Skip to main content

Google Chrome Remove Extensions Believed to Be Loaded With Spyware

 Google Chrome is undoubtedly the most popular browser used by not millions but billions of individuals around the world. It is a very fast browser packed with interesting features. One can judge its popularity by the fact that users download and install it in their devices where Chrome is not provided as a default browser. Users freely added browser extensions to their Chrome having blind faith on its security features. These millions of individuals have received a rude jolt by a recent news report about a spyware ring associated with Google Chrome. Google Chrome support has reacted to the development and taken down many such extensions.


 ‘Awake Security’ researchers have busted a ring of hackers that created extensions for Google Chrome loaded with spyware. This organized crime was going on for a very long time with the ringmasters easily distributing spyware through distribution of seemingly innocuous browser extensions. No one knows for sure how much damage has been caused because of such spyware but the fact remains that the victims downloaded these Chrome extensions for more than 32 million times. After these researchers raise the red flag about these spyware loaded extensions last month, the search engine giant came into action. Google Chrome tech support has responded by taking down nearly 70 extensions from its Chrome web store. 

Researchers who found out about the malicious activities of these extensions said that nearly all such extensions were distributed free of cost by the hackers. They were apparently useful extensions for the users that pretended to be very safe by raising alarm whenever the user tried to visit a harmful website. However, once the extensions were downloaded and installed, they indulged in nefarious activities without the knowledge and permission of the users. These programs contained spyware to keep a close watch on the browsing history of the user. They also looked for private and sensitive details of the users stored inside the computer. What is surprising is the fact that these extensions were connected to a network of nearly 15000 websites and they could transmit sensitive details about the user. These malicious domains were purchased from Galcomm, a communication company backed by Israel. The company has denied any role in this spyware campaign. 

It is going to be an uphill task for Google Chrome to track down the identities of developers who made these extensions. This is because these extensions were submitted to Chrome Web store with fake identities. In any case, Google Chrome is no interested in unearthing the kingpin behind this spyware racket as its own reputation as a highly secure browser comes under fire. It is really embarrassing for Google Chrome because the company had claimed to have ramped up security way back in 2018.

Comments

Popular posts from this blog

Malwarebytes Slams Apple for the Poor Quality Patching Process

 Malwarebytes has emerged as one of the most popular antivirus systems around the world in recent times. This is when Malwarebytes does not fulfill the requirements to be labeled as fully-fledged antivirus. Recently, the company surprised everyone by complaining against Apple, one of the biggest tech companies in the world. In a blog post written by  Malwarebytes support , the company criticized the patching process of Apple saying it can have serious repercussions for the safety and security of the systems being used by the customers. Thomas Reid, Mac and mobile director in Malwarebytes, wrote a blog post that centers on a campaign called Watering Hole being run in Hong Kong. Watering Hole is actually a security threat that was aimed at the users of Mac OS who were directing people to a pro-democracy event supported by a political organization. TAG from Google first reported about Watering Hole some time ago. Hackers made use of two vulnerabilities in the Mac OS to launch th...

Malwarebytes Premium Support: Multiple Layers of Protection

 In times not so long ago, antivirus products were of a simple nature and they provided protection to the system against viruses of all kinds. In those days, viruses were easy to be detected. Today, there are multiple threats that take on different forms like ransomware, malware, rootkits, Trojans, and so on, making it difficult for any antivirus to identify and destroy all these threats. Malwarebytes Premium 4.0 carries out behavior based analysis in addition to providing other layers of protection to the user. Malwarebytes premium support  costs just $39.99 per annum and by paying $79.99, you can get this support on up to 5 of your devices. The dashboard tells you that your system is protected when everything is all right. It also tells you the details of the last scan. On the right side of the dashboard are the toggles that work as controls for 4 layered security provided by the program. If you click on the scan button on the middle panel, Malwarebytes Premium 4 begins a sc...

Vulnerability Issues Found in All Mcafee Antivirus Products

 McAfee antivirus is regarded as one of the most effective internet security suites and used by millions of individuals in their computers. However, researchers have found a security big in all editions of McAfee antivirus that can be used by hackers to harm the systems of the victims. The fact that no denial has come forward from  McAfee antivirus support  team confirms the serious nature of this security bug. Cyber security team of researchers at SafeBreah Labs shocked the world on Tuesday when it said that defense mechanisms of McAfee antivirus products can be bypassed by a security bug called CVE-2019-3648. Once the system’s security has been compromised, it becomes easy for hackers to carry out further attacks to take control of the system. Realizing the gravity of the situation, developers at McAfee swung into action and released a patch to fix this security bug. This security flaw was brought to the notice of researchers at McAfee in August 2019. It was clear that...