Extensions Chrome infected: 32 dangerous modules to remove urgently


Extensions Chrome infected: 32 dangerous modules to remove urgently


Be careful with the extensions you add to your web browser! Security researchers have discovered 32 Chrome add-ons that hijack search results and display advertisements.

Web browser extensions, such as Google Chrome, Mozilla Firefox, Microsoft Edge, or Safari, are very useful. These add-ons, also known as plug-ins, provide useful features that are not included by default in these software programs, such as ad-blocking, PDF conversion, task list management, spelling and grammar checking, and more. 

However, be cautious when downloading them, even from official stores, as some may contain malicious code. This is the case with 32 infected extensions recently identified by Avast security researchers on the Chrome Web Store. 

And these are not exotic extensions: with nearly 75 million downloads, they indeed deliver the services they promise. However, in addition to that, and particularly deviously, they modify search results to display sponsored links and paid results, distribute spam or unwanted advertisements, and sometimes redirect users to dangerous websites!

Extensions Chrome infected


Chrome Extensions: Redirects and Search Result Hijacking


Wladimir Palant, a cybersecurity researcher, published an article in mid-May in which he explained that he analyzed the PDF Toolbox extension, available on the Chrome Web Store and with 2 million downloads. He discovered that it contained malicious code that allowed the "serasearchtop[.]com" domain to inject arbitrary JavaScript code into any website visited by the user.

 This opens up possibilities for abuse, ranging from displaying ads to stealing sensitive information. While Wladimir Palant did not observe any malicious activity at first, he noticed that the code was activated 24 hours after the extension was installed, a behavior commonly found in malware.


As we learn in a new article, Wladimir Palant further investigated and discovered the same code, as well as two variations, in 18 other Chrome extensions (Autoskip for YouTube, Soundboost, Crystal Ad block, Brisk VPN, Clipboard Helper, and Maxi Refresher), totaling 55 million downloads. Again, the researcher did not observe any malicious behavior, but numerous reports and user comments on the Web Store indicated that these extensions were performing redirects and search result hijacking. Here is the list of the affected extensions:


  1.  Autoskip for Youtube
  2.  Soundboost
  3.  Crystal Ad block
  4.  Brisk VPN
  5.  Clipboard Helper
  6.  Maxi Refresher
  7.  Quick Translation
  8.  Easyview Reader view
  9.  PDF toolbox
  10.  Epsilon Adblocker
  11.  Craft Cursors
  12.  Alfablocker ad blocker
  13.  Zoom Plus
  14.  Base Image Downloader
  15.  Clickish fun cursors
  16.  Cursor-A custom cursor
  17.  Amazing Dark Mode
  18.  Maximum Color Changer for Youtube
  19.  Awesome Auto Refresh
  20.  Venus Adblock
  21.  Adblock Dragon
  22.  Read Reader mode
  23.  Volume Frenzy
  24.  Image download center
  25.  Font Customizer
  26.  Easy Undo Closed Tabs
  27.  Screen screen recorder
  28.  OneCleaner
  29.  Repeat button
  30.  Leap Video Downloader
  31.  Tap Image Downloader
  32.  Qspeed Video Speed Controller
  33.  HyperVolume
  34.  Light picture-in-picture


In addition to the 32 malicious extensions identified by Wladimir Palant, Avast has published a list of about 82 infected add-ons that should be urgently uninstalled, providing their unique identifiers to avoid any confusion in the names. Of course, Google has removed the reported extensions from the Chrome Web Store, as reported by The Bleeping Computer. However, it is also crucial to uninstall them from the devices on which they were downloaded with the content of the article.

Next Post Previous Post
No Comment
Add Comment
comment url