In a recent move, Google has taken down 32 malicious extensions from the Chrome Web Store, amounting to a staggering 75 million downloads. These extensions had the ability to manipulate search results and flood users with spam or unwanted advertisements.
As reported by BleepingComputer, these extensions cleverly disguised their true intentions by incorporating legitimate functionality while executing their malicious behavior through obfuscated code. This allowed them to operate undetected by unsuspecting users. Want to know about Google Chrome’s revolutionary passwordless login method? Read more here.
During an analysis of the PDF Toolbox extension, which had been downloaded 2 million times, cybersecurity researcher Wladimir Palant discovered code camouflaged as a legitimate API wrapper. This code enabled the domain “serasearchtop[.]com” to inject arbitrary JavaScript code into any website visited by the user. The potential abuses of this capability range from injecting intrusive advertisements into webpages to stealing sensitive information. Google has also made enhancements to Chrome’s page zoom feature, prioritizing a more user-accessible mobile web experience.
However, the researcher did not observe any malicious activity, leaving the true purpose of the code undisclosed. It is worth noting that the code was programmed to activate 24 hours after the extension’s installation, a common trait associated with malicious intent.
In parallel, Google successfully thwarted the notorious CryptBot malware, which has been responsible for stealing data from hundreds of thousands of Chrome browser users over the past year. CryptBot belongs to the category of “infostealer” malware, designed specifically to identify and pilfer sensitive information such as authentication credentials, social media logins, cryptocurrency wallets, and more.
Google’s swift action in removing these malicious extensions and blocking CryptBot reinforces their commitment to user security and privacy. Stay informed and safeguard your digital presence from such threats.
Note: The information provided here is based on recent findings and aims to keep you informed about the evolving cybersecurity landscape.