Skip to main content

Google Chrome Remove Extensions Believed to Be Loaded With Spyware

 Google Chrome is undoubtedly the most popular browser used by not millions but billions of individuals around the world. It is a very fast browser packed with interesting features. One can judge its popularity by the fact that users download and install it in their devices where Chrome is not provided as a default browser. Users freely added browser extensions to their Chrome having blind faith on its security features. These millions of individuals have received a rude jolt by a recent news report about a spyware ring associated with Google Chrome. Google Chrome support has reacted to the development and taken down many such extensions.


 ‘Awake Security’ researchers have busted a ring of hackers that created extensions for Google Chrome loaded with spyware. This organized crime was going on for a very long time with the ringmasters easily distributing spyware through distribution of seemingly innocuous browser extensions. No one knows for sure how much damage has been caused because of such spyware but the fact remains that the victims downloaded these Chrome extensions for more than 32 million times. After these researchers raise the red flag about these spyware loaded extensions last month, the search engine giant came into action. Google Chrome tech support has responded by taking down nearly 70 extensions from its Chrome web store. 

Researchers who found out about the malicious activities of these extensions said that nearly all such extensions were distributed free of cost by the hackers. They were apparently useful extensions for the users that pretended to be very safe by raising alarm whenever the user tried to visit a harmful website. However, once the extensions were downloaded and installed, they indulged in nefarious activities without the knowledge and permission of the users. These programs contained spyware to keep a close watch on the browsing history of the user. They also looked for private and sensitive details of the users stored inside the computer. What is surprising is the fact that these extensions were connected to a network of nearly 15000 websites and they could transmit sensitive details about the user. These malicious domains were purchased from Galcomm, a communication company backed by Israel. The company has denied any role in this spyware campaign. 

It is going to be an uphill task for Google Chrome to track down the identities of developers who made these extensions. This is because these extensions were submitted to Chrome Web store with fake identities. In any case, Google Chrome is no interested in unearthing the kingpin behind this spyware racket as its own reputation as a highly secure browser comes under fire. It is really embarrassing for Google Chrome because the company had claimed to have ramped up security way back in 2018.

Comments

Popular posts from this blog

Malwarebytes Slams Apple for the Poor Quality Patching Process

 Malwarebytes has emerged as one of the most popular antivirus systems around the world in recent times. This is when Malwarebytes does not fulfill the requirements to be labeled as fully-fledged antivirus. Recently, the company surprised everyone by complaining against Apple, one of the biggest tech companies in the world. In a blog post written by  Malwarebytes support , the company criticized the patching process of Apple saying it can have serious repercussions for the safety and security of the systems being used by the customers. Thomas Reid, Mac and mobile director in Malwarebytes, wrote a blog post that centers on a campaign called Watering Hole being run in Hong Kong. Watering Hole is actually a security threat that was aimed at the users of Mac OS who were directing people to a pro-democracy event supported by a political organization. TAG from Google first reported about Watering Hole some time ago. Hackers made use of two vulnerabilities in the Mac OS to launch th...

Netflix to Go Tough on Password Sharing

A lot of Netflix consumers have reported receiving a message from the company on their screens saying they need their own account to continue watching Netflix if they do not live with the account owner. The company was getting information that more than 20% of its consumers were sharing their account passwords with friends to allow them to watch Netflix illegally. Realizing this practice cost Netflix a massive amount of money,  Netflix support  has decided to go tough on this habit of password sharing by its customers. A spokesperson of Netflix confirmed sending such messages to customers when talking with the BBC. He added that the basic aim of the company behind sending these messages is to make sure that only authorized customers are using their accounts. The spokesperson also said that this message was not being sent to all the customers and a decision in this regard will be taken soon by the company. The problem of password sharing stems from the fact that streaming compa...

Vulnerability Issues Found in All Mcafee Antivirus Products

 McAfee antivirus is regarded as one of the most effective internet security suites and used by millions of individuals in their computers. However, researchers have found a security big in all editions of McAfee antivirus that can be used by hackers to harm the systems of the victims. The fact that no denial has come forward from  McAfee antivirus support  team confirms the serious nature of this security bug. Cyber security team of researchers at SafeBreah Labs shocked the world on Tuesday when it said that defense mechanisms of McAfee antivirus products can be bypassed by a security bug called CVE-2019-3648. Once the system’s security has been compromised, it becomes easy for hackers to carry out further attacks to take control of the system. Realizing the gravity of the situation, developers at McAfee swung into action and released a patch to fix this security bug. This security flaw was brought to the notice of researchers at McAfee in August 2019. It was clear that...