{"id":22697,"date":"2018-06-06T15:15:15","date_gmt":"2018-06-06T19:15:15","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=22697"},"modified":"2019-11-15T06:36:06","modified_gmt":"2019-11-15T11:36:06","slug":"malicious-chrome-extension","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/malicious-chrome-extension\/22697\/","title":{"rendered":"Data-thieving Chrome extension"},"content":{"rendered":"<p>Owners of software stores (Google, Apple, Amazon, et al.) have to fight malware just as intensely as security solution vendors do. Like any circle, the process is never-ending: Cybercriminals write malware that worms its way into online stores, whereupon it gets named and shamed (not to mention deleted), the security policy is updated to avoid repeat incidents, and the cybercriminals contrive a way to sneak their creation past the new policy into the store.<\/p>\n<p>We always recommend installing apps from official sources only, but that doesn\u2019t mean that such sites are malware-free, just that there\u2019s less of it than elsewhere. And although Google Play is fairly safe, the Chrome Web Store is a different kettle of piranha. In it, our experts recently discovered a malicious extension that targets users\u2019 bank data.<\/p>\n<h2>A Trojan banker in your browser<\/h2>\n<p>The culprit was an extension named \u201cDesbloquear Conte\u00fado\u201d (Portuguese for \u201cUnblock contents\u201d), which essentially carried out a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">man-in-the-middle attack<\/a>. When the user visited their bank\u2019s website, a malicious script redirected the traffic through a proxy server belonging to the cybercriminals, allowing them to analyze it and pick out what they wanted.<\/p>\n<p>The malware also contained scripts designed to extract certain information entered by users online. For example, when a user signed visited the bank\u2019s login web-page, the malware used a screen overlay perfectly matching the bank\u2019s interface but replacing the login, password, and one-time confirmation code fields with its own. When the user pressed the login button, the malware copied the data for itself.<\/p>\n<p>The domain on which the crooked C&amp;C server was located used the same IP address as other domains previously exposed as malicious, which was one of the reasons the scheme caught our researchers\u2019 attention. Once they\u2019d confirmed their suspicions, the researchers contacted Google, and the malware was quickly removed from the Chrome Web Store.<\/p>\n<p>Remember that during installation, Chrome extensions request access permissions that often give them near-limitless powers on your computer. Most malicious programs need just one permission: \u201cRead and change all your data on the websites you visit\u201d \u2014 which is pretty powerful.<\/p>\n<p>So, handle extensions with extreme caution\u00a0\u2014 they\u2019re <a href=\"https:\/\/www.kaspersky.com\/blog\/browser-extensions-security\/20886\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">not necessarily benign<\/a>, although they\u2019re so easy to install, it\u2019s easy to assume they can\u2019t be powerful or do any harm.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"93kLoMPJXh\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/browser-extensions-security\/20886\/\" target=\"_blank\" rel=\"noopener nofollow\">Why you should be careful with browser extensions<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cWhy you should be careful with browser extensions\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/browser-extensions-security\/20886\/embed\/#?secret=hfPcL4d5Cu#?secret=93kLoMPJXh\" data-secret=\"93kLoMPJXh\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Protecting against malicious browser extensions<\/h3>\n<p>Here are some tips that will help fend off malware masquerading as a handy browser extension:<\/p>\n<ul>\n<li>Install only extensions that you trust completely. There is no one perfect test for trust, unfortunately, but at least stick to extensions supplied by reputable developers.<\/li>\n<li>Don\u2019t add extra extensions if you have no real need for them.<\/li>\n<li>If an extension is no longer necessary, remove it. You can always install it again if need be.<\/li>\n<li>Use a tried-and-tested security solution such as <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>. All new Chrome extensions are automatically sent to us for analysis, so even in the very latest extensions, malware has no place to hide.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Chrome browser extension steals users\u2019 bank data.<\/p>\n","protected":false},"author":40,"featured_media":22698,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[734,1278,16,1499,422,723],"class_list":{"0":"post-22697","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-banking-trojans","9":"tag-browsers","10":"tag-chrome","11":"tag-extensions","12":"tag-threats","13":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/malicious-chrome-extension\/22697\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/malicious-chrome-extension\/13472\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/malicious-chrome-extension\/11261\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/malicious-chrome-extension\/15550\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/malicious-chrome-extension\/13814\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/malicious-chrome-extension\/13044\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/malicious-chrome-extension\/16292\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/malicious-chrome-extension\/15807\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/malicious-chrome-extension\/20706\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/malicious-chrome-extension\/5014\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/malicious-chrome-extension\/10582\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/malicious-chrome-extension\/9258\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/malicious-chrome-extension\/16933\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/malicious-chrome-extension\/20560\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/malicious-chrome-extension\/16664\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/malicious-chrome-extension\/20416\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/malicious-chrome-extension\/20408\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/extensions\/","name":"extensions"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22697"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22697\/revisions"}],"predecessor-version":[{"id":29710,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22697\/revisions\/29710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22698"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}