2 min read

Is that Chrome extension filled with malware?

Is that Chrome extension filled with malware?
3:27

If you're utilizing Google Chrome for your business operations, chances are you're well-acquainted with browser extensions. These handy tools have the power to elevate your browsing journey by blocking pesky ads and minimizing distractions.

 

Extensions are incredibly popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

Malware, short for malicious software, is crafted with the intention of wreaking havoc on computers, servers, or networks. Cyber criminals utilize malware to pilfer data, seize control of systems, and potentially drain your bank accounts.

With a staggering 65% of the global browser market share, Google Chrome reigns as the most widely used browser. This level of popularity, however, also makes Chrome a prime target for cyber criminals. While some cyber attacks may exploit vulnerabilities within the browser itself, the easier route for targeting Chrome users is through malicious extensions embedded with malware.

Although Google keeps a tight watch on its Chrome Web Store, the risk is still there. A recent report claims 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

It is astonishing to note that numerous malicious extensions lingered in the Chrome Web Store for an extended period. On average, extensions teeming with malware were accessible for 380 days, while those containing vulnerable code could be downloaded for approximately 1,248 days. One infamous extension even managed to remain available for a staggering 8 and a half years before finally being taken down.

 

So, how can you protect yourself and your business from these malicious extensions? Here are five steps we recommend.

  1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.
  2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.
  3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defense if you accidentally install a malicious extension.
  4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.
  5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

As the leading browser worldwide, Chrome is a prime target for cyber threats. While Google's security team diligently reviews each Chrome extension for safety, maintaining vigilance is essential in safeguarding your browsing experience.

 

If you’re unsure whether your extensions are safe or not, or you’d like more advice around keeping your business secure, our team can help. Get in touch.

Don’t Be a Victim - Common Mobile Malware Traps

Don’t Be a Victim - Common Mobile Malware Traps

Your smartphone is more than just a gadget; it’s your digital wallet, communication hub, and personal assistant—consolidated into one portable...

Read More
Explaining Cybersecurity Audits (And the Three Tips for Running One)

Explaining Cybersecurity Audits (And the Three Tips for Running One)

You need more than the latest antivirus software to ensure your company’s network is secure. A cybersecurity audit helps you create a complete...

Read More
The Biggest Vulnerabilities that Hackers are Feasting on Right Now

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code....

Read More