Investors Hangout Stock Message Boards Logo
  • Mailbox
  • Favorites
  • Boards
    • The Hangout
    • NASDAQ
    • NYSE
    • OTC Markets
    • All Boards
  • Whats Hot!
    • Recent Activity
    • Most Viewed Boards
    • Most Viewed Posts
    • Most Posted
    • Most Followed
    • Top Boards
    • Newest Boards
    • Newest Members
  • Blog
    • Recent Blog Posts
    • Recently Updated
    • News
    • Stocks
    • Crypto
    • Investing
    • Business
    • Markets
    • Economy
    • Real Estate
    • Personal Finance
  • Market Movers
  • Interactive Charts
  • Login - Join Now FREE!
  1. Home ›
  2. Stock Message Boards ›
  3. Stock Boards ›
  4. Zerify Inc (ZRFY) Message Board

Attackers Stole Browser Data and Redirected Users

Message Board Public Reply | Private Reply | Keep | Replies (2)                   Post New Msg
Edit Msg () | Previous | Next


Post# of 82689
(Total Views: 604)
Posted On: 02/19/2020 12:28:14 AM
Avatar
Posted By: CyberC
Attackers Stole Browser Data and Redirected Users to Malicious Sites

Google Removes 500 Chrome Extensions Tied to Malvertising

Researchers Say Attackers Stole Browser Data and Redirected Users to Malicious Sites

February 17, 2020

google-removes-500-chrome-extensions-tied-to-malvertising-showcase_image-7-a-13731.jpg

Google Removes 500 Chrome Extensions Tied to Malvertising
Google has removed 500 Chrome extensions from its online store after researchers found that attackers were using them to steal browser data, according to a new report from security firm Duo Security. The thefts were part of a malvertising campaign that had been active for at least a year, the researchers say.

See Also: Live Webinar | Your Ultimate Guide to Phishing Mitigation

In a message to the researchers that it had removed the extensions, Google noted that it "regularly sweeps to find extensions using similar techniques, code and behaviors and take down those extensions if they violate our policies."

While the malicious browser extensions have been removed, the researchers note that the malvertising campaign may have affected 1.7 million Chrome users who downloaded the extensions from the official Google Chrome Web Store. The campaign, which dates to at least January 2019, appears to have accelerated between March and June of last year, the Duo Security report, published Thursday, adds.

In the campaign that the researchers discovered, the Chrome extensions were modified by the fraudsters to harvest user data from their web browsers, which was then sent to servers that the scammers controlled, according to the report. Users were also redirected to malicious domains and landing pages.

The researchers noticed that much of the source code used to build these Chrome extensions was the same, meaning that they likely were the work of the same fraudsters or criminal group.

"The plugins have almost no ratings, and the source code of the plugins are nearly identical to each other," Jamila Kaya, an independent security researcher, and Jacob Rickerd, an analyst for security firm Duo Security, note in the report. "The only substantial differences in the source code are the names of the functions. With a much larger number than similar plugins and services, it's likely that a single change of all the function names reduces the similarity to other plugins enough to avoid detection mechanisms."

The Duo Security report lists all 500 of the suspicious Chrome extensions, most of which were advertised as games, weather applications or plug-ins for maps and other navigations .

Over the years, security researchers have found that scammers and fraudsters have increasingly used browser extensions to plant malware and conduct other malicious campaigns.

In 2018, for example, researchers at Gigamon found four malicious extensions in the official Google Chrome store that affected more than 500,000 users.

Uncovering the Campaign

The latest investigation into extensions began when Kaya, the independent researcher, was conducting a routine threat hunting exercise and found about a dozen suspicious Chrome extensions that were posted in the official Google Chrome Web Store, according to the Duo Security report.

Using CRXcavator, a free, automated Chrome extension security assessment tool developed by Duo Security, Kaya eventually identified about 70 malicious Chrome extensions that all appeared to use the same code and had other similarities, according to the report.

After Kaya and researchers from Duo Security notified Google, the tech giant identified the additional 430 malicious Chrome extensions and removed all 500 from the online store, according to the report.

