当前位置:首页 >焦點 >【】

【】

2024-11-05 07:41:44 [熱點] 来源:有聲有色網

Some 37,000 people downloaded a spam version of the "AdBlock Plus" extension from Google after a fraudulent ad blocking extension snuck through Google Chrome's verification process and appeared in the Chrome Web Store yesterday.

It's easy to see why Google (and some 37,000 people) were tricked — the developer who packaged the adware into an extension used the name of an already popular and legitimate extension, AdBlock Plus.

SEE ALSO:Whoops, a hacker found a way to steal your passwords from macOS High Sierra

Additionally, the bogus page in the Chrome store came with reviews. In short, the fraudulent extension looked pretty realistic. Twitter user SwiftOnSecurity, who regularly tweets about web security, posted an image of the devious extension:

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

Google eventually caught wind of the breach and removed the deceitful adware, but it remains unclear just how harmful the malware is for those who already downloaded the extension. At least one unfortunate user says they're being hit with ads. In a screenshot of a review, posted by SwiftOnSecurity, the user states that the "instant this was added to Chrome started getting invasive ads with high volume levels opening new tabs."

Though Google took down the adware, SwiftOnSecurity was unimpressed by Google's failure to stop this malware from sneaking through and ending up conspicuously displayed in the Chrome store in the first place:

The 37,000 infected users probably hope this public shaming further motivates Google to buffer the Chrome store's verification process. After all, malicious developers will only get more inventive if the problem isn't fixed.


Featured Video For You
This guy has 1,500 passwords, and a few tips for staying secure

TopicsCybersecurity

(责任编辑:探索)

    推荐文章
    热点阅读