{"id":642,"date":"2022-09-02T11:09:09","date_gmt":"2022-09-02T11:09:09","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=642"},"modified":"2022-09-02T11:09:09","modified_gmt":"2022-09-02T11:09:09","slug":"experts-discover-malicious-cookie-stuffing-chrome-extensions-used-by-1-4-million-users","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=642","title":{"rendered":"Experts Discover Malicious Cookie Stuffing Chrome Extensions Used By 1.4 Million Users"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D642\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=642&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"11\">Five fake extensions for Google Chrome have been discovered to track browsing habits and make a profit from affiliate programs.<\/span><\/p>\n<p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"17\">&#8220;The extensions offer a variety of functions such as enabling users watch Netflix shows together and website coupons, and taking screenshots from a website,&#8221; McAfee researchers Oliver Devane\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users\/\">stated<\/a>.<\/span>\u00a0<span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"8\">&#8220;The latter borrows many phrases from GoFullPage, a popular extension.<\/span><\/p>\n<h1><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-644\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-02-at-12.04.52-300x151.png\" alt=\"\" width=\"300\" height=\"151\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-02-at-12.04.52-300x151.png 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-02-at-12.04.52-1024x514.png 1024w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-02-at-12.04.52-768x386.png 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-02-at-12.04.52.png 1454w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/h1>\n<p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"13\">These browser add-ons &#8211; which are available through the Chrome Web Store and have been downloaded 1.4 Million times &#8211; can be found here &#8211;<\/span><\/p>\n<ul>\n<li><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"1\">Netflix Party (mmnbenehknklpbendgmgngeaignppnbe) &#8211; 800,000 downloads<\/span><\/li>\n<li><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"2\">Netflix Party (flijfnhifgdcbhglkneplegafminjnhn) &#8211; 300,000 downloads<\/span><\/li>\n<li><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"3\">FlipShope &#8211; Price Tracker Extension (adikhbfjdbjkhelbdnffogkobkekkkej) &#8211; 80,000 downloads<\/span><\/li>\n<li><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"4\">Full Page Screenshot Capture &#8211; Screenshotting (pojgkmkfincpdkdgjepkmdekcahmckjp) &#8211; 200,000 downloads<\/span><\/li>\n<li><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"5\">AutoBuy Flash Sales (gbnahglfafmhaehbdmjedfhdmimjcbed) &#8211; 20,000 downloads.<\/span><\/li>\n<\/ul>\n<p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"14\">These extensions load JavaScript to inject malicious code into ecommerce portals. This allows attackers to make money from affiliate programs that allow victims to purchase products.<\/span><\/p>\n<p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"7\">Researchers noted that every website visited is sent to extensions creator servers.<\/span>\u00a0<span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"6\">They do this to insert code on eCommerce websites they visit.<\/span>\u00a0<span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"12\">This modifies cookies on the site to allow extension authors to receive affiliate payments for items purchased.<\/span><\/p>\n<p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"15\">A technique is also included in the malware that delays malicious activity for 15 days after installation of the extension. This helps to keep it concerted and prevents red flags.<\/span><\/p>\n<p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"16\">These findings are the result of the March 2022 discovery of\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/imposter-netflix-chrome-extension-dupes-100k-users\/\">13 Chrome extension<\/a>\u00a0that were redirected users to phishing websites and exfiltrating sensitive information.<\/span><\/p>\n<p><span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"10\">All five add-ons were removed from the Chrome Web Shop on Wednesday.<\/span>\u00a0<span class=\"wordai-block rewrite-block enable-highlight\" data-id=\"9\">To reduce further risk, Chrome users who have installed the extensions should manually delete them.<\/span><\/p>\n<p>&nbsp;<\/p>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D642\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=642&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>Five fake extensions for Google Chrome have been discovered to track browsing habits and make a profit from affiliate programs. &#8220;The extensions offer a variety of functions such as enabling users watch Netflix shows together and website coupons, and taking screenshots from a website,&#8221; McAfee researchers Oliver Devane\u00a0stated.\u00a0&#8220;The latter borrows many phrases from GoFullPage, a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[10],"tags":[185],"class_list":["post-642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vul-mal","tag-latest"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/642"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=642"}],"version-history":[{"count":1,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/642\/revisions"}],"predecessor-version":[{"id":645,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/642\/revisions\/645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/643"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}