2

Chrome extensions with 1.4 million installs track users for affiliate payment sc...

 2 years ago
source link: https://www.techspot.com/news/95831-chrome-extensions-14-million-installs-track-users-affiliate.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Chrome extensions with 1.4 million installs track users for affiliate payment scam

Check the list to see if you installed any

By Daniel Sims 54 minutes ago

Why it matters: Although browser extensions can be useful, downloading them always comes with some amount of risk because they are common vectors for malware. McAfee's recent investigation into a group of Chrome extensions shows that even popular ones could be fronts for scams.

This week, a report from McAfee's security researchers highlighted five Google Chrome extensions that tracked users and manipulated the websites they visited. Collectively, almost a million and a half users installed the extensions.

Two of the extensions masqueraded as functions letting users hold Netflix watch parties, while another impersonated a screenshot capture extension. Most pertinent to the scammers' goals were extensions for price tracking and automatically detecting flash sales.

Ultimately, the malware sought to steal affiliate sales commissions from websites where their victims shopped, such as bestbuy.com (shown in the video above). After installation, the extensions would track users' browsing activity and send it to the scammers' servers.

2022-08-31-image-28.jpg

Then, the scammers would add code manipulating the users' cookies and redirecting them to fraudulent URLs. When a target purchased something on an affected website, the extension developers got a cut of the sale by fooling the website into thinking they directed the victim there. Some of the extensions tried to avoid security programs by delaying their malicious activity until 15 days after installation.

Google has already removed the fraudulent extensions from Chrome's web store, but users should check if they've installed the following and uninstall them immediately:

  • Netflix Party
  • Netflix Party 2
  • FileShope – Price Tracker Extension
  • Full Page Screenshot Capture – Screenshotting
  • AutoBuy Flash Sales

McAfee's recent findings are only the latest examples of extensions that track users to hijack their shopping activity. In March, the company reported on another group of extensions that redirected users to phishing websites to steal gift card codes.

Like the fraudulent extensions from this month, the scams from March masqueraded as watch party apps. The extensions would monitor users' browsing habits and redirect them when they navigated to the gift card pages for stores like Target, Macy's, Nike, and others. The developers also created fake review websites to inflate the extensions' review scores on Chrome's web store, faking an air of authenticity.

When downloading extensions, even popular ones with high review scores, users should always check what permissions they grant. It's also a good idea to search lists of known fraudulent extensions.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK