Google Removes 106 Chrome Extensions For Collecting Sensitive User Data

Chrome extensions

Google has removed 106 malicious Chrome extensions that have been caught collecting sensitive user data.

The 106 extensions are part of a batch of 111 Chrome extensions that have been identified as malicious in a report published today by cyber-security firm Awake Security.

Awake says these extensions posed as tools to improve web searches, convert files between different formats, as security scanners, and more.

But in reality, Awake says the extensions contained code to bypass Google's Chrome Web Store security scans, take screenshots, read the clipboard, harvest authentication cookies, or grab user keystrokes (such as passwords).

awake-malicious-chrome-extensions.png
Image: Awake Security

Awake believes all the extensions were created by the same threat actor, although the company has yet to identify it.

The primary connection between all the extensions was that they sent user data back to domains registered through the GalComm domain registrar.

Furthermore, Awake says that many extensions also appeared to share the same graphics and codebase, with slight changes. In some cases, the extensions even had the same version number and the same descriptions, the company explained in its report.

Awake says that by May 2020, when it reached out to Google, the 111 malicious extensions have been downloaded 32,962,951 times.

Based on internal telemetry, Awake says that some of these extensions have been found on the networks of "financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals, retail, high-tech, higher education and government organizations," effectively acting as backdoors into private networks and espionage tools -- albeit there's no evidence to suggest they've been used as such.

The company provided the list of the 111 malicious extension IDs here.

Harry Denley, Director of Security at the MyCrypto platform, provided ZDNet with the status of each extension. At the time of writing, only five of the 111 extensions reported by Awake to Google are still live on the Chrome Web Store.

According to standard practice, Google has deactivated the Chrome extensions in each user's browser. The extensions are still installed, but disabled and marked as "malware" in the Chrome browser's extension section.

Users can visit the chrome://extensions page and see if they installed any of the malicious extensions and remove them from their browsers.

chrome-malware-extension.jpg
Image: ZDNet

RECENT NEWS

Big Techs Spending Soars With Data Centre Boom

The rapid expansion of data centres has turned Big Tech into big spenders. As companies strive to meet the growing deman... Read more

SEC's Oversight Over Digital Assets: Balancing Regulation And Innovation

As the digital asset market continues to expand, regulatory agencies like the Securities and Exchange Commission (SEC) a... Read more

Harnessing AI To Combat Cyber Risk: Strategies For Financial Institutions

Cyber threats pose an ever-present danger to financial institutions, requiring robust strategies to mitigate risks effec... Read more

Adaptation And Innovation: Revolut's Response To Banking License Delay Through Advertising Sales Push

As Revolut eagerly awaits the acquisition of its banking license, the fintech giant has demonstrated remarkable adaptabi... Read more

Riding The Wave: The Evolution Of Fintech Investment Strategies

The fintech industry has experienced unprecedented growth in recent years, captivating the attention of investors worldw... Read more

How Fintech Is Revolutionizing Traditional Banking

How fintech is revolutionizing traditional banking is a topic that is garnering positive and immense discourse within th... Read more