Browser Bully? Malicious Google Chrome Extension Pushes User Buttons
Chrome dominates the desktop web browser market, with more than 40 percent of users opting for Google’s internet environment. But big numbers create a big target — malicious actors are always looking for new ways to add malware, redirect requests or install malicious apps.
As noted by Malwarebytes, cybercriminals have developed a malvertising Google Chrome extension that bullies its way onto victim machines to serve incessant ad offers, fraudulent get-rich-quick schemes and tech support scams. Here’s a look at the newest rogue extension rollout.
It all starts with profiling. When users visit a compromised website, they are evaluated based on their displayed user-agent string. Next, they’re redirected to a bogus site that attempts to install a new Google Chrome extension. The site opens multiple windows along with a dialog box that provides only one choice: “Add extension to leave.”
Once installed, the new software hides itself in a 1×1 pixel image and hooks chrome://extensions and chrome://settings to chrome://apps, meaning any attempt by users to discover what extensions they’re running or to change browser settings is instead redirected to the Chrome apps page. In addition, the rogue installation communicates with a command-and-control (C&C) server to both receive instructions and relay user information.
Obfuscated Java files, meanwhile, contain more specific directions for the new extension: If users attempt to access spam- or malware-detection sites, they’re sent to a YouTube video and then a series of potentially unwanted programs in the get-rich-right-now or act-fast-for-a-great-deal vein. Additionally, if users attempt to open a new tab or type in specific keywords, they’re given a fake Microsoft warning and taken to a fraudulent tech support page.
Google has already pulled the malicious extension from its store, according to the Malwarebytes report. Users who are already infected but can’t remove the software manually should run an up-to-date malware scan.
Schemes Go Beyond a Google Chrome Extension
This rogue Google Chrome extension isn’t the only high-profile attack currently in the wild. According to Forbes, there’s a new social engineering attack trying to convince users that they’re missing a critical Chrome component. Specifically, it wants users to install the HoeflerText font package.
After visiting a compromised site, a pop-up warns users that HoeflerText wasn’t found and displays supposed version numbers showing that Chrome is out of date. If users agree to the download, they don’t get a new font but do get a fresh install of the Spora ransomware.
Most malware detection programs won’t catch this one since Hoefler is actually a real font and appears in Chromium source code. The Chrome browser itself will warn users that this package is “not commonly downloaded” and provide a convenient “discard” button, according to a NeoSmart Technologies blog.
The bottom line is that Chrome’s popularity provides security strength — Google has massive amounts of data to help improve browser defense — but also makes it a prime target for cybercriminals. Right now, the biggest user threats come in two forms: ransomware via fake fonts and malvertising through bully-based extensions. Both cover their tracks and attempt to fully compromise user machines. However, with preventative malware scans and information directly from Google, users can minimize the risk for their browsers on a daily basis.