Thursday, March 28, 2024

More than 20,000,000 Chrome Users are Tricked into Installing Fake Ad Blockers

Nowadays adblockers are quite popular among user’s, but before installing extension it is required to make validation checks to ensure that you are installing the trusted extension, else you may end up with Fake Ad Blockers.

Cloning the famous and wide-spread extension is not new, but instead of using tricky names attackers started using keywords with the extension description and trying to make the top of the search results.

Andrey Meshkov from Adguard reports that attackers tricked more than 20,000,000 users to install the fake extension of the ad blockers.

I must say the problem is not new. It’s been a while since different “authors” started spamming Chrome WebStore with lazy clones of popular ad blockers and the only way to stop is by filing a violation abuse to Google to Google and it takes couple day’s to turn down the app.

Casual user’s use to believe in the top search results which are not good, a deeper analysis is required before selecting an extension that serves our purpose.

What these Fake Ad Blockers Do

They found to be hidden inside of well-known javascript files and they track the user activities such as the pages that you are visiting and send’s the information to the attacker’s server.

Fake Ad Blockers.

To avoid detection they use to transfer the harmful codes inside of the legitimate image files which later executed in browser background and can change your browser behavior in any way.

This is not a first time, few months before Google Taken Down More than 423,992 users have been affected with the bot and a total of 89 extensions removed from chrome web store.

Here is the full list of the extensions identified by Adguard on WebStore

AdRemover for Google Chromeâ„¢ (10M+ users)
uBlock Plus (8M+ users)
Adblock Pro (2M+ users)
HD for YouTubeâ„¢ (400K+ users)
Webutation (30K+ users)

All the apps has been reported to the Google and all the five apps are taken down.

Website

Latest articles

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...

ZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD Platforms

Despite AMD's growing market share with Zen CPUs, Rowhammer attacks were absent due to...

Airbus to Acquire INFODAS to Strengthen its Cybersecurity Portfolio

Airbus Defence and Space plans to acquire INFODAS, a leading cybersecurity and IT solutions...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles