{"id":27056,"date":"2023-12-15T16:11:33","date_gmt":"2023-12-15T16:11:33","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/dangerous-browser-extensions-2023\/27056\/"},"modified":"2023-12-15T16:11:46","modified_gmt":"2023-12-15T16:11:46","slug":"dangerous-browser-extensions-2023","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/dangerous-browser-extensions-2023\/27056\/","title":{"rendered":"Dangerous browser extensions"},"content":{"rendered":"<p>We often write here on these blog pages about how browser extensions can be very dangerous. To illustrate this fact, we decided to dedicate an article to it. In this post, we\u2019ll look at the most interesting, unusual, widespread, and dangerous cases involving malicious extensions in 2023. We\u2019ll also discuss what these extensions were capable of \u2014 and, of course, how to protect yourself from them.\n<\/p>\n<h2>Roblox extensions with a backdoor<\/h2>\n<p>\nTo set the tone and also highlight one of the biggest concerns associated with dangerous extensions, let\u2019s start with a story that began last year. In November 2022, two malicious extensions with the same name \u2014 SearchBlox \u2014 were <a href=\"https:\/\/twitter.com\/Roblox_RTC\/status\/1595236988533313536\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> in the Chrome Web Store, the official store for Google Chrome browser extensions. One of these extensions had over 200,000 downloads.<\/p>\n<p>The declared purpose of the extensions was to search for a specific player on the Roblox servers. However, their actual purpose was to hijack Roblox players\u2019 accounts and steal their in-game assets. After information about these malicious extensions <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoored-chrome-extension-installed-by-200-000-roblox-players\/\" target=\"_blank\" rel=\"nofollow noopener\">was published<\/a> on BleepingComputer, they were removed from the Chrome Web Store, and automatically deleted from the devices of users who\u2019d installed them.<\/p>\n<div id=\"attachment_50065\" style=\"width: 1262px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15160928\/dangerous-browser-extensions-2023-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50065\" class=\"size-full wp-image-50065\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15160928\/dangerous-browser-extensions-2023-01.jpg\" alt=\"SearchBlox: malicious browser extensions with a backdoor in the Chrome Web Store\" width=\"1252\" height=\"630\"><\/a><p id=\"caption-attachment-50065\" class=\"wp-caption-text\">Malicious SearchBlox extensions published in the Google Chrome Web Store hijacked Roblox players\u2019 accounts. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoored-chrome-extension-installed-by-200-000-roblox-players\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>However, the Roblox story doesn\u2019t end there. In August 2023, two more malicious extensions of a similar nature \u2014 <a href=\"https:\/\/devforum.roblox.com\/t\/psa-do-not-install-chrome-webstore-plugin-rotracker-which-is-being-advertised-on-the-website\/2561666\" target=\"_blank\" rel=\"nofollow noopener\">RoFinder and RoTracker<\/a> \u2014 were discovered in the Chrome Web Store. Just like SearchBlox, these plugins offered users the ability to search for other players on the Roblox servers, but in reality had a backdoor built into them. The Roblox user community eventually managed to get these extensions removed from the store as well.<\/p>\n<div id=\"attachment_50060\" style=\"width: 1264px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15160940\/dangerous-browser-extensions-2023-02.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50060\" class=\"size-full wp-image-50060\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15160940\/dangerous-browser-extensions-2023-02.png\" alt=\"RoTracker: another malicious browser extension with a backdoor\" width=\"1254\" height=\"697\"><\/a><p id=\"caption-attachment-50060\" class=\"wp-caption-text\">The RoTracker malicious extension, also hosted on the Google Chrome Web Store. <a href=\"https:\/\/devforum.roblox.com\/t\/psa-do-not-install-chrome-webstore-plugin-rotracker-which-is-being-advertised-on-the-website\/2561666\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>This suggests that the quality of moderation at the world\u2019s most official platform for downloading Google Chrome extensions leaves much to be desired, and it\u2019s easy enough for creators of malicious extensions to push their creations in there. To get moderators to spot dangerous extensions and remove them from the store, reviews from affected users are rarely sufficient \u2014 it often requires efforts from the media, security researchers, and\/or a large online community.