• About
  • Privacy & Policy
  • Contact
TechGuide
  • Home
  • News
  • Computers
  • Applications
  • Security
No Result
View All Result
  • Home
  • News
  • Computers
  • Applications
  • Security
No Result
View All Result
Technology Guide
No Result
View All Result

Malicious Chrome extensions with 1 million downloads can hijack your browser — delete these now

admin by admin
Home Security
Share on FacebookShare on Twitter

Just like when adding new apps to your smartphone, you need to be careful when adding the best Google Chrome extensions to your browser. Malicious extensions can be used for ad fraud or even to infect your PC or Mac with malware.

As reported by BleepingComputer(opens in new tab), a new malvertising or malicious advertising campaign has been discovered by the cybersecurity firm Guardio Labs that uses Chrome extensions to hijack web searches and add affiliate links to any sites you visit.

This malvertising campaign has been dubbed “Dormant Colors” by the firm’s security researchers due to the fact that all of the malicious extensions in question offer color customization options for Chrome. However, the extensions themselves don’t include malicious code when installed, which is how they were able to bypass Google’s security checks and end up on the Chrome Web Store in the first place.

Dormant Colors Chrome extensions

Following its investigation into the matter, Guardio found 30 different versions of these malicious browser extensions on both the Chrome and Edge web stores with more than a million installs combined. As we mentioned before, they have been removed from both web stores but here is the full list just in case:

  • Action Colors
  • Power Colors
  • Nino Colors
  • More Styles
  • Super Colors
  • Mix Colors
  • Mega Colors
  • Get colors
  • What color
  • Single Color
  • Colors scale
  • Style flex
  • Background Colors
  • More styles
  • Change Color
  • Dood Colors
  • Refresh color
  • Imginfo
  • WebPage Colors
  • Hex colors
  • Soft view
  • Border colors
  • Colors mode
  • Xer Colors

How to manually remove Chrome extensions

While all of the malicious extensions listed below have since been removed, you may need to manually remove them from Chrome by clicking on the three dots menu at the top right of your browser. From here, click More and then head to More tools > Extensions. Here you’ll be able to disable the extensions and if you run into any problems, this support document(opens in new tab) can guide you through the entire process.

Hijacking your browser to earn revenue from clicks

In order to trick unsuspecting users into downloading their malicious extensions, the cybercriminals behind this campaign use advertisements or redirects when you visit sites that play videos or offer downloads.

When you try to watch a video or download the program at these sites, you are redirected to another site that says you must add an extension to continue. If you click either ‘OK’ or the ‘Continue’ button, you are prompted to install a color-changing extension that looks harmless at first glance.

Once installed though, these extensions redirect users to pages that side-load malicious scripts that show the extensions how to perform search hijacking but they also tell the extension which sites affiliate links can be inserted on. This generates ad revenue for the creator of these malicious extensions but your search data is also sold for profit.

These Dormant Colors extensions also have a list of 10,000 sites that can be used to automatically redirect users to the same page but with affiliate links added to their URLs. Any purchase made on one of these sites will generate a commission for the extensions’ developers.

In a blog post(opens in new tab) explaining its findings, Guardio provided further insight on the potential of this malicious extension campaign to expand further, saying:

“This campaign is still up and running, shifting domains, generating new extensions, and re-inventing more color and style-changing functions you can for sure manage without. Adding to that, the code injection technique analyzed here is a vast infrastructure for mitigation and evasion and allows leveraging the campaign to even more malicious activities in the future.”

admin

admin

Next Post
Best Wordle start words to help you keep your streak

Best Wordle start words to help you keep your streak

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Create Your Own Shipping Solution

ShipEngine - Shipping Solved

Recommended.

How to add music to an Instagram story

How to add music to an Instagram story

Google Pixel Tablet is coming — everything we know so far

Google Pixel Tablet is coming — everything we know so far

Trending.

No Content Available
Technology Guide

Tech Product Reviews, Top Picks and How To

Category

  • Applications
  • Computers
  • News
  • Security

Site Navigation

  • About
  • Privacy & Policy
  • Contact

Recent News

LastPass had its source code stolen by hackers – this is why your passwords are still safe

LastPass had its source code stolen by hackers – this is why your passwords are still safe

Gmail just got a big redesign — here’s how to activate it now

Gmail just got a big redesign — here’s how to activate it now

  • About
  • Privacy & Policy
  • Contact

© 2022 Technology Guide

No Result
View All Result
  • Home
  • Applications
  • Computers
  • Security

© 2022 Technology Guide