back to article Stealthy browser extensions waited years before infecting 4.3M Chrome, Edge users with backdoors and spyware

A seven-year malicious browser extension campaign infected 4.3 million Google Chrome and Microsoft Edge users with malware, including backdoors and spyware sending people's data to servers in China. And, according to Koi researchers, five of the extensions with more than 4 million installs are still live in the Edge marketplace …

  1. MachDiamond Silver badge

    New and Improved with new China leak option

    Your data doesn't JUST go to M$ and Google, China gets a taste as well. Oh Joy!

    The only machine I have with Chrome on it is a tiny PC running Cinnamon that I only use for one task. Whew.

  2. Blackjack Silver badge

    Something I have seen many times is legitimate browser extensions getting bought by bad actors, usually in Chrome, is one of the main reasons I don't use Chrome and web browsers based on it anymore.

    Apparently that has become so common that they just started making their own extensions and just waiting for the right time.

    1. Roland6 Silver badge

      >Something I have seen many times is legitimate browser extensions getting bought by bad actors...

      We've also seen similar with a few open source projects being takenover..

      https://www.theregister.com/2024/04/01/xz_backdoor_open_source/

  3. ecofeco Silver badge
    Mushroom

    But wait, there's more!

    Here's a thought. How many more sleepers are out there?

    Oh joy.

  4. Dan 55 Silver badge
    Stop

    trovi.com

    If it's a browser hijacking site, why link to it?

    1. that one in the corner Silver badge

      Re: trovi.com

      It's an intelligence test.

  5. Jou (Mxyzptlk) Silver badge

    Monoculture at its finest.

    One engine, to be hacked all at once. Two things: more very different rendering engines, and the enforcement to support them. Without deliberately including code in webpages to be slower on competing browsers (hello youtube! Yes, I am talking about you in frist place!). A third thing would be less concentration on maketing-propaganda-fashion trends, more down to the base quality.

    1. that one in the corner Silver badge

      Re: Monoculture at its finest.

      And more pages opened in their own properly isolated environment, unless the user deliberately selects the option way down the right-click menu (as it is useful, sometimes, to have two tabs know you are logged into a site).

      Will never be done, of course, because stopping your Facebook (etc etc etc) login following you around and "legitimately" watching your every move, converting it into saleable data, would probably be accused of being restraint of trade or some other bollocks ("deliberately stifling innovation", another good phrase). If only to tie browser makers up in the courts.

      1. Jou (Mxyzptlk) Silver badge

        Re: Monoculture at its finest.

        My solution to that insane tracking: I am currently using three browsers. Fecesbook is used in Vivaldi, and Vivaldi is only used for Fecesbook, for example.

        1. Anonymous Coward
          Anonymous Coward

          Re: Monoculture at its finest.

          I'd be surprised if those sites didn't allow for that, and looked for cookies left by other browsers as well.

      2. Hasselsoff

        Re: Monoculture at its finest.

        I would also accept "reusing" Auth if you open a link in a new tab. Since that would imply I would like to stay logged in.

        And make it configurable so people can turn that feature on/off as needed

  6. Nate Amsden Silver badge

    just waiting

    For Google etc to use this as an excuse to remove extensions entirely in the name of "security". (Of course remember what they did to ublock origin. I've never used Chrome myself). For the typical user may make sense. Though I'll of course always prefer the extra control (and associated risk perhaps) with having a less locked down experience(android is the lesser of two evils in that regard compared to apple, though google is trying their best to close that gap). Feel the same way of course about anything that is forced to be encrypted/signed/etc.

  7. DS999 Silver badge

    Was it really a waiting game

    Or was it someone buying out or taking over via force (hacking, blackmail etc.) a legit extension? Or maybe the developer's circumstances changed and he had big gambling debt or something like that?

    That seems more likely than evildoers playing out a seven year long con.

    1. phuzz Silver badge

      Re: Was it really a waiting game

      'Build something, get a bunch of users, then sell your company/product' is how most startups work. It's just that in this case instead of getting bought by Facebook/Google/some VC they actually got bought out by by someone malicious.

      Or maybe the initial sale was legit at the time, but the buying company realised that they could make more money by installing spyware.

      These days I imagine more devs would be suspicious of random buyout offers, but this was at least seven years ago and this tactic was less well known.

  8. FF22

    Most likely hacked or bought up

    The extension has been most likely either hacked or simply just bought from the original author, in order to spread malware. Hackers have been doing this for decades.

    Nobody will create an extension with the intention to wait 7 years only to place some affiliate cookies - especially when such programs could end anytime, or browser extension rules and APIs could change so that manipulating traffic will not be possible or effective. See Manifest V3 changes (which obviously don't hinder this extension, just mentioning as an example of browsers crippling several extensions with API changes).

    1. Roland6 Silver badge

      Re: Most likely hacked or bought up

      Given the number of extensions from the one author that have been compromised and the lack of comment from that Malaysian business, I think there is more to come as people start digging.

      > Nobody will create an extension with the intention to wait 7 years only to place some affiliate cookies…

      Would not be so sure, only need to look at the Israeli compromise of Hezbollah pagers/phones.

      1. DS999 Silver badge

        Re: Most likely hacked or bought up

        Would not be so sure, only need to look at the Israeli compromise of Hezbollah pagers/phones

        That's a nation state level attack which is in a totally different category.

