Economy

Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs

Google is hosting dozens of extensions in its Chrome Web Store that perform suspicious actions on the more than 4 million devices that have installed it and that the developer has taken pains to carefully conceal.

The extensions, which so far number at least 35, use the same code patterns, connect to some of the same servers, and require the same list of sensitive systems permissions, including the ability to interact with web traffic on all URLs visited, access cookies, manage browser tabs, and execute scripts. In more detail, the permissions are:

Tabs: manage and interact with browser windows
Cookies: set and access stored browser cookies based on cookie or domain names (ex., “Authorization” or “all cookies for GitHub.com”)
WebRequest: intercept and modify web requests the browser makes
Storage: ability to store small amounts of information persistently in the browser (these extensions store their command & control configuration here)
Scripting: the ability to inject new JavaScript into web pages and manipulate the DOM
Alarms: an internal messaging service to trigger events. The extension uses this to trigger events like a cron job as it can allow for scheduling the heartbeat callbacks by the extension
<all_urls>: This works in tandem with other permissions like webRequest, but allows for the extension to be functionally interact all browsing activity (completely unnecessary for an extension that should just look at your installed extensions

These sorts of permissions give extensions the ability to do all sorts of potentially abusive things and, as such, should be judiciously granted only to trusted extensions that can’t perform core functions without them.

Read full article

Comments

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Close
Close