Skip to main content

Chrome extensions with 1.4M users may have stolen your data

McAfee researchers have discovered various Google Chrome extensions that steal browsing activity, with the add-ons racking up more than a million downloads.

As reported by Bleeping Computer, threat analysts at the digital security company have come across a total of five such malicious extensions.

Google Chrome icon in mac dock.
PixieMe/Shutterstock

With more than 1.4 million downloads, the extensions have tricked an unprecedented number of individuals into adding them to their browsers. The extensions in question that have been tracked down thus far are:

  • Netflix Party (mmnbenehknklpbendgmgngeaignppnbe) — 800,000 downloads
  • Netflix Party 2 (flijfnhifgdcbhglkneplegafminjnhn) — 300,000 downloads
  • Full Page Screenshot Capture — Screenshotting (pojgkmkfincpdkdgjepkmdekcahmckjp) — 200,000 downloads
  • FlipShope — Price Tracker Extension (adikhbfjdbjkhelbdnffogkobkekkkej) — 80,000 downloads
  • AutoBuy Flash Sales (gbnahglfafmhaehbdmjedfhdmimjcbed) — 20,000 downloads

Once one of the extensions listed above has been installed onto Chrome, it can subsequently detect and observe when the user opens an e-commerce website on their browser. The cookie that is generated by the visitor is altered in order to make it seem they arrived at the site via a referrer link. Ultimately, whoever is behind the extensions can then receive an affiliate fee should the target buy anything from these sites.

All the extensions actually deliver on whatever functionality is listed on their Chrome web store pages. Coupled with the fact that they showcase a user base in the tens or hundreds of thousands, it may convince many that they’re safe to download if they’re being utilized by so many individuals.

While the Netflix Party extensions have been taken down, the screenshot and price tracker ones are still live on the Chrome web store.

As for how the extensions work, McAfee detailed how the web app manifest — an element controlling how the add-ons run on the browser — executes a multifunctional script, allowing browsing data to be sent directly to the attackers through a certain domain that they’ve registered.

Once a user visits a new URL, their browsing data is sent with the use of POST requests. Such information includes the website address itself (in base64 form), the user ID, device location (country, city, and zip code), and a referral URL that’s encoded.

To avoid being detected, some of the extensions won’t activate their malicious tracking activity until 15 days after it’s been installed by the target. Similarly, we’ve recently seen how threat actors delay their malware being loaded onto a system for up to a month.

Hackers have increasingly relied on hiding malicious codes and malware in free Windows software and downloads. Most recently, they’ve been targeting users with space images, as well as trying to breach systems via Windows Calculator.

Editors' Recommendations

Zak Islam
Computing Writer
Zak Islam was a freelance writer at Digital Trends covering the latest news in the technology world, particularly the…
Install these Chrome extensions on your relative’s new laptop
Person typing on a laptop.

So, your older, possibly not-so-tech-savvy relative got a new laptop for the holidays and you've been called upon to help them set it up. One area people tend to forget about is adding browser extensions to Google Chrome to customize their browsing experience and add some helpful tools as well.

To help you and your relative narrow down your choices in the Chrome Web Store, we've put together a quick list of some of the best Chrome extensions around for shopping, ad blocking, productivity, fun, and more.

Read more
The best Google Chrome extensions
storyblocks creative survey generations businessman working from home on laptop  sitting balcony

Google's Chrome is a fine browser on its own -- it's fast, light, and doesn't get in the way of the content you want to see. But what makes Chrome unique, perhaps even powerful, is when you add Chrome extensions and apps to your personal installation. There are tens of thousands to choose from on the Chrome Web Store, most of which (despite the name) are free. Some of the apps in the Web Store will be familiar to those you might find in the Google Play Store or iOS App Store.

Others, however, are completely unique to Chrome. These extensions can be installed on Chrome for Windows, MacOS, Linux, and also Chrome OS-based devices like a Chromebook laptop. However, they won't work on mobile versions of the Chrome browser for Android or iOS.

Read more
Google tries to scare Edge users away from installing Chrome extensions
Microsoft Edge logo.

Microsoft has been promoting its Edge browser as a faster and more modern version of the much-hated Internet Explorer, as it is based on the same Chromium architecture as Google Chrome. That also means that it supports Chrome extensions. However, Google is trying to warn Edge users away from the extensions in its Chrome Web Store.

First spotted by Windows Latest, Edge users see a banner at the top of the page when they view an extension in the Chrome Web Store. "Google recommends switching to Chrome to use extensions securely," it reads, followed by a link to download the Google Chrome browser.

Read more