{"id":53529,"date":"2025-05-29T11:18:39","date_gmt":"2025-05-29T15:18:39","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53529"},"modified":"2025-05-29T11:18:39","modified_gmt":"2025-05-29T15:18:39","slug":"suspicious-chrome-extensions-with-6-million-installs","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/suspicious-chrome-extensions-with-6-million-installs\/53529\/","title":{"rendered":"57 shady Chrome extensions clock up six million installs"},"content":{"rendered":"<p>Cybersecurity researchers have <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-extensions-with-6-million-installs-have-hidden-tracking-code\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered 57 suspicious extensions<\/a> in the official Chrome Web Store with more than six million users. The plugins caught their attention because the permissions they request don\u2019t match their descriptions.<\/p>\n<p>What\u2019s more, these extensions are \u201chidden\u201d \u2014 meaning they don\u2019t show up in Chrome Web Store searches, and search engines don\u2019t index them. Installing such a plugin requires a direct link to it in the Chrome Web Store. This post details why extensions can be a dangerous tool in cybercriminal hands, explains the direct threat posed by these recently discovered plugins, and gives tips on how not to fall victim.<\/p>\n<h2>Why extensions are dangerous, and how convenience undermines security<\/h2>\n<p>We\u2019ve posted many times about why <a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/50059\/\" target=\"_blank\" rel=\"noopener nofollow\">browser extensions shouldn\u2019t be installed thoughtlessly<\/a>. Browser plugins often help users speed up routine tasks, such as translating information on websites or checking spelling; however, the minutes you save often come at the cost of privacy and security.<\/p>\n<p>This is because, in order to work effectively, extensions typically need access to everything you do in the browser. Even Google Translate <a href=\"https:\/\/www.kaspersky.com\/blog\/dangers-of-browser-extensions\/45448\/\" target=\"_blank\" rel=\"noopener nofollow\">asks for permission to \u201cRead and change all your data on all websites\u201d you visit<\/a> \u2014 that is, not only can it monitor what you do online, but also alter any information on a page. For example, it might display a translation instead of the original text. If that\u2019s what an online translator can do, just imagine what a malicious extension with the same access can get up to!<\/p>\n<p>The problem is that most users are unaware of the risks posed by plugins. Whereas executable files from untrusted sources have come to be viewed as potentially dangerous, browser extensions enjoy a broad level of trust \u2014 especially if downloaded from an official store.<\/p>\n<h2>Too many unnecessary permissions<\/h2>\n<p>In the case of the 57 suspicious extensions found in the Chrome Web Store, the main sign of malicious intent was the broad sweep of permissions requested, such as access to cookies \u2014 including authentication ones.<\/p>\n<p>In practice, this allows attackers to steal session cookies from victims\u2019 devices, and those session cookies are used to avoid entering a password each time they visit a website. Such cookies also enable scammers to sign in to victims\u2019 personal accounts on social networks or online stores.<\/p>\n<div id=\"attachment_53536\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111616\/suspicious-chrome-extensions-with-6-million-installs-1.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53536\" class=\"size-large wp-image-53536\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111616\/suspicious-chrome-extensions-with-6-million-installs-1-1024x955.jpg\" alt=\"Example of a suspicious extension in the Chrome Web Store \" width=\"1024\" height=\"955\"><\/a><p id=\"caption-attachment-53536\" class=\"wp-caption-text\">Browser Checkup for Chrome by Doctor is one of the suspicious extensions masquerading as an \u201cantivirus\u201d for the browser. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-extensions-with-6-million-installs-have-hidden-tracking-code\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>In addition, the permissions requested grant the malicious extensions a host of interesting capabilities, including:<\/p>\n<ul>\n<li>Tracking user actions in Chrome<\/li>\n<li>Changing the default search engine and modifying search results<\/li>\n<li>Injecting and executing scripts on pages visited by users<\/li>\n<li>Remotely activating advanced tracking of user actions<\/li>\n<\/ul>\n<h2>How the investigation began<\/h2>\n<p>Cybersecurity researcher John Tuckner got on the trail of the suspicious extensions after examining the code of one of them: Fire Shield Extension Protection. Tuckner initially spotted this extension because it was published in the official Chrome store as hidden \u2014 it didn\u2019t show up in search results and was accessible only via a direct link to the page in the Chrome Web Store.