Chocolate Factory hashes 49 malicious Chrome extensions from the online store • VPNOnlineFree

%1$s', sprintf( '', esc_url( get_author_posts_url( get_the_author_meta( 'ID' ) ) ), esc_attr( sprintf( __( 'View all posts by %s', 'generatepress' ), get_the_author() ) ), esc_html( get_the_author() ), get_avatar( get_the_author_meta( 'ID' ) ) ) ); $time_string = ''; if ( get_the_time( 'U' ) !== get_the_modified_time( 'U' ) ) { $time_string = $time_string . ''; } $time_string = sprintf( $time_string, esc_attr( get_the_date( 'c' ) ), esc_html( get_the_date() ), esc_attr( get_the_modified_date( 'c' ) ), esc_html( get_the_modified_date() ) ); printf( '%1$s', // WPCS: XSS ok, sanitization ok. sprintf( '%3$s', esc_url( get_permalink() ), esc_attr( get_the_time() ), $time_string ) ); if ( ! is_single() && ! post_password_required() && ( comments_open() || get_comments_number() ) ) { echo ''; comments_popup_link( __( 'Comments', 'generatepress' ), __( '1 Comment', 'generatepress' ), __( '% Comments', 'generatepress' ) ); echo ''; } ?>


Google ousted 49 Chrome extensions from its Chrome Web Store because they contained malicious code, a ritual that should be familiar after a decade of purges.

Latest set of incorrect browser add-ons identified by Security Shop researchers MyCrypto and PhishFort, targeted cryptocurrency services and users to gain access to digital funds.

“Essentially, extensions look for secrets – mnemonic phrases, private keys and key files,” said Harry Denley, security director at MyCrypto, on Tuesday. blog post. “Once the user has entered them, the extension sends an HTTP POST request to their backend, where the bad actors receive the secrets and empty the accounts.”

Denley said the expansion package – which targeted services such as Ledger, Trezoe, Jaxx, Electrum, MyEtherWallet, MetaMask, Exodus and KeyKeep – was associated with 14 command and control servers that would be linked to the same person or group, maybe in Russia.

A video of the MEW CW extension (MyEtherWallet) shows how it listens to secrets entered in the browser and sends them over the network to the author of the malware.

According to Denley, some of the command and control servers were old, but 80% of them were associated with domains registered in March or April. The extensions themselves started appearing in February, most arriving within the next two months.

Some of the extensions, he said, were backed by false five-star reviews; some good internet samaritans also tried to warn others that the extensions were malicious. Google did not immediately respond to a request for comment, but the 49 extensions identified by MyCrypto and PhishFort are no longer available in the Chrome Web Store.

Google Chrome logo

Google tests hide default Chrome extension icons, developers are certainly not amused by the change


About two million people are currently using extensions from the Chrome Web Store, according to a report released earlier this month by Extension Monitor. Last month, the store had 213,054 extensions, up 3,468 from February.

In the same month, Google confirmed a major purge of the Chrome extension, amounting to about 500 extensions. In January, Google briefly stopped publication of any new extension due to an increase in fraud.

The security of Chrome extensions has been an issue since the launch of the Chrome Web Store in December 2010. Reminder our report on a Chrome extension Trojan from April 2010.

Coincidentally, Google pushed for security enhancements to the Chrome extension in 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, and 2019. He always does.

His most recent effort is to reorganize its extension APIs to make them less powerful, a project called Manifest v3. This should limit abuse, but it can also hamper legitimate developers trying to implement content blocking and privacy features that rely on intercepting and rewriting network traffic. ®

Webcast: Build the Next Generation of Your Business in the Public Cloud


Notify of
Inline Feedbacks
View all comments