{"id":12750,"date":"2018-01-30T09:00:01","date_gmt":"2018-01-30T14:00:01","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=12750"},"modified":"2020-02-26T15:12:23","modified_gmt":"2020-02-26T15:12:23","slug":"browser-extensions-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/browser-extensions-security\/12750\/","title":{"rendered":"Why you should be careful with browser extensions"},"content":{"rendered":"<p>You are probably familiar with browser extensions, which most of us use on a daily basis. They add a lot of useful features to browsers, but at the same time, they pose threats to both privacy and security. Let\u2019s discuss what\u2019s wrong with browser extensions and how you can minimize the chances of one of them running amok on you. But first let\u2019s go through what exactly a browser extension is.<a href=\"https:\/\/www.kaspersky.co.uk\/blog\/files\/2018\/07\/browser-extensions-security-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-12751\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/files\/2018\/07\/browser-extensions-security-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\"><\/a><\/p>\n<p>\u00a0<\/p>\n<h2>What are browser extensions, and why do you need them?<\/h2>\n<p>\u00a0<\/p>\n<p>A browser extension is something like a plugin for your browser that adds certain functions and features to it. Extensions can modify the user interface or add some Web service functionality to your browser.<\/p>\n<p>For example, extensions are used to block ads on Web pages, translate text from one language to another, or add pages to a third-party bookmark service such as Evernote or Pocket. Extensions are plenty \u2014 there\u2019re hundreds or even thousands of them, for productivity, customization, shopping, games, and more.<\/p>\n<p>Almost all popular browsers support extensions \u2014 you can find them for Chrome and Chromium, Safari, Opera, Internet Explorer, and Edge. They are widely available and some of them are quite helpful, so a lot of people end up using at least several extensions, and sometimes their number on one PC extends to several dozen. But, as we\u2019ve mentioned, extensions can be both convenient and dangerous.<\/p>\n<p>\u00a0<\/p>\n<h3>What can go wrong with extensions<\/h3>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h4>Malicious extensions<\/h4>\n<p>\u00a0<\/p>\n<p>First of all, extensions can be downright <a href=\"https:\/\/securelist.com\/threats\/malware-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">malicious<\/a>. That happens mostly with extensions that come from third-party websites, but sometimes \u2014 as in cases with Android and Google Play \u2014 malware sneaks into official markets as well.<\/p>\n<p>For example, security researchers recently <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/01\/500000-chrome-users-fall-prey-to-malicious-extensions-in-google-web-store\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">uncovered four extensions in the Google Chrome Web Store<\/a> that posed as innocuous sticky notes apps but in fact were caught generating profits for their creators by secretly clicking on pay-per-click ads.<\/p>\n<p>How can an extension can do something like that? Well, to do something, an extension requires permissions. Problem is, of the browsers people commonly use, only Google Chrome prompts the user to grant these permissions (or not); other browsers allow extensions to do anything they want by default, and the user doesn\u2019t have a choice but to accept it.<\/p>\n<p>However, even in Chrome that permissions management exists only in theory \u2014 in practice, it doesn\u2019t work. Even basic extensions usually require permission to \u201cread and change all your data on the websites you visit,\u201d which gives them the power to do virtually anything with your data. And if you don\u2019t give them that permission, they won\u2019t be installed.<\/p>\n<p>We stumbled upon another example of malicious extensions earlier \u2014 they\u2019ve been used by crooks to spread malware in Facebook Messenger. Here\u2019s a <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-messenger-malware\/18412\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">post about that<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"PjiN3nVq4c\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-messenger-malware\/18412\/\" target=\"_blank\" rel=\"noopener nofollow\">Bulk messaging malware in Facebook Messenger<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cBulk messaging malware in Facebook Messenger\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/facebook-messenger-malware\/18412\/embed\/#?secret=ZlDqHnHkri#?secret=PjiN3nVq4c\" data-secret=\"PjiN3nVq4c\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>\u00a0<\/p>\n<h4>Hijacking and buying extensions<\/h4>\n<p>\u00a0<\/p>\n<p>Browser extensions are an interesting target for crooks, because a lot of extensions have massive user bases. And they are updated automatically, which means that if a user had downloaded an innocuous extension, it can be updated to become malicious; that update would be pushed to the user right away \u2014 and the user won\u2019t notice anything at all.<\/p>\n<p>A good developer won\u2019t do such a thing, but their account can be hijacked and a malicious update can be uploaded to the official store on their behalf. That\u2019s what happened when crooks <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/08\/after-phishing-attacks-chrome-extensions-push-adware-to-millions\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">used phishing to get the access credentials<\/a> of the developers of a popular plugin called Copyfish. In that case, the plugin, which originally performed optical character recognition, was used by crooks to serve additional ads to users.<\/p>\n<p>Sometimes, developers are approached by companies that offer to buy their extensions for a rather tidy sum. Extensions are usually hard to monetize, which is why developers are frequently eager to agree to such deals. After the company purchases the extension, it can update it with malicious features, and that update will be pushed to users. For example, that\u2019s exactly what <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/-particle-chrome-extension-sold-to-new-dev-who-immediately-turns-it-into-adware\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">happened to Particle<\/a>, a popular Chrome extension for customizing YouTube that was abandoned by its developers. A company bought it and immediately turned it into adware.