Is that Chrome extension filled with malware?

by | Jul 18, 2024 | Cybersecurity

Is that Chrome extension filled with malware?

by | Jul 18, 2024 | Cybersecurity

If you use Google Chrome in your business, you’re probably familiar with extensions. These useful tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are incredibly popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – that’s any software intentionally designed to cause damage to a computer, server, or network. Cyber criminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cyber criminals. While cyber attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google keeps a tight watch on its Chrome Web Store, the risk is still there. A recent report claims 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for 8 and a half years before being removed.

So, how can you protect yourself and your business from these malicious extensions? Here are five steps we recommend.

1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.

2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.

3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defense if you accidentally install a malicious extension.

4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.

5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cyber criminals. Google’s security team works hard to review every Chrome extension to ensure they are safe, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or not, or you’d like more advice around keeping your business secure, our team can help. Get in touch.

You’re ready for the upgrade… what’s holding you back?

You’re ready for the upgrade… what’s holding you back?

With the end of support for Windows 10 just over a year away, many business owners are starting to wonder why they haven’t upgraded to Windows 11 yet. Are you one of them? Research shows that most businesses could make the switch, but a surprising number are still...

How to cheat (the Blue Screen of) Death

How to cheat (the Blue Screen of) Death

If you’ve ever had the misfortune of seeing the dreaded Blue Screen of Death (BSOD) on your computer, you know just how frustrating it can be. It’s that moment when your screen turns an ominous shade of blue, and you’re left wondering what went wrong and how much work...

Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft recently announced that all Azure sign-ins will soon require multi-factor authentication (MFA) to boost security. Even if you don’t use Azure, a cloud computing platform, this is something you should pay attention to. Because MFA is one of the simplest and...

Phishing 2.0: How AI is Amplifying the Danger and What You Can Do

Phishing 2.0: How AI is Amplifying the Danger and What You Can Do

Phishing has always been a threat. Now, with AI, it's more dangerous than ever. Phishing 2.0 is here. It’s smarter, more convincing, and harder to detect. Understanding this new threat is crucial. A recent study found a 60% increase in AI-driven phishing attacks....

Microsoft takes the pain out of updates

Microsoft takes the pain out of updates

If you’re like most people, you probably find system updates a hassle. They take ages and those big downloads eat up precious bandwidth and storage. Good news then: Microsoft is about to make your life a whole lot easier with the upcoming Windows 11 24H2 update. It’s...

You’re ready for the upgrade… what’s holding you back?

You’re ready for the upgrade… what’s holding you back?

With the end of support for Windows 10 just over a year away, many business owners are starting to wonder why they haven’t upgraded to Windows 11 yet. Are you one of them? Research shows that most businesses could make the switch, but a surprising number are still...

How to cheat (the Blue Screen of) Death

How to cheat (the Blue Screen of) Death

If you’ve ever had the misfortune of seeing the dreaded Blue Screen of Death (BSOD) on your computer, you know just how frustrating it can be. It’s that moment when your screen turns an ominous shade of blue, and you’re left wondering what went wrong and how much work...

Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft recently announced that all Azure sign-ins will soon require multi-factor authentication (MFA) to boost security. Even if you don’t use Azure, a cloud computing platform, this is something you should pay attention to. Because MFA is one of the simplest and...

Phishing 2.0: How AI is Amplifying the Danger and What You Can Do

Phishing 2.0: How AI is Amplifying the Danger and What You Can Do

Phishing has always been a threat. Now, with AI, it's more dangerous than ever. Phishing 2.0 is here. It’s smarter, more convincing, and harder to detect. Understanding this new threat is crucial. A recent study found a 60% increase in AI-driven phishing attacks....

Microsoft takes the pain out of updates

Microsoft takes the pain out of updates

If you’re like most people, you probably find system updates a hassle. They take ages and those big downloads eat up precious bandwidth and storage. Good news then: Microsoft is about to make your life a whole lot easier with the upcoming Windows 11 24H2 update. It’s...

You’re ready for the upgrade… what’s holding you back?

You’re ready for the upgrade… what’s holding you back?

With the end of support for Windows 10 just over a year away, many business owners are starting to wonder why they haven’t upgraded to Windows 11 yet. Are you one of them? Research shows that most businesses could make the switch, but a surprising number are still...

How to cheat (the Blue Screen of) Death

How to cheat (the Blue Screen of) Death

If you’ve ever had the misfortune of seeing the dreaded Blue Screen of Death (BSOD) on your computer, you know just how frustrating it can be. It’s that moment when your screen turns an ominous shade of blue, and you’re left wondering what went wrong and how much work...

Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft recently announced that all Azure sign-ins will soon require multi-factor authentication (MFA) to boost security. Even if you don’t use Azure, a cloud computing platform, this is something you should pay attention to. Because MFA is one of the simplest and...

Phishing 2.0: How AI is Amplifying the Danger and What You Can Do

Phishing 2.0: How AI is Amplifying the Danger and What You Can Do

Phishing has always been a threat. Now, with AI, it's more dangerous than ever. Phishing 2.0 is here. It’s smarter, more convincing, and harder to detect. Understanding this new threat is crucial. A recent study found a 60% increase in AI-driven phishing attacks....

Microsoft takes the pain out of updates

Microsoft takes the pain out of updates

If you’re like most people, you probably find system updates a hassle. They take ages and those big downloads eat up precious bandwidth and storage. Good news then: Microsoft is about to make your life a whole lot easier with the upcoming Windows 11 24H2 update. It’s...

WATCHTOWER IT

Contact

Ready to take the next step towards cyber resilience? Reach out now, and we’ll be in touch faster than you can say ‘security’.

15 + 6 =

Take the first step towards impenetrable cyber defense. Contact us, and we’ll respond with the urgency and precision your business security demands.

WATCHTOWER IT

Contact

Ready to take the next step towards cyber resilience? Reach out now, and we’ll be in touch faster than you can say ‘security’.

11 + 9 =

Take the first step towards impenetrable cyber defense. Contact us, and we’ll respond with the urgency and precision your business security demands.