Avast experts have discovered malware hidden in at least 28 third-party extensions for Google Chrome and Microsoft Edge. All of these extensions were associated with popular platforms: for the Google Chrome browser, this is Video Downloader for Facebook, Vimeo Video Downloader, Instagram Story Downloader, VK Unblock, and there are several extensions for the Microsoft Edge browser on the list of specialists. The complete list looks like this:
The detected malware allows extensions to download additional malicious programs to the user’s computer, can redirect victims’ traffic to advertising or phishing sites, steal personal data (for example, birth dates, email addresses) and information about active devices.
Considering the number of downloads of these extensions in app stores, approximately 3,000,000 people could be affected worldwide.
Users also complain that these extensions interfere with their online experience and redirect them to other sites. Each time a link is clicked, the extensions send information about this action to the hacker’s C&C server. Then the attacker can issue a command to redirect a person from a real link to a new, malicious URL, and only then sends them to the site he originally planned to visit.
All this jeopardizes the privacy of users, since a log of all clicks is transferred to third-party intermediary sites. Also, hackers extract and collect dates of birth, email addresses and device information, including the time of the first and last login, device name, operating system, browser used and its version, even IP addresses (can be used to determine the geographic location of the victim) …
Avast researchers believe that the goal of this campaign is primarily to monetize traffic: for each redirect to a third-party domain, cybercriminals receive a payment. Also, extensions can redirect users to advertising or phishing sites.
“We assume that either these extensions were specially created using embedded malware, or the authors waited until the extensions became popular and then released updates containing malware. It is also possible that the developers sold the original extensions, and the buyer embedded malware in them, ”notes Ian Rubin, malware researcher at Avast.
The Avast Threat Intelligence team began investigating this threat in November 2020, but believes that it could have existed for years, just no one noticed it. There are user reviews in the Chrome store that mention link hijacking, and they are dated December 2018.
“Backdoors in extensions are well hidden, and extensions only start showing malicious activity a few days after installation: this complicates the task for any security solution,” adds Ian Rubin.
At the moment, all infected extensions are still available for download. Avast contacted the Microsoft and Google Chrome teams and reported the findings. Both Microsoft and Google have confirmed that they are currently investigating this issue. In the meantime, Avast recommends that users disable or remove extensions temporarily until the problem is resolved, and then scan the PC and remove malware if found.