<\/p>\n<p>\u00a0<\/p>\n<h4>Not malicious, but dangerous<\/h4>\n<p>\u00a0<\/p>\n<p>Even extensions that are not malicious can be dangerous. The danger arises because most extensions have the ability to collect a lot of data about users (remember that \u201cread and change all your data on the websites you visit\u201d permission). To earn their daily bread, some developers sell anonymized data they\u2019ve collected to third parties. That\u2019s usually mentioned in the extension\u2019s EULA, and generally it\u2019s OK.<\/p>\n<p>The problem is that sometimes that data is not anonymized enough, which leads to some serious privacy issues: The parties that purchase the data can identify the users of the plugin. That <a href=\"https:\/\/www.pcworld.com\/article\/3139814\/software\/web-of-trust-browser-extensions-yanked-after-proving-untrustworthy.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">happened to Web of Trust<\/a> \u2014 a once-popular plugin for Chrome, Firefox, Internet Explorer, Opera, Safari, and other browsers. The plugin was used to rate websites based on crowdsourced opinion. Aside from that, the extension collected the full browsing history of its users.<\/p>\n<p>A German website <a href=\"https:\/\/www.pcworld.com\/article\/3139814\/software\/web-of-trust-browser-extensions-yanked-after-proving-untrustworthy.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">claimed<\/a> that Web of Trust was selling the data it collected to third parties without properly anonymizing it, which resulted in Mozilla\u2019s pulling the extension from its store. The creators of the extension then removed it from all of the other browsers\u2019 stores. However, a month later the extension was back in stores. Web of Trust is not a malicious extension, but it can harm people nonetheless by exposing their data to someone who is not supposed to see what websites users visit and what they do there.<\/p>\n<p>\u00a0<\/p>\n<h3>How to use extensions safely<\/h3>\n<p>\u00a0<\/p>\n<p>Despite the fact that extensions can be dangerous, some of them are really useful, and that\u2019s why you probably wouldn\u2019t want to abandon them completely. I continue to use about a half-dozen of them, and I know for sure that two of them have the aforementioned permission \u201cto read and change.\u201d<\/p>\n<p>It might be safer not to use them at all, but that\u2019s inconvenient, so we need a way to use extensions more or less safely. Here\u2019s how:<\/p>\n<ul>\n<li>Don\u2019t install too many extensions. Not only do they affect computer performance, but they are also a potential attack vector, so narrow their number to just a few of the most useful.<\/li>\n<li>Install extensions only from official Web stores. There, they undergo at least some scrutiny, with security specialists filtering out those that are malicious from head to toe.<\/li>\n<li>Pay attention to the permissions that extensions require. If an extension already installed on your computer requests a new permission, that should immediately raise flags; something is probably going on. That extension might\u2019ve been hijacked or sold. And before installing any extension, it\u2019s always a good idea to look at the permissions it requires and think about whether they match the functionality of the app. If you can\u2019t find a logical explanation for the permissions, it\u2019s probably better not to install that extension.<\/li>\n<li>Use a good security solution. <a href=\"https:\/\/www.kaspersky.com\/advert\/total-security-multi-device?redef=1&amp;THRU&amp;reseller=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____ktsmd___\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Internet Security<\/a> can detect and neutralize malicious code in browser extensions. Our antivirus solutions use a vast database of malicious extensions that is frequently updated \u2014 and we discover new malicious Chrome extensions almost every day.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Browser extensions are handy, but they can also be really dangerous. Here\u2019s what can go wrong and what you can do about it.<\/p>\n","protected":false},"author":675,"featured_media":12751,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[552,2106,16,2107,21,417,43,97],"class_list":{"0":"post-12750","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-adware","9":"tag-browsers","10":"tag-chrome","11":"tag-extensions","12":"tag-firefox","13":"tag-plugins","14":"tag-privacy","15":"tag-security-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/browser-extensions-security\/12750\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/browser-extensions-security\/12331\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/browser-extensions-security\/10240\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/browser-extensions-security\/14514\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/browser-extensions-security\/12390\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/browser-extensions-security\/15217\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/browser-extensions-security\/14978\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/browser-extensions-security\/19575\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/browser-extensions-security\/4691\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/browser-extensions-security\/20886\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/browser-extensions-security\/9985\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/browser-extensions-security\/11948\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/browser-extensions-security\/8855\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/browser-extensions-security\/15781\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/browser-extensions-security\/19429\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/browser-extensions-security\/19454\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/browser-extensions-security\/19457\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/security-2\/","name":"security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/12750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=12750"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/12750\/revisions"}],"predecessor-version":[{"id":19337,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/12750\/revisions\/19337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/12751"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=12750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=12750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=12750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}