F Following a survey by Internet security experts with AdGuard Google removed an assortment of fake AdBlockers from its Chrome Store, citing how the code hidden in their scripts was able to be used to collect unauthorized informati from user browsing sessis and manipulate the behavior of their browsers.
"All the extensis I've highlighted are simple scams with a few lines of code and analytic code added by the authors.", Said Andrew Meshkov, a security analyst with a cybersecurity firm, AdGuard . "Instead of using complicated names, they now spoof the keywords in the descripti of the extensi trying to achieve the best search results."
Some of the AdBlockers csidered fake include five-star titles like "SuperBlock – AdBlocker" and "AdRemover for Google Chrome" which has been downloaded 10 milli times before.
Amg the other fake titles include "uBlock – AdBlocker" and "Best Ad AdBlocking Extensi" "SuperBlock Extended: AdBlocker", which claims more than 5 milli
As written DigitalTrends "These malicious ad blocking extensis simply copied the legitimate ad blocking code from real ad blockers and added their own malicious code."
Essentially, the malicious code found in these AdBlocker extensis is able to send your private browsing informati and data to a remote server, which "sends an order to a hidden post" Basically, it will is a botnet composed of browsers infected with fake AdBlock extensis, "wrote Meshkov, adding that" the browser will do everything The owner of the command center server orders him to do so.
Meshkov added that most casual users of Chrome will download an extensi regardless of its name – as lg as it is near the top of the list.