\n<\/p>\n<h2>Fake ChatGPT extensions hijacking Facebook accounts<\/h2>\n<p>\nIn March 2023, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-accounts-hijacked-by-new-malicious-chatgpt-chrome-extension\/\" target=\"_blank\" rel=\"nofollow noopener\">two malicious extensions<\/a> were <a href=\"https:\/\/thehackernews.com\/2023\/03\/fake-chatgpt-chrome-extension-hijacking.html\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> in the Google Chrome Web Store within a few days of each other \u2014 both taking advantage of the hype surrounding the ChatGPT AI service. One of these was an infected copy of the legitimate \u201cChatGPT for Google\u201d extension, offering integration of ChatGPT\u2019s responses into search engine results.<\/p>\n<p>The infected \u201cChatGPT for Google\u201d extension was uploaded to the Chrome Web Store on February 14, 2023. Its creators waited for some time and only started actively spreading it precisely a month later, on March 14, 2023, using Google Search ads. The criminals managed to attract around a thousand new users per day, resulting in over 9000 downloads by the time the threat was discovered.<\/p>\n<div id=\"attachment_50063\" style=\"width: 926px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15160956\/dangerous-browser-extensions-2023-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50063\" class=\"size-full wp-image-50063\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15160956\/dangerous-browser-extensions-2023-03.jpg\" alt=\"Infected version of the \" width=\"916\" height=\"860\"><\/a><p id=\"caption-attachment-50063\" class=\"wp-caption-text\">The infected version of \u201cChatGPT for Google\u201d looked just like the real thing. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-accounts-hijacked-by-new-malicious-chatgpt-chrome-extension\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The trojanized copy of \u201cChatGPT for Google\u201d functioned just like the real one, but with extra malicious functionality: the infected version included additional code designed to steal Facebook session cookies stored by the browser. Using these files, the attackers were able <a href=\"https:\/\/www.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/49845\/\" target=\"_blank\" rel=\"noopener nofollow\">to hijack the Facebook accounts<\/a> of users who\u2019d installed the infected extension.<\/p>\n<p>The compromised accounts could then be used for illegal purposes. As an example, the researchers mentioned a Facebook account belonging to an RV seller, which started promoting ISIS content after being hijacked.<\/p>\n<div id=\"attachment_50069\" style=\"width: 4253px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161017\/dangerous-browser-extensions-2023-04.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50069\" class=\"size-full wp-image-50069\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161017\/dangerous-browser-extensions-2023-04.jpg\" alt=\"Hijacked Facebook account promoting ISIS content\" width=\"4243\" height=\"4332\"><\/a><p id=\"caption-attachment-50069\" class=\"wp-caption-text\">After being hijacked, the Facebook account started promoting ISIS content. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-accounts-hijacked-by-new-malicious-chatgpt-chrome-extension\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>In the other case, fraudsters created a completely original extension called \u201cQuick access to Chat GPT\u201d. In fact, the extension actually did what it promised, acting as an intermediary between users and ChatGPT using the AI service\u2019s official API. However, its real purpose was again to steal Facebook session cookies, allowing the extension\u2019s creators to hijack Facebook business accounts.<\/p>\n<div id=\"attachment_50064\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161036\/dangerous-browser-extensions-2023-05.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50064\" class=\"size-full wp-image-50064\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161036\/dangerous-browser-extensions-2023-05.jpg\" alt=\"Quick access to Chat GPT malicious extension\" width=\"1400\" height=\"592\"><\/a><p id=\"caption-attachment-50064\" class=\"wp-caption-text\">\u201cQuick access to Chat GPT\u201d malicious extension. <a href=\"https:\/\/labs.guard.io\/fakegpt-new-variant-of-fake-chatgpt-chrome-extension-stealing-facebook-ad-accounts-with-4c9996a8f282\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Most interestingly, to promote this malicious extension, the perpetrators used Facebook ads, paid for by \u2014 you guessed it \u2014 the business accounts they\u2019d already hijacked! This cunning scheme allowed the creators of \u201cQuick access to Chat GPT\u201d to attract a couple of thousand new users per day. In the end, both malicious extensions were removed from the store.