094 90 48200    Get SUPPORT

Aniar IT Services Blog

Watch Out for Malicious Browser Extensions

Watch Out for Malicious Browser Extensions

Browser extensions are nifty little programs that can be implemented into your web browser itself, adding onto its capabilities and utility… at least, that’s the concept. Unfortunately, these programs also give cybercriminals a means of secretly launching an attack. The security firm Avast recently identified 28 such third-party extensions that have been installed—according to the download numbers, at least—by about three million people on Google Chrome and Microsoft Edge combined.

How Do These Threats Work?

These attacks work similarly to how a phishing attack or a spoofed email would, as a user is promised one thing but winds up receiving something very different. While a malicious application may perform the task it claims to, it also may redirect the user to a phishing website or ad (making the cybercriminal some money) or simply steal some of the user’s information, like their birthday or email address.

In the case of these extensions, the code needed for several different malicious operations was present, including:

  • Redirecting traffic to advertisements (falsely generating revenue)
  • Redirecting traffic to phishing websites
  • Collecting personal data
  • Collecting browsing history
  • Downloading additional malware onto a user’s device

Avast’s researchers believe that only the first code was actively utilized, generating ill-gotten revenue for the creators of these extensions. Regardless, these extensions should be removed from any systems on your business’ network that they may be installed on.

The impacted extensions are as follows:

Chrome

  • App Phone for Instagram
  • Direct Message for Instagram
  • DM for Instagram
  • Downloader for Instagram
  • Invisible mode for Instagram Direct Message
  • Odnoklassniki UnBlock. Works quickly.
  • Spotify Music Downloader
  • Stories for Instagram
  • The New York Times News
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Vimeo™ Video Downloader
  • VK UnBlock. Works fast.
  • Zoomer for Instagram and Facebook

Edge

  • DM for Instagram
  • Downloader for Instagram
  • Instagram App with Direct Message DM
  • Instagram Download Video & Image
  • Pretty Kitty, The Cat Pet
  • SoundCloud Music Downloader
  • Stories for Instagram
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Video Downloader for YouTube
  • Vimeo™ Video Downloader
  • Volume Controller

Again, we encourage you to check your company’s network to ensure that these extensions are not installed in any of your users’ browsers, and that you encourage your employees to do the same.

Not sure how to go about doing so? Aniar IT Services can help. As a managed service provider, our services include remotely monitoring your business’ technology and network for threats while keeping abreast of this kind of news so that we can proactively resolve any issues that may influence your operations. 

Find out more today by reaching out to us at 094 90 48200.

Is 2021 the Year Your Business Embraces VoIP? (It ...
Even Santa’s Workshop Can Benefit from Managed Ser...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 21 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Cloud Google Efficiency Email Privacy User Tips Workplace Tips Network Security Internet Hosted Solutions IT Support Innovation Microsoft Data Software Communication Mobile Device Hackers Users Hardware VoIP Collaboration Data Backup Smartphones Business Small Business Phishing Data Recovery IT Services Managed IT Services Android Cybersecurity Network Mobile Devices Cloud Computing Computer Tech Term Smartphone Windows 10 Communications Managed Service Malware Gadgets Backup Miscellaneous Windows Outsourced IT Business Continuity Browser Saving Money Artificial Intelligence Passwords Internet of Things Upgrade Spam Business Management BDR Quick Tips Information Disaster Recovery Facebook Office 365 Save Money Chrome Social Media Server Covid-19 Holiday How To Router Automation Wi-Fi BYOD Microsoft Office Applications Computers Data Security Encryption Patch Management Paperless Office Mobile Office Data Storage Word Cybercrime Blockchain Operating System Apps Networking Windows 7 Government Settings Remote Work Virtualization Human Resources Infrastructure Telephone System Mobile Device Management Vendor Staff Ransomware Bandwidth History Remote Two-factor Authentication Vulnerability Display Data Protection Money HIPAA Data Breach Managed IT Connectivity Remote Monitoring CES Procurement Website OneNote Redundancy Voice over Internet Protocol Health Fraud Telephone Systems Unsupported Software Social Engineering Servers Content Management Avoiding Downtime Employee/Employer Relationship Managed Services Net Neutrality Keyboard Wireless VPN WiFi Password Comparison Spam Blocking Help Desk Machine Learning Compliance Digital Signage Google Docs Law Enforcement Processor Bring Your Own Device Cryptocurrency IT Management Software as a Service Augmented Reality Conferencing Training Telephony Vendor Management App Scam Hard Drive Business Intelligence Identity Theft Update Meetings Google Drive Botnet Office Audit Virtual Assistant Education Managed Services Provider Private Cloud IT Plan Sports Big Data Business Technology Access Control Managed IT services Cast Search Engine Travel Supply Chain Management Procedure Proactive IT Evernote Cleaning Cables Trend Micro Recycling Devices Tools Work/Life Balance SMS OLED Using Data Printers Public Cloud Password Management Social Frequently Asked Questions Recovery Batteries PCI DSS Sales Firewall Authentication Start Menu Remote Computing IT Assessment Bing Cache FinTech MSP Practices Sync Default App Multi-Factor Security Shopping Entertainment Warranty eWaste Thought Leadership Virtual Machine Millennials AI Computer Fan Employee Amazon Biometric Security Information Technology Data loss OneDrive Software Tips NIST Excel Virtual Private Network SharePoint Unified Threat Management Windows Server 2008 R2 HVAC Wireless Internet Apple File Sharing ISP Charger Hosted Computing IT Infrastructure Social Network Printer Legal Value Hypervisor Workforce FENG Amazon Web Services Accountants Flash Manufacturing Computing Cortana Alert Specifications Copiers Tip of the week Remote Workers End of Support Mobile Computing Password Manager Nanotechnology USB Peripheral Cryptomining Wireless Charging Inventory Investment Trending Printing YouTube Mouse Criminal Twitter Going Green 5G Google Search HaaS Virtual Reality Professional Services Smart Tech Development Solid State Drive Safe Mode Security Cameras Digital Signature Windows Server 2008 Managed IT Service Smart Office Business Mangement Windows 10s Shortcuts Electronic Medical Records Wire HBO Project Management Quick Tip The Internet of Things RMM Downtime Remote Worker Database Google Apps ROI Personal Hacker Screen Mirroring Microchip Addiction Saving Time Telecommuting Policy Save Time Online Shopping Cabling Fiber Optics Gmail Messaging Physical Security Smartwatch Credit Cards PDF Computer Care Employer-Employee Relationship Document Management Camera Enterprise Content Management Mobility Data Management Outlook Bitcoin Regulations Employees Root Cause Analysis Wiring Workers Skype GDPR Digitize Managing Stress Financial Customer Service Hard Drives Domains Search Windows 10 Public Speaking CrashOverride Presentation Lithium-ion battery Managed Service Provider Wireless Technology Regulation Tech Support Safety IBM Hiring/Firing Productivity Marketing Company Culture Fun Budget Emergency Personal Information Competition Customer Relationship Management IP Address