Jump to content

Chrome Users Targeted By Websites Forcing Them To Install Extension To Leave


WALLONN7

Recommended Posts

The malvertising campaign redirects users to various scam sites instead of heavy malware-ridden alternatives

 

http://i1-news.softpedia-static.com/images/news2/chrome-users-targeted-by-websites-forcing-them-to-install-extension-to-leave-513237-2.jpg
 

A new malvertising campaign targeting Chrome users has users redirected to a website they couldn't leave without installing a malicious Chrome extension. 

 

While this isn't exactly the common practice among malvertising, which usually redirect people to places where stronger malware can be delivered, including ransowmare, adware, banking trojans and so on, there seems to be a trend going on lately.

Malwarebytes expert Jérôme Segura notes that recent malvertising campaigns targeting Chrome users redirect them to tech support or other scam sites, rather than malware-ridden sites.

"This malvertising flow (XML feed) shows how the user is redirected to a bogus site that is enticing them to install a Chrome extension. Enticing might in fact be a euphemism, since in this case the user is giving no choice other than “Add Extension to Leave“, while their browser is stuck in a never ending loop of fullscreen modes," Segura writes.

What happens?

So what happens once this extension is installed? It makes sure it stay in hiding by using a 1x1 pixel image as its logo, which pretty much becomes a blank space next to the Chrome menu, where extensions are present. It also hooks chrome://extensions and chrome://settings in such a way that any attempts to access those is automatically redirected to chrome://apps so that users can't get the extension uninstalled.

The bad stuff is in a couple of JavaScript files. One has a connection to a command & control server where it can receive instructions on what to do next.

"The perpetrators behind this extension are checking for certain keywords within the current URL and blocking/redirecting if the conditions are met. For instance, if the user tries to visit the Malwarebytes website, the browser will immediately get redirected, first to a YouTube video, and then to one of various Potentially Unwanted Programs (PUPs), get-rich-quick schemes, and various other scams," the blog reads.

While Chrome extensions are great to expand the functionality of the browser, there are also many bogus tools out there and some that have strong privacy and security implications.

The extension discovered by the security researchers has already been flagged and pulled from the Google store. If your computer is already affected by it, installing an antivirus seems to be the only way to get rid of it since you can't actually uninstall it.

 

Source

Link to comment
Share on other sites


  • Views 914
  • Created
  • Last Reply

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...