\n<\/p>\n<h2>ChromeLoader: pirated content containing malicious extensions<\/h2>\n<p>\nOften, creators of malicious extensions don\u2019t place them in the Google Chrome Web Store, and distribute them in other ways. For example, earlier this year researchers noticed a new malicious campaign related to the ChromeLoader malware, already well-known in the cybersecurity field. The primary purpose of this Trojan is to install a malicious extension in the victim\u2019s browser.<\/p>\n<p>This extension, in turn, displays intrusive advertisements in the browser and spoofs search results with links leading to fake prize giveaways, surveys, dating sites, adult games, unwanted software, and so on.<\/p>\n<p>This year, attackers have been using a variety of pirated content as bait to make victims install ChromeLoader. For example, in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chromeloader-campaign-lures-with-malicious-vhds-for-popular-games\/\" target=\"_blank\" rel=\"nofollow noopener\">February 2023<\/a>, researchers reported the spread of ChromeLoader through <a href=\"https:\/\/en.wikipedia.org\/wiki\/VHD_(file_format)\" target=\"_blank\" rel=\"nofollow noopener\">VHD files<\/a> (a disk image format) disguised as hacked games or game \u201ccracks\u201d. Among the games used by the distributors were Elden Ring, ROBLOX, Dark Souls 3, Red Dead Redemption 2, Need for Speed, Call of Duty, Portal 2, Minecraft, Legend of Zelda, Pokemon, Mario Kart, Animal Crossing, and more. As you might guess, all these VHD files contained the malicious extension installer.<\/p>\n<p>A few months later, in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites\/\" target=\"_blank\" rel=\"nofollow noopener\">June 2023<\/a>, another group of researchers released a detailed report on the activities of the same ChromeLoader, detailing its spread through a network of sites offering pirated music, movies, and once again, computer games. In this campaign, instead of genuine content, <a href=\"https:\/\/en.wikipedia.org\/wiki\/VBScript\" target=\"_blank\" rel=\"nofollow noopener\">VBScript<\/a> files were downloaded onto victims\u2019 computers, which then loaded and installed the malicious browser extension.<\/p>\n<div id=\"attachment_50062\" style=\"width: 2020px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161049\/dangerous-browser-extensions-2023-06.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50062\" class=\"size-full wp-image-50062\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161049\/dangerous-browser-extensions-2023-06.jpg\" alt=\"ChromeLoader malware installs a malicious browser extension\" width=\"2010\" height=\"1276\"><\/a><p id=\"caption-attachment-50062\" class=\"wp-caption-text\">One of the sites that distributed the ChromeLoader malware under the guise of pirated content. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Although the altered search results quickly alert victims to the presence of the dangerous extension in their browser, getting rid of it isn\u2019t so easy. ChromeLoader not only installs the malicious extension but also adds scripts and Windows Task Scheduler tasks to the system that reinstall the extension every time the system reboots.\n<\/p>\n<h2>Hackers reading Gmail correspondence using a spy extension<\/h2>\n<p>\nIn March 2023, the German Federal Office for the Protection of the Constitution and the South Korean National Intelligence Agency <a href=\"https:\/\/www.verfassungsschutz.de\/SharedDocs\/publikationen\/EN\/prevention\/2023-03-20-joint-cyber-security-advisory-korean.html\" target=\"_blank\" rel=\"nofollow noopener\">issued<\/a> a joint report on the activities of the <a href=\"https:\/\/securelist.com\/the-kimsuky-operation-a-north-korean-apt\/57915\/\" target=\"_blank\" rel=\"noopener\">Kimsuky<\/a> cybercriminal group. This group uses an infected extension for Chromium-based browsers \u2014 Google Chrome, Microsoft Edge, as well as the South Korean browser Naver Whale \u2014 to read the Gmail correspondence of their victims.<\/p>\n<p>The attack begins with the perpetrators sending emails to specific individuals of interest. The email contains a link to a malicious extension called AF, along with some text convincing the victim to install the extension. The extension starts working when the victim opens Gmail in the browser where it\u2019s installed. AF then automatically sends the victim\u2019s correspondence to the hackers\u2019 C2 server.<\/p>\n<p>Thus, Kimsuky manages to gain access to the contents of the victim\u2019s mailbox. What\u2019s more, they don\u2019t need to resort to any tricks to hack into this mailbox; they simply bypass the two-factor authentication. As a bonus, this method allows them to do everything in a highly discreet manner \u2014 in particular, preventing Google from sending alerts to the victim about account access from a new device or suspicious location, as would be the case if the password were stolen.