        1. jlturriff

          Re: Most likely hacked or bought up

          So you can say definitively that this case doesn't involve a nation-state?

          1. DS999 Silver badge

            Re: Most likely hacked or bought up

            Yes because the article would have mentioned if the security researchers believed it was a nation state attack, and nation states want to target just the right people not 4.3 million random people to minimize the chances of discovery.

  9. mebh

    Reviewed on update, or no?

    Paragraph three:

    "Because both marketplaces review extensions upon submission – it's not an ongoing process – these seemingly stellar productivity tools, some with Featured and Verified status alongside glowing user reviews and high install counts, were allowed to track people's behavior and steal sensitive info silently for years."

    Paragraph five:

    "A Google spokesperson confirmed none of the extensions are available on the Chrome Web Store, and we are aware that Google screens every single update to extensions in the Chrome store, no matter how minor the change."

    I don't understand how both of these can be correct. Does Google review on every update, or only upon submission?

    1. Dwarf Silver badge

      Re: Reviewed on update, or no?

      It doesn't say when that happens. Is it on submission - as you would hope, or is it some form of asynchronous background process that gets done when someone gets around to it and as we know, people have plenty of time, so there will be absolutely no delay, promise.

      Or, with AI everywhere, perhaps, it is some automated code that can't figure things out properly, just approving changes and firing them out there. AI has good form for this, it can simply lie or say sorry when it gets called out that it made a mistake.

    2. AVR Silver badge

      Re: Reviewed on update, or no?

      If the update doesn't go through the Chrome store, if it's something internal to the app, then Google wouldn't get to check it. Or yeah, one of those might be untrue.

  10. Anonymous Coward
    Anonymous Coward

    Drink me

    Click me

    Oh my!

    1. DoctorNine

      Re: Drink me

      This is a drastically under-rated comment.

      1. find users who cut cat tail
        Coat

        Re: Drink me

        So it should be un-derated.

  11. An_Old_Dog Silver badge

    Why Did TFA Not List ALL Browser Extensions Which Koi Found Were Trojan Horses?

    @Jessica Lyons:

    The article would be far more useful if all the extensions which Koi discovered were Trojan Horses were listed.

    1. steviebuk Silver badge

      Re: Why Did TFA Not List ALL Browser Extensions Which Koi Found Were Trojan Horses?

      That's what I was thinking

  12. Kevin McMurtrie Silver badge

    OK, Reg

    The original article has some great information and I think I know why The Register doesn't link to it. Endpoint https:// api.extensionplay dot com /clean_master/t.json?t=Date.now() and other domains are still up and running long after everywhere else has purged it. Up an running on a service that The Register is often quick to defend.

  13. martinusher Silver badge

    One person's Malware....

    ....is another's Analytics.

    Remove the China angle and it sounds like just another day in the life of modern software. Remember -- there is no such thing as a free lunch (or browser extension), sooner or later someone, somewhere, is going to want to monetize this asset.

    (This reminds me of Gatorware....anyone remember this and know what happened after the original company shut down?)

    1. sev.monster

      Re: One person's Malware....

      Most analytics are spyware. Change my mind.

      But in this case, what these addons were doing (fetching and executing payloads) is 100% malware.

  14. BenMyers

    INCOMPLETE ARTICLE!

    So tell us all how to identify and remove these scurillous browser extensions!

    1. nobody who matters Silver badge

      Re: INCOMPLETE ARTICLE!

      Dump Chrome?

      1. Nyle

        Re: INCOMPLETE ARTICLE!

        and Edge - Chrome based...............

  15. sev.monster
    Megaphone

    Where's the pudding, Jack?

    Since few seem to be providing a more full list of extensions, here's "some" of them according to THN:

    Users who installed the extensions are recommended to remove them immediately and rotate their credentials out of an abundance of caution. Some of the identified extensions on Chrome and Edge are listed below -

    • Clean Master: the best Chrome Cache Cleaner
    • Speedtest Pro-Free Online Internet Speed Test
    • BlockSite
    • Address bar search engine switcher
    • SafeSwift New Tab
    • Infinity V+ New Tab
    • OneTab Plus:Tab Manage & Productivity
    • WeTab 新标签页
    • Infinity New Tab for Mobile
    • Infinity New Tab (Pro)
    • Infinity New Tab
    • Dream Afar New Tab
    • Download Manager Pro
    • Galaxy Theme Wallpaper HD 4k HomePage
    • Halo 4K Wallpaper HD HomePage

    1. lzb

      According to the official documentation of webtab, this list is biased.

      https://mp.weixin.qq.com/s/E8YQLWZFM2J7r5DZNSl47w

      According to the plugin's official documentation, the plugin containing malicious code mentioned in the report was indeed initially developed by their team but has since been sold. The report does not specify whether plugins under the official's actual control contain malicious code; it merely correlates them based on historical associations. The removal of the Edge version plugin is also linked to the transfer of control.

  16. b1k3rdude

    Er maybe a fcking list of the extension so we can fcking avoid them..?

  17. Fluffy Cactus

    I think it is a CRIME that neither Google, MSFT, APPLE, or any other download sites are not watching their "software stores" like a hawk!

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon