The browser accessories follow user activity online

Photo of author

By [email protected]


newYou can now listen to Fox News!

Every day, millions of people Install the additional functions of the small browser They believe that it will improve productivity or entertainment. With many options available on the Chrome Web Store store, users often depend on signs of confidence such as evaluation, user reviews and developers reputation to take their choice. Many views of glossy verification badges and five -star classifications assume that the examination process was solid, and click “Install” without thinking twice.

But the attackers began to take advantage of these signs. Researchers recently revealed a campaign where 18 extensions were tracked, all listed in Chrome and Edge Web stores, online activity for users. These extensions had already achieved more than 2 million installation.

Subscribe to the free Cyberguy report
Get my best technical advice, urgent safety alerts, and exclusive deals that are connected directly to your inbox. In addition, you will get immediate access to the ultimate survival guide – for free when joining my country Cyberguy.com/newsledter

A person uses Google on a laptop (kurt "Cyberguy" Knutson)

A person uses Google on a laptop. (Cyberguy “Knutsson)

How infiltrators hide harmful programs in common chrome accessories

KOI security researchers have discovered that the attackers used long -term strategic tactics to arm the browser accessories. First, issue functional and legitimate assistance tools to obtain user confidence. Over time, these extensions collected positive reviews and made a strong reputation. Then, after months or even years of calm operation, the attackers prompted a silent update injecting harmful textual programs at the reliable blade base.

Since these updates came directly from the official sources, they easily exceeded the walls of the companies. Unlike deceptive emails or shaded downloads, the harmful symbol has arrived through routine and mechanical updates and no immediate red signs were raised.

How to evade malignant chrome accessories from detection and spread

With the progress of the investigation, the researchers Track suspicious traffic Return to an apparently harmful colors. This has led to a group of connected areas, each of which serves as a command and control center. These servers registered both URL users visited and issued orders to force to redirect fake web sites or heavily intended pages.

After that, the team analyzed the extension code closely and revealed the fingerprints matching in many unrelated tools. These needs included weather, emoji keyboards, video speed controls, and sound reinforcements. Although it appeared different on the surface, it shared the code and basic behavior.

How to transfer 432 robots a historic building 7500 tons

Together, these extensions reached more than two million facilities. To avoid detection, attackers used brands and separate categories for each one, making it difficult for market screens to determine patterns. The most important thing is that many extensions have a verified badge, which shows how attackers treated with automatic review systems using malignant version updates.

A person uses Google on a laptop. (Court "Cyberguy" Knutson)

A person uses Google on a laptop. (Cyberguy “Knutsson)

A complete list of chrome accessories and dangerous edge to uninstall now

The first priority for affected users is the immediate removal of the listed additions, followed by a comprehensive cache and a full system scanning. Check your computer to see if you have any of these harmful extensions, and if you do, get rid of them.

  • The keyboard keyboard online (chrome)
  • Free weather forecast (chrome)
  • Discord (Chrome)
  • Dark topic (Chrome)
  • Max size (Chrome)
  • Cancel a tiktok (chrome) ban
  • Open YouTube VPN (Chrome)
  • Geco ColorPick (Chrome)
  • Weather (chrome)
  • Chrome Video Player
  • Open tiktok (edge)
  • Sound Patch (Edge)
  • Web sound equation (edge)
  • The value of the head (edge)
  • Flash Player (Edge)
  • YouTube is not banned (edge)
  • Searchgpt (Edge)
  • Discord (Edge)

Immediate actions that you must take

If you have any extensions associated with the installed Reddirection campaign, take these steps immediately Protect your data and devices:

  • Remove all the affected extensions immediately From both chrome and edge browsers.
  • Wipe your browser data To eliminate stored tracking identifiers.
  • Run a malicious inspection in the full system Using a good reputable virus to detect any additional threats.
  • Monitor your online account closingy for any unusual or suspicious activity, especially if you have reached sensitive sites while the extensions were active.
  • See all your installed accessories For any suspicious behavior or unknown origins, remove anything you do not recognize or trust.
Someone writes on a laptop. (Court "Cyberguy" Knutson)

Someone writes on a laptop. (Cyberguy “Knutsson)

6 ways you can protect yourself from malicious extensions

1) Check your accounts about the unusual activity: If you reach sensitive sites (such as online banking services) while the extension is active, see those accounts of suspicious behavior and change your passwords immediately. Think of using the password manager, which is safely stored and creates complex passwords, which reduces the risk of reusing the password.

What is artificial intelligence (AI)?

Check the best password managers reviewed by experts in 2025 in Cyberguy.com/passwords

2) Empowerment of bilateral approval (2FA): Add an additional layer of safety to your accounts by running 2FA wherever it is supported. It can prevent unauthorized access even if your password is penetrated.

3) Using a strong antivirus program: Although these harmful extensions come from official stores and update automatically, strong antivirus programs can help discover suspicious activities such as hidden tracking devices, injected text programs or unauthorized guidance. Anti -virus adds a decisive layer of protection through scanning to threats that browsers may miss alone, but they should be combined with safe browsing habits to get the best results.

Get the best winners to protect antivirus 2025 for Windows, Mac and Android & iOS devices on Cyberguy.com/lockupyourtch

4) Refresh your browser settings: Restoring your browser to its default condition can reflect unwanted changes on your home page, search engine or other settings.

Get Fox Business on the Go by clicking here

5) Watch the security alerts: Watch your email and text for login warnings or access alerts from the services you use. This can help you discover the unauthorized activity early.

6) Use a browser with extension permission control items: Some browsers allow you to restrict what data extensions can reach (for example, only on click “or” just on specific locations “). This can reduce the risk of future attacks.

Court Kisa Curt

The browser accessories can be useful, but they also carry hidden risks. As this condition appears, even reliable tools from official stores can turn harmful without warning. That is why it is pushing to stay on alert, review your accessories regularly, and use strong protection to combat viruses. Some simple habits can come a long way to keep your browser and your personal data safe.

Click here to get the Fox News app

Do you rely on classifications and reviews when choosing extensions, or do you dig deeper? Let’s know through our writing in Cyberguy.com/contact

Subscribe to the free Cyberguy report
Get my best technical advice, urgent safety alerts, and exclusive deals that are connected directly to your inbox. In addition, you will get immediate access to the ultimate survival guide – for free when joining my country Cyberguy.com/newsledter

Copyright 2025 Cyberguy.com. All rights reserved.



https://static.foxnews.com/foxnews.com/content/uploads/2025/07/3-malicious-browser-extensions-caught-spying-on-2-million-users-outro.jpg

Source link

Leave a Comment