Categories: InternetSecurity News

More than 20,000,000 Chrome Users are Tricked into Installing Fake Ad Blockers

Nowadays adblockers are quite popular among user’s, but before installing extension it is required to make validation checks to ensure that you are installing the trusted extension, else you may end up with Fake Ad Blockers.

Cloning the famous and wide-spread extension is not new, but instead of using tricky names attackers started using keywords with the extension description and trying to make the top of the search results.

Andrey Meshkov from Adguard reports that attackers tricked more than 20,000,000 users to install the fake extension of the ad blockers.

I must say the problem is not new. It’s been a while since different “authors” started spamming Chrome WebStore with lazy clones of popular ad blockers and the only way to stop is by filing a violation abuse to Google to Google and it takes couple day’s to turn down the app.

Casual user’s use to believe in the top search results which are not good, a deeper analysis is required before selecting an extension that serves our purpose.

What these Fake Ad Blockers Do

They found to be hidden inside of well-known javascript files and they track the user activities such as the pages that you are visiting and send’s the information to the attacker’s server.

To avoid detection they use to transfer the harmful codes inside of the legitimate image files which later executed in browser background and can change your browser behavior in any way.

This is not a first time, few months before Google Taken Down More than 423,992 users have been affected with the bot and a total of 89 extensions removed from chrome web store.

Here is the full list of the extensions identified by Adguard on WebStore

AdRemover for Google Chrome™ (10M+ users)
uBlock Plus (8M+ users)
Adblock Pro (2M+ users)
HD for YouTube™ (400K+ users)
Webutation (30K+ users)

All the apps has been reported to the Google and all the five apps are taken down.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path…

20 hours ago

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept…

20 hours ago

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been…

20 hours ago

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By…

20 hours ago

Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks

Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved…

21 hours ago

Beware! Fake Crowdstrike Recruitment Emails Spread Cryptominer Malware

CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding…

23 hours ago