February 23, 2017 By Douglas Bonderud 2 min read

Chrome dominates the desktop web browser market, with more than 40 percent of users opting for Google’s internet environment. But big numbers create a big target — malicious actors are always looking for new ways to add malware, redirect requests or install malicious apps.

As noted by Malwarebytes, cybercriminals have developed a malvertising Google Chrome extension that bullies its way onto victim machines to serve incessant ad offers, fraudulent get-rich-quick schemes and tech support scams. Here’s a look at the newest rogue extension rollout.

Malvertising Mania

It all starts with profiling. When users visit a compromised website, they are evaluated based on their displayed user-agent string. Next, they’re redirected to a bogus site that attempts to install a new Google Chrome extension. The site opens multiple windows along with a dialog box that provides only one choice: “Add extension to leave.”

Once installed, the new software hides itself in a 1×1 pixel image and hooks chrome://extensions and chrome://settings to chrome://apps, meaning any attempt by users to discover what extensions they’re running or to change browser settings is instead redirected to the Chrome apps page. In addition, the rogue installation communicates with a command-and-control (C&C) server to both receive instructions and relay user information.

Obfuscated Java files, meanwhile, contain more specific directions for the new extension: If users attempt to access spam- or malware-detection sites, they’re sent to a YouTube video and then a series of potentially unwanted programs in the get-rich-right-now or act-fast-for-a-great-deal vein. Additionally, if users attempt to open a new tab or type in specific keywords, they’re given a fake Microsoft warning and taken to a fraudulent tech support page.

Google has already pulled the malicious extension from its store, according to the Malwarebytes report. Users who are already infected but can’t remove the software manually should run an up-to-date malware scan.

Schemes Go Beyond a Google Chrome Extension

This rogue Google Chrome extension isn’t the only high-profile attack currently in the wild. According to Forbes, there’s a new social engineering attack trying to convince users that they’re missing a critical Chrome component. Specifically, it wants users to install the HoeflerText font package.

After visiting a compromised site, a pop-up warns users that HoeflerText wasn’t found and displays supposed version numbers showing that Chrome is out of date. If users agree to the download, they don’t get a new font but do get a fresh install of the Spora ransomware.

Most malware detection programs won’t catch this one since Hoefler is actually a real font and appears in Chromium source code. The Chrome browser itself will warn users that this package is “not commonly downloaded” and provide a convenient “discard” button, according to a NeoSmart Technologies blog.

The bottom line is that Chrome’s popularity provides security strength — Google has massive amounts of data to help improve browser defense — but also makes it a prime target for cybercriminals. Right now, the biggest user threats come in two forms: ransomware via fake fonts and malvertising through bully-based extensions. Both cover their tracks and attempt to fully compromise user machines. However, with preventative malware scans and information directly from Google, users can minimize the risk for their browsers on a daily basis.

More from

How will the Merck settlement affect the insurance industry?

3 min read - A major shift in how cyber insurance works started with an attack on the pharmaceutical giant Merck. Or did it start somewhere else?In June 2017, the NotPetya incident hit some 40,000 Merck computers, destroying data and forcing a months-long recovery process. The attack affected thousands of multinational companies, including Mondelēz and Maersk. In total, the malware caused roughly $10 billion in damage.NotPetya malware exploited two Windows vulnerabilities: EternalBlue, a digital skeleton key leaked from the NSA, and Mimikatz, an exploit…

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

ICS CERT predictions for 2024: What you need to know

4 min read - As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure.Kaspersky just released their ICS CERT Predictions for this year, outlining the key cybersecurity challenges industrial enterprises will face in the year ahead. The forecasts emphasize the persistent nature of ransomware threats, the increasing prevalence of cosmopolitical hacktivism, insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today