Chrome extensions being used to inject malware

App Dev and SOA

by CBR Staff Writer| 21 January 2014

Google pulls down two Chrome extensions.

Google's Chrome browser extensions are being bought by adware distributors to add a code to control searches or slot in sponsored ads, a new report revealed.

Online ad affiliate marketers have been exploiting Google's 'autoupdating' guidelines for Chrome extensions in a bid to spread potentially unwanted programmes such as adware.

Amit Agarwal, the developer of 'Add to Feedly' extension, which has been pulled down by Google, reportedly sold the extension in late 2013 to an unidentified third party for a four-figure sum without knowing their intentions with it.

"I had no clue about the buyer and was also curious to know why would anyone pay this kind of money for such a simple Chrome extension," Agarwal added.

"These aren't regular banner ads that you see on web pages, these are invisible ads that work the background and replace links on every website that you visit into affiliate links.

"If the extension is activated in Chrome, it will inject adware into all web pages," wrote Agarwal.

Adware peddlers even exploited his extension that allowed Chrome users to add a website to Feedly with a single-click.

Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

716 people like this.
1558 people follow this.

App Dev and SOA Intelligence

Buy the latest industry research online today!
See more

Suppliers Directory

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.