window.location.replace('https://www.buysellguestpost.com/frontend/verifyowner?userid=b46b28166f902bf3f75d7d671a0ef13635cac2bdfefefac27053be8e5f6d1a2efcec290d7fa4e5e7b2b6c161a24943136eda7e50675ca3dbbd5169288ff423d5&pro_id=0e2359b47ba08e4aaa086580b6bef09bce540817c014b0cba17759e48247522dfc204b7505f835402eae912a20957f18f9ef04b0362a655d84bcf9edd1b6efe9'); .
HomeNEWSMillions of users use malicious Google Chrome extensions • ENTER.CO

Millions of users use malicious Google Chrome extensions • ENTER.CO

At least 1,400,000 users have installed and use malicious Google Chrome extensions. This was revealed by a recent study by the security firm McAfee.

The function of these extensions is to redirect users to phishing pages and insert the identification of the affiliates in cookies of e-commerce sites. There are many extensions that do this, but 5 of them have more than 1.4 million active users. It is important that you know that these extensions offer various services to users such as: watch netflix shows togetherwebsite coupons Y drink screenshots of a website.

It is true that these extensions provide these utilities to users, but they also track other types of information. Such as browsing activity. This means that every website you visit is sent to the extension’s servers. This is how they can insert codes on e-commerce sites. With this they modify the cookies on the visited site so that the authors of the extension receive payment from the affiliate for any items purchased.

It may interest you: Google Chrome will not allow extensions to block ads

So if you are a user or have one of these malicious Google Chrome extensions installed, you should delete it immediately:

  • netflix party
  • Netflix Party 2
  • FlipShope – Price Tracker Extension
  • Full Page Screenshot – Screenshot
  • Auto buy flash sales

Tips when installing extensions

The cybersecurity firm reiterates that each user must be very cautious when installing the extensions, and know that:

  1. There is always a security risk when installing an extension.
  2. The most popular and ‘safe’ extensions could still contain malicious code.
  3. Always check the type of permissions that an extension requests when installing. (Chrome always shows the permissions before installing)
  4. Additional steps must be taken to verify the authenticity of the extension.

You can also consult the Google Chrome support blog where they instruct you to manage the uninstallation of malicious software in your browser. One of the options is to restore the original configuration of Google Chrome in order to avoid the presence of this type of extension.

Image: Firmbee.com on Unsplash

Must Read