Malicious Google Chrome extensions installed on more than one million devices

Google Chrome
(Image credit: Shutterstock)

A set of malicious Google Chrome extensions designed to monitor browsing activity have been installed on more than 1.4 million devices, researchers have reported.

As described in a blog post from security company McAfee, the purpose of the scam is to modify the victim’s browser cookies each time they visit an ecommerce website, thereby netting the operator an affiliate fee for any purchases made.

Although two extensions branded as “Netflix Party” have now been removed from the official extension marketplace, McAfee says the remainder are still available to download.

Chrome extensions scam

Although the malicious extensions do not pose an immediate security risk – they are not designed to exfiltrate sensitive data, nor install malware payloads – they do represent a flagrant violation of privacy.

As demonstrated by the surging popularity of VPN services and other solutions designed to obscure web activity, modern web users are increasingly unwilling to part with their browsing data - and especially not, one would imagine, in these circumstances.

What makes this scam particularly difficult to spot is that the extensions all serve a legitimate purpose, on top of providing a foundation for the affiliate revenue ploy. They are also broadly well-reviewed, leaving potential victims with little indication of the scam playing out under their noses.

“The extensions offer various functions such as enabling users to watch Netflix shows together, website coupons, and taking screenshots of a website,” explained McAfee.

“The users of the extensions are unaware of [the malicious functionality] and the privacy risk of every site being visited being sent to the servers of the extension authors.”

In an effort to evade detection by analysts, meanwhile, the operators programmed some of the extensions to begin meddling with browser cookies multiple weeks after the date of installation.

Chrome users that find they have installed the offending extensions are advised to perform a manual uninstall immediately.

Malicious extensions list:

  • Netflix Party
  • Netflix Party 2
  • Full Page Screenshot Capture - Screenshotting
  • AutoBuy Flash Sales

Update: 09 September, 2022
The original version of this article made reference to a browser extension that has since been updated to remove the functionality identified by McAfee as malicious.

In communication with TechRadar Pro over email, McAfee provided the following statement:

"Since the original publication of the report on August 29, 2022, the browser extension was updated in the Chrome Store on September 6, 2022. McAfee has updated its blog accordingly."

TOPICS
Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
chrome firefox extensions
Google Chrome extensions hit in major attack - dozens of developers affected, so be on your guard
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
Chrome icon on Android
Google Chrome extensions hack may have started much earlier than expected
A finger touching the google chrome icon in the Windows 10 start menu
A new Chrome browser highjacking attack could affect billions of users - here's how to fight it
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Microsoft reveals over a million PCs hit by malvertising campaign
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedly left users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Data leak
Top California sperm bank suffers embarrassing leak
Latest in News
An Nvidia GeForce RTX 4060 Ti
Nvidia RTX 5060 Ti could be delayed to mid-April and RTX 5060 to mid-May – is AMD starting to look like a clear winner in the battle of Blackwell vs RDNA 4 GPUs?
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Core Time 2 + iPhone 15 blue
Pebble is taking the fight to the Apple Watch – as its founder calls for action
The Google Pixel 9a
The Google Pixel 9a’s AI has a RAM problem
Xbox Wireless Controller
Microsoft is adding a powerful new feature for using Xbox controllers with Windows 11
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware