology 1 Mathematics 2 Mehta 2 Melania 1 Mergers 2 Meta Platforms Inc 9 Microsoft Corp 2 Missing Persons 1 Mixed Martial Arts 1 Mobile Applications 4 Monkeys and Apes 1 Moon 1 Movies 1 Musk 9 National Aeronautics and Space Administration 1 National Health Service 1 Natural Gas 1 Neo Nazi Groups 1 Net Neutrality 1 New Orleans 1 New Orleans (La) 1 New Year 1 New Year's Day Attack (2025) 1 News and News Media 4 Newspapers 1 Nick 1 Nigel (1964- ) 1 Nikki R 1 Nissan Motor Co 1 Nonprofit Organizations 1 North Carolina State University 1 NVIDIA Corporation 2 NY) 1 Office of Foreign Assets Control (United States Treasury) 1 Oil (Petroleum) and Gasoline 1 OnStar Corp 1 OpenAI Labs 4 Organized Labor 2 Ozzie 1 Parenting 1 Pavel Valeryevich (1984- ) 1 People's Liberation Army (China) 1 Phoenix (Ariz) 1 Photography 2 Podcasts 1 Politics and Government 3 Polls and Public Opinion 1 Presidential Election of 2024 10 Presidential Transition (US) 2 Prices (Fares 2 Privacy 1 Private Spaceflight 2 Propaganda 1 Proteins 1 Ramaswamy 1 Ratner 1 Ray 1 Reform UK (British Political Party) 1 Reggio 1 Regulation and Deregulation of Industry 5 RelayRides 1 Religion and Belief 1 Research 4 Right-Wing Extremism and Alt-Right 1 Roads and Traffic 1 Robinson 1 Rocket Science and Propulsion 1 Rosenworcel 1 Rubin 1 Rumors and Misinformation 4 Sacks 1 Samuel H 1 Science and Technology 5 Search Engines 2 Sequoia Capital 1 Sex Crimes 2 Sexual Harassment 1 Shakespeare 1 Ships and Shipping 1 Shutdowns (Institutional) 1 Sierra Space Corp 1 Silicon Valley (Calif) 1 Skin 1 Skin care 1 Smartphones 1 Social Media 14 Solar Energy 1 Songhurst 1 Space and Astronomy 3 Space Exploration Technologies Corp 1 Spain 1 Sports Utility Vehicles and Light Trucks 1 Starmer 1 Start-ups 5 Staten Island (NYC) 1 Stellantis NV 1 Stephanie (Artist) 1 Steven (1961- ) 1 Stocks and Bonds 3 Strikes 1 Supercomputers 1 Supreme Court (US) 1 Tablet Computers 1 Taiwan 1 Tax Credits 1 Telegram LLC 2 Telephones and Telecommunications 2 Telescopes and Observatories 1 Terrorism 1 Tesla Motors Inc 1 The 1 Threads (Mobile App) 2 Thrive Capital 1 TikTok (ByteDance) 2 Times Square and 42nd Street (Manhattan 1 Tommy (1982- ) 1 Traffic Accidents and Safety 1 Treasury Department 2 Trump 12 Turo Inc 1 Two Thousand Twenty Five 1 Typewriters and Typewriting 1 Ultimate Fighting Championship 1 Uncategorized 34 United States 4 United States International Relations 3 United States Politics and Government 9 University of Illinois 1 University of Sydney 1 Venture Capital 3 Vera (1928-2016) 1 Virtual Currency 1 Visas 2 Vivek (1985- ) 1 Voter Fraud (Election Fraud) 1 Voting Machines 1 Voyager Project 2 Warehouses 1 Washington Post 1 WhatsApp Inc 1 White 1 William 1 Wind Power 1 Wirecutter 1 Writing and Writers 1 X (Formerly Twitter) 4 X.ai Inc 1 your-feed-science 2 YouTube.com 1 Zuckerberg 7

Sign Up to receive the latest Updates and News

© 2024 Listivo - Listing Directory WordPress Theme. All rights reserved.