\n<\/p>\n<h2>Rilide: malicious extension stealing cryptocurrency and bypassing two-factor authentication<\/h2>\n<p>\nCriminals also often use malicious extensions to target cryptocurrency wallets. In particular, the creators of the Rilide extension, first discovered in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-rilide-browser-extension-to-bypass-2fa-steal-crypto\/\" target=\"_blank\" rel=\"nofollow noopener\">April 2023<\/a>, use it to track cryptocurrency-related browser activity of infected users. When the victim visits sites from a specified list, the malicious extension steals cryptocurrency wallet info, email logins, and passwords.<\/p>\n<p>In addition, this extension collects and sends browser history to the C2 server and lets the attackers take screenshots. But Rilide\u2019s most interesting feature is its ability to bypass two-factor authentication.<\/p>\n<p>When the extension detects that a user is about to make a cryptocurrency transaction on one of the online services, it injects a script into the page that replaces the confirmation code input dialog, and then steals that code. The payment recipient\u2019s wallet is replaced with one belonging to the attackers, and then, finally, the extension confirms the transaction using the stolen code.<\/p>\n<div id=\"attachment_50061\" style=\"width: 1168px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161108\/dangerous-browser-extensions-2023-07.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50061\" class=\"size-full wp-image-50061\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161108\/dangerous-browser-extensions-2023-07.jpg\" alt=\"Promotion of Rilide under the guise of a blockchain game\" width=\"1158\" height=\"935\"><\/a><p id=\"caption-attachment-50061\" class=\"wp-caption-text\">How the malicious Rilide extension was promoted on X (Twitter) under the guise of blockchain games. <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/new-rilide-stealer-version-targets-banking-data-and-works-around-google-chrome-manifest-v3\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Rilide attacks users of Chromium-based browsers \u2014 Chrome, Edge, Brave, and Opera \u2014 by imitating a legitimate Google Drive extension to avoid suspicion. Rilide appears to be freely sold on the black market, so it\u2019s used by criminals unrelated to one another. For this reason, various distribution methods have been discovered \u2014 from malicious websites and emails to infected <a href=\"https:\/\/en.wikipedia.org\/wiki\/Blockchain_game\" target=\"_blank\" rel=\"nofollow noopener\">blockchain game<\/a> installers promoted on <span style=\"text-decoration: line-through;\">Twitter<\/span> X.<\/p>\n<p>One of the particularly interesting Rilide distribution methods was through a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-malware-rilide-targets-enterprise-users-via-powerpoint-guides\/\" target=\"_blank\" rel=\"nofollow noopener\">misleading PowerPoint presentation<\/a>. This presentation posed as a security guide for Zendesk employees, but was actually a step-by-step guide for installing the malicious extension.<\/p>\n<div id=\"attachment_50067\" style=\"width: 1697px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161123\/dangerous-browser-extensions-2023-08.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50067\" class=\"size-full wp-image-50067\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161123\/dangerous-browser-extensions-2023-08.jpg\" alt=\"Rilide installation guide disguised as a cybersecurity presentation\" width=\"1687\" height=\"949\"><\/a><p id=\"caption-attachment-50067\" class=\"wp-caption-text\">A step-by-step guide for installing the malicious extension, disguised as a security presentation for Zendesk employees. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-malware-rilide-targets-enterprise-users-via-powerpoint-guides\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>Dozens of malicious extensions in the Chrome Web Store \u2014 with 87 million downloads combined<\/h2>\n<p>\nAnd, of course, one cannot forget the story of the summer when researchers discovered <a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-chrome-extensions-87-million\/48562\/\" target=\"_blank\" rel=\"noopener nofollow\">several dozen malicious extensions<\/a> in the Google Chrome Web Store, which collectively had more than 87 million downloads from the store. These were various kinds of browser plugins \u2014 from tools for converting PDF files and ad blockers to translators and VPNs.<\/p>\n<p>The extensions were added to the Chrome Web Store as far back as 2022 and 2021, so by the time they were discovered they\u2019d already been there for several months, a year, or even longer. Among reviews of the extensions, there were some complaints from vigilant users who reported that the extensions were spoofing search results with advertisements. Unfortunately, the Chrome Web Store moderators ignored these complaints. The malicious extensions were only removed from the store after two groups of security researchers brought the issue to Google\u2019s attention.