<\/p>\n<p>Note that hidden extensions and apps in official stores are not unheard-of. The big platforms allow developers to hide them from the eyes of ordinary users. Such a practice tends to be the preserve of owners of private corporate software, and intended for use only by employees of a particular company. Another valid reason for hiding a product is when it\u2019s still in the development stage.<\/p>\n<p>However, both these explanations could be ruled out in the case of Fire Shield Extension Protection, boasting 300\u00a0000-plus users: a private corporate tool in the development stage with such a user base? Not likely.<\/p>\n<div id=\"attachment_53535\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111503\/suspicious-chrome-extensions-with-6-million-installs-2.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53535\" class=\"size-large wp-image-53535\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111503\/suspicious-chrome-extensions-with-6-million-installs-2-1024x472.jpg\" alt=\"Number of users of suspicious extensions \" width=\"1024\" height=\"472\"><\/a><p id=\"caption-attachment-53535\" class=\"wp-caption-text\">Suspicious extensions with 200\u2013300 thousand users each. <a href=\"https:\/\/secureannex.com\/blog\/searching-for-something-unknow\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>What\u2019s more, the plugin features didn\u2019t fit the profile of a highly specialized corporate solution: the description said that Fire Shield checks permissions requested by other extensions installed by the user, and warns about unsafe plugins.<\/p>\n<p>To perform such tasks, it only needed permission to use the <a href=\"https:\/\/developer.chrome.com\/docs\/extensions\/reference\/api\/management\" target=\"_blank\" rel=\"nofollow noopener\">chrome.management API<\/a>, which would allow it to get information about, and manage other installed plugins. But Fire Shield wanted much broader rights, which we\u2019ve listed above with a description of the threats associated with this level of access.<\/p>\n<div id=\"attachment_53534\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111348\/suspicious-chrome-extensions-with-6-million-installs-3.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53534\" class=\"size-large wp-image-53534\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111348\/suspicious-chrome-extensions-with-6-million-installs-3-1024x699.jpg\" alt=\"Suspicious plugin requests overly broad permissions \" width=\"1024\" height=\"699\"><\/a><p id=\"caption-attachment-53534\" class=\"wp-caption-text\">Suspicious plugin wants too many permissions \u2014 including access to all sites, cookies, and user activity. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>57 plugins disguised as legitimate tools<\/h2>\n<p>While analyzing Fire Shield Extension Protection, Tuckner found a clue that led to 35 more suspicious plugins. Among the links extracted from the extension code, he noticed a domain called unknow[.]com (seemingly a misspelling of \u201cunknown\u201d). A typo in a domain is a red flag to any cybersecurity expert, since it\u2019s a common trick used by scammers, who hope the victim won\u2019t notice.<\/p>\n<p>Using a special tool, Tuckner found 35 more extensions associated with the same suspicious domain. The names of the extensions also had a lot in common, which confirmed their being connected. And they all requested broad access rights that didn\u2019t match their stated description.<\/p>\n<p><\/p><div id=\"attachment_53533\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111227\/suspicious-chrome-extensions-with-6-million-installs-4.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53533\" class=\"size-large wp-image-53533\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/29111227\/suspicious-chrome-extensions-with-6-million-installs-4-1024x637.jpg\" alt=\"Extensions associated with the suspicious domain unknow[.]com \" width=\"1024\" height=\"637\"><\/a><p id=\"caption-attachment-53533\" class=\"wp-caption-text\">Extensions associated with the domain unknow[.]com, which kickstarted John Tuckner\u2019s investigation. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-extensions-with-6-million-installs-have-hidden-tracking-code\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>Most of the suspicious extensions Tuckner found had a fairly standard set of described features: blocking ads, improving search results, and protecting user privacy. In reality, however, many lacked the code to perform these tasks. Some of the extensions all came from the same companies.\n<p>Further research led Tuckner to unearth 22 more suspicious plugins, some of which were publicly available (not hidden). Here\u2019s the <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1LN7MQ_9W5QHIyZjjqXK7JnSiCLlcF4aBRhmZKon-p4U\/edit?gid=0%23gid=0\" target=\"_blank\" rel=\"nofollow noopener\">full list<\/a> of them \u2014 below we give only hidden extensions with the most downloads:<\/p>\n<ul>\n<li>Fire Shield Extension Protection (300\u00a0000 users)<\/li>\n<li>Total Safety for Chrome (300\u00a0000 users)<\/li>\n<li>Protecto for Chrome (200\u00a0000 users)<\/li>\n<li>Securify for Chrome (200\u00a0000 users)<\/li>\n<li>Choose Your Chrome Tools (200\u00a0000 users)<\/li>\n<\/ul>\n<h2>Bottom line<\/h2>\n<p>All the evidence points to attackers hiding their malicious plugins to avoid detection by official store moderators. At the same time, such extensions are often distributed through search ads or malicious sites.