Categories: Security

Fake AdBlock Plus Chrome Extension Installed By More Than 30,000 Users

A malicious extension posted to Google’s official Chrome Web Store that posed as a popular ad-blocking utility was installed by more than 30,000 users before Google removed it, according to a researcher.

The anonymous researcher, who uses the pseudonym SwiftOnSecurity, said the fraudulent extension posted as AdBlock Plus, a popular browser add-on with more than 10 million users.

Extension fraud

The malicious tool used the same name as AdBlock Plus and appeared identical, but when installed forced the browser to open new tabs that displayed ads.

SwiftOnSecurity said the fact that the extension was so evidently fraudulent, using the name of a well-known tool and including a list of unrelated keywords in its description to improve search results, raised questions about Google’s filtering processes for the Chrome Web Store.

The fraudulent extension included negative reviews. credit: SwiftOnSecurity

At the time the false extension was removed about 37,000 users had installed it, SwitfOnSecurity said in a Twitter post.

“Google allows 37,000 Chrome users to be tricked with a fake extension by fraudulent developer who clones popular name and spams keywords,” the researcher wrote, adding, “Legitimate developers just have to sit back and watch as Google smears them with fake extensions that steal their good name.”

Users noted that while the false extension’s publicly visible name was “AdBlock Plus”, its extension ID included non-Latin characters that differentiated it from the genuine software while maintaining a similar appearance, a technique that may have fooled Google’s filters.

The malicious tool’s extension ID was ‘аdвiосk-рiuѕ’, rather than ‘adblock-plus’users reported on Twitter.

Loading ...

Malicious tools

Google applies automated filters to vet Chrome Web Store uploads, only examining submissions manually if they’re reported as problematic.

Social media users noted that many of those who downloaded the tool gave it negative reviews that mentioned the advert-displaying tabs.

Nevertheless, the fraudulent software maintained a four-star rating out of five.

Since 2013 Google has made extensions available only from the official Chrome Web Store in order to improve security, but has had difficulties keeping even that repository clear of malicious code.

In August researchers Proofpoint reported hackers had installed malicious code in a number of legitimate extensions after obtaining access to their developers’ Google accounts. The incident allowed the attackers to hijack the web traffic of those extensions’ users. Proofpoint didn’t identify which extensions were compromised.

In 2015 a malicious extension masquerading as a screenshot utility was also found to be listening in on users’ traffic.

Do you know all about security in 2017? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

12 hours ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

13 hours ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

14 hours ago

VW, Rivian Launch Joint Venture, As Investment Rises To $5.8 Billion

Volkswagen and Rivian officially launch their joint venture, as German car giant ups investment to…

15 hours ago

AMD Axes 4 Percent Of Staff, Amid AI Chip Focus

Merry Christmas staff. AMD hands marching orders to 1,000 employees in the led up to…

18 hours ago

Tesla Recalls 2,431 Cybertrucks Over Propulsion Issue

Recall number six in 2024 for Tesla Cybertruck, and this time the fault cannot be…

19 hours ago