Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs

Date:

Share:


The extensions share other dubious or suspicious similarities. Much of the code in each one is highly obfuscated, a design choice that provides no benefit other than complicating the process for analyzing and understanding how it behaves.

All but one of them are unlisted in the Chrome Web Store. This designation makes an extension visible only to users with the long pseudorandom string in the extension URL, and thus, they don’t appear in the Web Store or search engine search results. It’s unclear how these 35 unlisted extensions could have fetched 4 million installs collectively, or on average roughly 114,000 installs per extension, when they were so hard to find.

Additionally, 10 of them are stamped with the “Featured” designation, which Google reserves for developers whose identities have been verified and “follow our technical best practices and meet a high standard of user experience and design.”

One example is the extension Fire Shield Extension Protection, which, ironically enough, purports to check Chrome installations for the presence of any suspicious or malicious extensions. One of the key JavaScript files it runs references several questionable domains, where they can upload data and download instructions and code:

URLs that Fire Shield Extension Protection references in its code.


Credit:

Secure Annex

One domain in particular—unknow.com—is listed in the remaining 34 apps.

Tuckner tried analyzing what extensions did on this site but was largely thwarted by the obfuscated code and other steps the developer took to conceal their behavior. When the researcher, for instance, ran the Fire Shield extension on a lab device, it opened a blank webpage. Clicking on the icon of an installed extension usually provides an option menu, but Fire Shield displayed nothing when he did it. Tuckner then fired up a background service worker in the Chrome developer tools to seek clues about what was happening. He soon realized that the extension connected to a URL at fireshieldit.com and performed some action under the generic category “browser_action_clicked.” He tried to trigger additional events but came up empty-handed.



Source link

━ more like this

Google Pixel 11 Pro might not look much different, after all

A case retailer has accidentally become one of the more interesting sources of Google Pixel 11 Pro information this week. Thinborne, a Texas-based...

Samsung’s smart glasses are coming, and they’ve got Meta in their sights

Samsung has been quietly cooking up smart glasses since 2023, and at MWC 2026 in Barcelona, executive vice president Jay Kim finally let...

2026 MWC Publisher Award Roundup: The 9 Innovations That Stole The Show

Mobile World Congress (MWC) has long been the global stage where the future of consumer technology is revealed. From breakthrough smartphones to experimental...

This Jammer Wants to Block Always-Listening AI Wearables. It Probably Won’t Work

Deveillance also claims the Spectre can find nearby microphones by detecting radio frequencies (RF), but critics say finding a microphone via RF emissions...

Ding-dong! The Exploration Upper Stage is dead

Now, you might...
spot_img