Blog

Would you like a serving of malware with that Chrome extension?

Image

If your business relies on Google Chrome, you’re likely acquainted with extensions. These handy tools can significantly enhance your browsing experience by offering features like ad blocking and distraction reduction.

The appeal of extensions lies in their ability to add substantial functionality to your browser. However, just as caution is advised when downloading new apps on your smartphone, it’s crucial to be wary when adding new extensions to your browser. This is because extensions can pose a malware risk.

Malware, short for malicious software, refers to any software specifically designed to harm a computer, server, or network. Cybercriminals deploy malware to steal data, control systems, and even deplete bank accounts.

With Google Chrome commanding approximately 65% of the global browser market, it stands as the most popular browser, making it an attractive target for cybercriminals. While some cyberattacks exploit browser vulnerabilities, an easier method for targeting Chrome users is through malicious extensions laden with malware.

Despite Google's vigilant monitoring of its Chrome Web Store, risks persist. A recent report indicated that from July 2020 to February 2023, 280 million users downloaded a malware-infected Chrome extension. This staggering number underscores the need for caution.

Alarmingly, many malicious extensions remained accessible on the Chrome Web Store for extended periods. On average, malware-infested extensions were available for 380 days, while those with vulnerable code persisted for about 1,248 days. Notably, one particularly infamous extension was downloadable for 8.5 years before its removal.

 

To safeguard your business from these harmful extensions, we recommend the following five steps:

  1. External Reviews: Given that ratings and reviews on the Chrome Web Store can be unreliable (many malicious extensions lack reviews), seek out external reviews from reputable tech sites to assess an extension's safety.

  2. Permissions: Be wary if an extension requests more permissions than necessary. If a new extension demands extensive access to your data or system, this could be a warning sign.

  3. Security Software: Employ robust security software to detect malware before it can cause damage. This serves as your last line of defense should you inadvertently install a malicious extension.

  4. Necessity: Before adding new software or browser extensions, evaluate whether you genuinely need them. Often, similar functionality can be achieved by simply visiting a website.

  5. Trusted Sources: Only download extensions from reputable sources or well-known software providers. This greatly minimizes the risk of installing harmful extensions.

 

Given Chrome’s popularity, it will always be a prime target for cybercriminals. Although Google’s security team diligently reviews every Chrome extension to ensure safety, vigilance remains essential. If you’re uncertain about the safety of your extensions or need further advice on securing your business, our team is here to help. Feel free to reach out to us.

About Us

Founded in 2000, Computer Concepts is a computer, networking, & managed service company located in Lafayette, LA.

PH: 337-485-5510

305 Fairlane Dr. Lafayette, LA

computer concepts logo