<\/p>\n<div id=\"attachment_50066\" style=\"width: 1040px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161141\/dangerous-browser-extensions-2023-09.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50066\" class=\"size-full wp-image-50066\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2023\/12\/15161141\/dangerous-browser-extensions-2023-09.jpg\" alt=\"Malicious Autoskip extension for YouTube in the Google Chrome Web Store\" width=\"1030\" height=\"1210\"><\/a><p id=\"caption-attachment-50066\" class=\"wp-caption-text\">The most popular of the malicious extensions \u2014 Autoskip for YouTube \u2014 had over nine million downloads from the Google Chrome Web Store. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-chrome-extensions-with-75m-installs-removed-from-web-store\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>How to protect yourself from malicious extensions<\/h2>\n<p>\nAs you can see, dangerous browser extensions can end up on your computer from various sources \u2014including the official Google Chrome Web Store. And attackers can use them for a wide range of purposes \u2014 from hijacking accounts and altering search results to reading correspondence and stealing cryptocurrencies. Accordingly, it\u2019s important to take precautions:\n<\/p>\n<ul>\n<li>Try to avoid installing unnecessary browser extensions. The fewer extensions you have in your browser, the better.<\/li>\n<li>If you do install an extension, it\u2019s better to install it from an official store rather than from an unknown website. Sure, this doesn\u2019t eliminate the risk of encountering dangerous extensions completely, but at least the Google Chrome Web Store does take its security seriously.<\/li>\n<li>Before installing, read reviews of an extension. If there\u2019s something wrong with it, someone might have already noticed it and informed other users.<\/li>\n<li>Periodically review the list of extensions installed in your browsers. Remove any you don\u2019t use \u2014 especially ones you don\u2019t remember installing.<\/li>\n<li>And be sure to use <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on all your devices.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.<\/p>\n","protected":false},"author":2726,"featured_media":27059,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[1958,552,2106,16,1922,2107,22,187,97,529],"class_list":{"0":"post-27056","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-accounts","9":"tag-adware","10":"tag-browsers","11":"tag-chrome","12":"tag-cryptocurrencies","13":"tag-extensions","14":"tag-google","15":"tag-passwords","16":"tag-security-2","17":"tag-threats"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dangerous-browser-extensions-2023\/27056\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/dangerous-browser-extensions-2023\/26788\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/22202\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/11304\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/29546\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/26928\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dangerous-browser-extensions-2023\/29510\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dangerous-browser-extensions-2023\/28358\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dangerous-browser-extensions-2023\/36712\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dangerous-browser-extensions-2023\/11947\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/50059\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dangerous-browser-extensions-2023\/21343\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dangerous-browser-extensions-2023\/22113\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dangerous-browser-extensions-2023\/30774\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/dangerous-browser-extensions-2023\/35451\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/dangerous-browser-extensions-2023\/27296\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dangerous-browser-extensions-2023\/33072\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dangerous-browser-extensions-2023\/32695\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/extensions\/","name":"extensions"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=27056"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27056\/revisions"}],"predecessor-version":[{"id":27058,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27056\/revisions\/27058"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/27059"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=27056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=27056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=27056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}