In most cases, the fraudsters used code to help obfuscate the extensions' malicious activity, such as how these extensions would connected to a command-and-control server once downloaded, the researchers say.

"This was done in order to connect the browser clients to a command-and-control architecture, exfiltrate private browsing data without the user's knowledge, expose the user to risk of exploit through advertising streams, and attempt to evade the Chrome Web Store's fraud detection mechanisms," according to the report.

A closer look at the campaign found that much of the advertising streamed to users who downloaded these extensions was tied to legitimate companiesm such as Macy's, Dell or Best Buy, according to the report. These ad streams were delivered in such large volumes that the fraudsters would make money by fraudulently delivering click traffic, according to the report. At other times, the users were directed to malicious domains that were used for phishing and other scams.

Malvertising Trends
In a January report that looked at malvertising trends in the third quarter of 2019, researchers at the security firm Confiant noted that while malvertising had slowed somewhat, fraudsters still managed to deliver some 4 billion ad impressions to generate fake clicks.

In 2018, Confiant researchers uncovered one of the largest malvertising campaigns, called Zirconium, which served as many as 1 billion ads across the web over the course of several years. The Zirconium campaign involved redirecting users to malicious sites or trying to get them to click using social engineering techniques (see: Online Advertising: Hackers' Little Helper).

Knowing that extensions are frequently targeted by these types of fraudsters, Google recently updated its security and privacy requirements for developers who want to post their extensions in the company's official online store. Now, developers must submit privacy guidelines with their extension and explicitly ask for permission from users before any extensions are downloaded.


About the Author

apurva-venkat-largeImage-7-a-2970.jpg

Apurva Venkat


Special Correspondent

Venkat is special correspondent for Information Security Media Group's global news desk. She has previously worked at companies such as IDG and Business Standard where she reported on developments in technology, businesses, startups, fintech, e-commerce, cybersecurity, civic news and education.


(2)
(0)




Zerify Inc (ZRFY) Stock Research Links


  1.  
  2.  


  3.  
  4.  
  5.  


WORDS TO LIVE BY:

Never argue with stupid people, they will drag you down to their level and then beat you with experience.


Get .... PrivacyLok https://cyberidguard.com/

Try SafeVchat: https://cyberidguard.com/

My comments are only my opinion and are not to be used for investment advice.

Please conduct your own due diligence before choosing to buy or sell any stock.

xgqbj600g2g.jpg




Investors Hangout

Home

Mailbox

Message Boards

Favorites

Whats Hot

Blog

Settings

Privacy Policy

Terms and Conditions

Disclaimer

Contact Us

Whats Hot

Recent Activity

Most Viewed Boards

Most Viewed Posts

Most Posted Boards

Most Followed

Top Boards

Newest Boards

Newest Members

Investors Hangout Message Boards

Welcome To Investors Hangout

Stock Message Boards

American Stock Exchange (AMEX)

NASDAQ Stock Exchange (NASDAQ)

New York Stock Exchange (NYSE)

Penny Stocks - (OTC)

User Boards

The Hangout

Private

Global Markets

Australian Securities Exchange (ASX)

Euronext Amsterdam (AMS)

Euronext Brussels (BRU)

Euronext Lisbon (LIS)

Euronext Paris (PAR)

Foreign Exchange (FOREX)

Hong Kong Stock Exchange (HKEX)

London Stock Exchange (LSE)

Milan Stock Exchange (MLSE)

New Zealand Exchange (NZX)

Singapore Stock Exchange (SGX)

Toronto Stock Exchange (TSX)

Contact Investors Hangout

Email Us

Follow Investors Hangout

Twitter

YouTube

Facebook

Market Data powered by QuoteMedia. Copyright © 2025. Data delayed 15 minutes unless otherwise indicated (view delay times for all exchanges).
Analyst Ratings & Earnings by Zacks. RT=Real-Time, EOD=End of Day, PD=Previous Day. Terms of Use.

© 2025 Copyright Investors Hangout, LLC All Rights Reserved.

Privacy Policy |Do Not Sell My Information | Terms & Conditions | Disclaimer | Help | Contact Us