Menu
Many Chrome browser extensions do sneaky things

Many Chrome browser extensions do sneaky things

A study of 48,000 Chrome extensions uncovers ad fraud, data theft and other misdeeds

An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.

The study, due to be presented Thursday at the Usenix Security Symposium in San Diego, forecasts growing security problems around extensions as cybercriminals tap into the rich data contained in Web browsers for profit.

They found 130 outright malicious extensions and 4,712 suspicious ones, engaged in a variety of affiliate fraud, credential theft, advertising fraud and social network abuse.

"By installing an extension, you will not see any malicious behavior," said Alexandros Kapravelos, a doctoral candidate at the University of California at Santa Barbara, in a phone interview. "You need to visit specific pages to trigger the malicious behavior."

The researchers developed a system called Hulk, which closely watches how browser extensions behave when interacting with websites. Part of that involved creating so-called "HoneyPages," which are specially crafted Web pages designed to tease out bad behavior.

Because extensions add extra functionality to the browser, they need a lot of power. Extensions often ask for a variety of permissions that come from Chrome's APIs (application programming interfaces).

For example, extensions can intercept Web requests from the browser and modify traffic and inject JavaScript into Web pages.

"That is just way too powerful," Kapravelos said. "We need to be way more careful into which extensions we give these permissions."

During the study, the researchers worked closely with Google. The company does review extensions before they're allowed in Chrome's Web Store, but it hasn't stopped some of the bad ones from getting in.

In light of the study, Google has implemented several changes to strengthen its control over extensions. It is now harder to install extensions from outside the Web Store, a practice known as "side loading," said Chris Grier, a security researcher with the University of California at Berkeley and a co-author of the study.

Very few extensions were found that try to interfere with online banking sessions or logged keystrokes, Grier said. But further analysis might reveal bad behaviors that are well-hidden, he added.

Some of the suspicious extensions they studied have been downloaded millions of times.

One extension aimed at Chinese users that has been downloaded 5.5 million times uses a tracking beacon to report all the Web pages a person has visited to a remote server. Those reports are not sent encrypted over SSL (Secure Sockets Layer).

"While this isn't malicious per se, it certainly exposes Chinese users to a whole new set of risks," Grier said. "Now all of their content is no longer encrypted, and there are no confidentiality guarantees. Even for users outside of China, there's certainly a lot of risk in having every http request reported back to some server."

In another example, some extensions changed or added parameters within a URL in order to accomplish affiliate fraud.

Companies such as Amazon will pay a small fee to webmasters, known as affiliates, when someone clicks a link on their website that leads to a sale. That is tracked by adding an affiliate code inside a URL.

Some extensions will swap out the legitimate affiliate code for their own, effectively gaining fraudulent credit for the sale. Since Google saw the study, it has moved to crack down on affiliate fraud in its policy governing extensions, Grier said.

They also found examples of extensions swapping out advertisements on a website for their own in order to get the fees. Sometimes extensions swapped out banner ads, injected ads into ad-free sites such as Wikipedia or overlaid ads on top of website content.

The study was also co-authored by Neha Chachra, Christopher Kruegel, Giovanni Vigna and Vern Paxson.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags USENIXapplicationsGooglesecuritybrowserssoftware

Featured

Slideshows

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Show Comments