<\/p>\n<p>The researchers found no instances of detected suspicious extensions stealing user passwords or cookies. After a detailed study of the code, plus a series of experiments, they concluded that extended tracking of user activity doesn\u2019t start immediately but some time after installation of the extension, and can be launched by a command from a remote server.<\/p>\n<p>The nature of their code, the option of remote control, their repeating behavior patterns, and embedded functionality lead us to conclude that the extensions all belong to the same family of spyware or data-stealing programs. As such, we advise that you:<\/p>\n<ul>\n<li>Check your device for suspicious extensions (see the <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1LN7MQ_9W5QHIyZjjqXK7JnSiCLlcF4aBRhmZKon-p4U\/edit?gid=0%23gid=0\" target=\"_blank\" rel=\"nofollow noopener\">full list<\/a>).<\/li>\n<li>Download only those extensions that you really need; periodically check the list in your browser, and delete any unused or suspicious ones immediately.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution on all your devices<\/a>\u00a0to warn you of any danger in good time.<\/li>\n<\/ul>\n<blockquote><p>Browser plugins are more dangerous than they look. Read also:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-chrome-extensions-87-million\/48562\/\" target=\"_blank\" rel=\"noopener nofollow\">Malicious extensions in the Chrome Web Store<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/chrome-plugins-alert\/38242\/\" target=\"_blank\" rel=\"noopener nofollow\">Dangerous Chrome extensions<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/dangers-of-browser-extensions\/45448\/\" target=\"_blank\" rel=\"noopener nofollow\">Browser extensions: more dangerous than you think<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/50059\/\" target=\"_blank\" rel=\"noopener nofollow\">Dangerous browser extensions<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here&#8217;s why they&#8217;re dangerous, and how not to fall victim.<\/p>\n","protected":false},"author":2726,"featured_media":53530,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[1278,16,1499,2528,43,97,768,422,812],"class_list":{"0":"post-53529","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-browsers","9":"tag-chrome","10":"tag-extensions","11":"tag-permissions","12":"tag-privacy","13":"tag-security-2","14":"tag-surveillance","15":"tag-threats","16":"tag-tracking"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/suspicious-chrome-extensions-with-6-million-installs\/53529\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/suspicious-chrome-extensions-with-6-million-installs\/28913\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/suspicious-chrome-extensions-with-6-million-installs\/24137\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/suspicious-chrome-extensions-with-6-million-installs\/12507\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/suspicious-chrome-extensions-with-6-million-installs\/29016\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/suspicious-chrome-extensions-with-6-million-installs\/28243\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/suspicious-chrome-extensions-with-6-million-installs\/31058\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/suspicious-chrome-extensions-with-6-million-installs\/29749\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/suspicious-chrome-extensions-with-6-million-installs\/39700\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/suspicious-chrome-extensions-with-6-million-installs\/13468\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/suspicious-chrome-extensions-with-6-million-installs\/22886\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/suspicious-chrome-extensions-with-6-million-installs\/32320\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/suspicious-chrome-extensions-with-6-million-installs\/29202\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/suspicious-chrome-extensions-with-6-million-installs\/34954\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/suspicious-chrome-extensions-with-6-million-installs\/34587\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/extensions\/","name":"extensions"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53529"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53529\/revisions"}],"predecessor-version":[{"id":53537,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53529\/revisions\/53537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53530"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}