Millions of Chrome users face data leak risk from hacked extensions.
Your browsing data and account credentials can be stolen by these extensions.
Your web browser is a miniature ecosystem that stores sensitive information like passwords, search history, credit card numbers, and addresses. As with any ecosystem, it is vulnerable to attacks from malicious apps and services that can compromise the data stored within it.
A recent security campaign has targeted browser extensions, compromising 36 of them and putting 2.6 million Chrome users at risk of having their browsing data and account credentials exposed.
Enter the giveaway by signing up for my free newsletter.
How hackers are targeting browser extensions
Over 2.6 million users are at risk of data exposure and credential theft due to hackers exploiting browser extensions as a gateway to steal sensitive user data through various methods, as reported by The Hacker News.
Phishing campaigns target legitimate extension publishers on platforms like the Chrome Web Store, tricking developers into granting permissions to malicious applications that insert harmful code into popular extensions, stealing user data such as cookies and access tokens.
Cyberhaven, a cybersecurity firm, was the first to reveal the campaign. On December 24, one of their employees fell victim to a phishing attack, which allowed the threat actors to publish a harmful version of the extension.
Malicious browser extensions, if published and approved by the Chrome Web Store, can put millions of users at risk of data theft. These extensions can be used by attackers to steal browsing data, monitor user activity, and bypass security measures such as two-factor authentication.
Developers may unknowingly include data-gathering code in monetization software development kits, making it difficult to determine whether a compromise is due to a hacking campaign or intentional inclusion by the developer.
Remove these extensions from your web browser
Secure Annex has launched an investigation into the hacking campaign and discovered over twenty additional compromised extensions. It is crucial to remove any of the listed extensions from your browser to safeguard your data.
- AI Assistant - ChatGPT and Gemini for Chrome
- Bard AI Chat Extension
- GPT 4 Summary with OpenAI
- Search Copilot AI Assistant for Chrome
- TinaMInd AI Assistant
- Wayin AI
- VPNCity
- Internxt VPN
- Vindoz Flex Video Recorder
- VidHelper Video Downloader
- Bookmark Favicon Changer
- Castorus
- Uvoice
- Reader Mode
- Parrot Talks
- Primus
- Tackker - online keylogger tool
- AI Shop Buddy
- Sort by Oldest
- Rewards Search Automator
- ChatGPT Assistant - Smart Search
- Keyboard History Recorder
- Email Hunter
- Visual Effects for Google Meet
- Earny - Up to 20% Cash Back
- Cyberhaven security extension V3
- GraphQL Network Inspector
- Vidnoz Flex - Video recorder & Video share
- YesCaptcha assistant
- Proxy SwitchyOmega (V3)
- ChatGPT App
- Web Mirror
- Hi AI
The removal of malicious extensions from the Chrome Web Store does not completely eliminate the risk of hackers accessing your data, as they can still do so if the extensions are kept installed. Secure Annex has created a public Google Sheet detailing the malicious extensions it has found so far, including whether they have been updated or removed. They are also continuously adding new extensions to the list as they are discovered.
How to remove an extension from Google Chrome
To remove an extension from Google Chrome, follow these steps: 1. Open Google Chrome. 2. Click on the three dots in the top right corner of the browser window. 3. Select "More tools" and then "Extensions." 4. Find the extension you want to remove and click on the "Remove" button. 5. Confirm the removal by clicking on "Remove" again. 6. Restart your browser.
- To access the puzzle icon in Chrome, click on the top-right corner of the browser.
- You can now see all the active extensions in Chrome. To remove an extension, click the three dots icon next to it and select "Remove from Chrome."
- Click Remove to confirm
7 ways to stay safe from malicious software
Before clicking on links or emails, verify their authenticity to avoid falling victim to phishing attacks that impersonate trusted entities. These emails often create a false sense of urgency and can lead to clicking on malicious links. Always double-check the sender's email address and go directly to the official website if in doubt.
To safeguard yourself from malicious links and malware, it is crucial to have strong antivirus software installed on all your devices. These tools can detect and block malicious code, even if it has been embedded in browser extensions. The best way to protect yourself from phishing emails and ransomware scams is to have antivirus software installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android, and iOS devices.
Be careful when granting browser extension permissions. Not all requests are necessary, and some extensions may ask for access to sensitive data like browsing history, cookies, or account information. Review each extension's permissions and deny any that seem excessive. Choose extensions with limited access to protect your data.
Only install necessary extensions and regularly review and remove unused ones.
Ensure your browser is always up-to-date by enabling automatic updates. This will protect you from security vulnerabilities exploited by malicious software. For a detailed guide on how to update Google Chrome, check out my guide.
Periodically review and remove any unnecessary or potentially risky extensions from your installed extensions.
Notify the official browser extension marketplace of any suspicious extensions you come across.
Kurt’s key takeaway
Browser extensions have become a new favorite target for hackers, and the recent discovery of over 35 compromised Chrome extensions, putting 2.6 million users at risk, highlights the need for caution. To protect your data, it is crucial to remove any suspicious extensions. This incident also raises questions about the effectiveness of Google's Chrome Web Store review process, as even trusted platforms can be exploited.
Please inform us at Cyberguy.com/Contact how frequently you review and remove unused or suspicious browser extensions.
To receive my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
tech
15 things to do or try first when you get a new iPhone: 1. Set up your phone with your personal information and preferences. 2. Install your favorite apps and games. 3. Connect your phone to your Wi-Fi network and other devices. 4. Take a few photos and test out the camera. 5. Set up your email and other accounts. 6. Enable security features like Touch ID or Face ID. 7. Customize your phone's settings and appearance. 8. Explore the built-in features and apps on your phone. 9. Connect with friends and family on social media. 10. Set up reminders and alarms. 11. Use the phone's built-in voice assistant. 12. Download and install new apps from the App Store. 13. Set up your phone's screen time and parental controls. 14. Enable automatic updates for your apps and software. 15. Back up your important data to cloud storage or an external hard drive.
techYou might also like
- Your credit score could be negatively impacted by these mistakes.
- How to repurpose your old iPhone for a new purpose
- The world is privy to the robot training techniques of a Chinese tech company.
- An early supernova was captured in photos by a powerful Webb Telescope.
- If you suspect your computer is infected with a virus, take action immediately.