back to article Browser extension developers targeted with schemes and scams

Code can be bought and sold, or access can be lent, but trust doesn't necessarily come along for the ride, as has been shown. Last September, Daniel Kladnik, creator of a browser extension called "I don't care about cookies" that suppresses EU cookie popup menus, sold his extension code to Avast – a security firm that …

  1. heyrick Silver badge

    Not a new concept...

    This is one of the main reasons I don't allow apps to auto-update.

    Somebody, somewhere, creates a good and useful app. Then, one of three things will happen:

    1, The developer will be deluded by potential advertising revenue to the point where the app will insert numerous full screen unskippable video adverts (the default to the sound on maximum).

    2, The developer will start removing previous functionality to make a "Pro" version.

    3, The developer will flog the app to some random third party who will then add #1 and maybe #2 above, and count yourself lucky if that's all they do as this tends to be the way of malware. After all, what better target than a popular app with a bunch of 5* reviews?

    That the slimeballs are targeting browser extensions isn't a surprise. It's just "another potential app to infect", isn't it?

    1. TimMaher Silver badge

      Re: Auto update...

      ...and even then I wonder what kind of mods are happening under cover.

      PiHole is a good start for ads but... Hmm...

    2. captain veg Silver badge

      Re: Not a new concept...

      I'm no expert, but this looks like a description of "apps" on Android.

      I dare say that things are similar on iOS.

      Software exists elsewhere.


POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like