Close Menu
News JournosNews Journos
  • World
  • U.S. News
  • Business
  • Politics
  • Europe News
  • Finance
  • Turkey Reports
  • Money Watch
  • Health
Editors Picks

Democrats Avoid Labeling Tesla Attacks as ‘Domestic Terrorism’

April 5, 2025

U.S. Stock Market Dips Following Significant Drop in GDP Growth

April 30, 2025

First Oil and Gas Lease Sales Under Trump Administration Raise Nearly $40 Million for U.S.

March 28, 2025

Judge Allows Mahmoud Khalil’s Lawsuit Against U.S. Government to Proceed

April 29, 2025

Musk Steps Down from Government Role as Trump Affirms Continued Support

May 29, 2025
Facebook X (Twitter) Instagram
Latest Headlines:
  • Deadly Hanukkah Shooting Highlights Rise in Antisemitism in Australia: Questions on Police Preparedness Raised
  • Smart Home Hacking Attacks Less Common Than Reported
  • NFL Scores: Stafford’s TD Pass to Parkinson Ignites Controversy
  • Shooting at Bondi Beach: Key Details Emerged
  • Broadcom Shares Drop 11% Amid AI Market Sell-Off Following Earnings Report
  • Prominent Figure GülÅŸah Durbay Passes Away Suddenly
  • Jan. 6 Police Officer Emerges as Key Witness for Democrats Against Trump
  • Hugh Jackman and Kate Hudson Explore Musical Chemistry in “Song Sung Blue”
  • State-by-State Guide to “Made in America” Holiday Gifts
  • US and Ukraine Aim to Disrupt 1,000-Vessel Dark Fleet of Rogue Oil Tankers
  • Antisemitic Terrorist Attack Targets Hanukkah Celebration in Australia
  • Swiss Chocolatier Maintains No Plans for U.S. Production Amid Tariff Challenges
  • US-China Soybean Trade Highlights Food Security Goals; Goldman Sachs Involved
  • AI Tools Boost Christmas Sales as Walmart and Target Join the Competition
  • SBA Reveals Strategy to Reduce Federal Regulations Increasing Costs
  • Families Demand Justice as Teen Avoids Prison for Assault Charges
  • Drone Strike on U.N. Facility in Sudan Kills Six Peacekeepers
  • ClickFix Campaign Deploys Fake Windows Updates to Distribute Malware
  • Indiana Player Makes History as First Heisman Trophy Winner
  • Trump Issues Retaliation Following Deadly IS Attack in Syria Killing Three Americans
Facebook X (Twitter) Instagram
News JournosNews Journos
Subscribe
Monday, December 15
  • World
  • U.S. News
  • Business
  • Politics
  • Europe News
  • Finance
  • Turkey Reports
  • Money Watch
  • Health
News JournosNews Journos
You are here: News Journos » Tech » Browser Extensions Monitor User Online Activity
Browser Extensions Monitor User Online Activity

Browser Extensions Monitor User Online Activity

News EditorBy News EditorJuly 14, 2025 Tech 5 Mins Read

Recent findings have revealed a concerning trend involving malicious browser extensions that have gained traction among users. Researchers discovered that 18 extensions on the official Chrome and Edge Web Stores, which had collectively amassed over two million installs, were secretly tracking users’ online activities. This situation underscores the vulnerabilities present in ostensibly safe tools that many individuals rely on for productivity and entertainment.

Article Subheadings
1) The Anatomy of the Attack: Understanding the Malicious Extensions
2) Techniques Employed by Attackers to Evade Detection
3) Identifying Dangerous Extensions: A List of Affected Add-ons
4) Immediate Actions to Protect Your Data and Devices
5) Long-term Strategies for Browser Security

The Anatomy of the Attack: Understanding the Malicious Extensions

According to researchers from Koi Security, attackers have adopted sophisticated methods to compromise popular browser extensions. Initially, they create legitimate, functional utilities designed to gain user trust over time. These tools earn positive reviews and build a solid reputation. After establishing themselves in this way, the malicious actors push silent updates that introduce harmful scripts into the previously trustworthy code base.

This nefarious approach poses a significant threat as updates come directly from official sources, allowing them to bypass corporate firewalls easily. Unlike phishing tactics that rely on users to click on dubious links or downloads, these malicious updates are often unnoticed and occur seamlessly, raising no immediate concerns for users.

Techniques Employed by Attackers to Evade Detection

As part of their investigation, researchers traced suspicious traffic to extensions that appeared harmless initially. One such tool was a seemingly innocuous color picker extension, which led them to a network of connected domains functioning as command and control centers. These servers actively recorded every URL visited by users and instructed them to redirect to fake websites or ad-heavy landing pages.

Upon closer examination of the extension’s code, the research team found similar fingerprints across various other tools, which included seemingly unrelated applications like weather widgets and volume boosters. Despite a varied appearance, these extensions shared the same underlying code and behaviors, demonstrating how diverse tactics can conceal their malicious nature.

The attackers employed distinct branding strategies and categorized their extensions differently to complicate marketplace monitoring. As a result, recognizing patterns among these extensions remained challenging, even for vigilant observers. More alarmingly, many of these add-ons boast verified badges, a testament to how attackers can manipulate automated review systems, allowing harmful updates to slip through the cracks.

Identifying Dangerous Extensions: A List of Affected Add-ons

For users who may have unwittingly installed these malicious extensions, the first step is to identify and remove them immediately. Affected extensions include:

  • Emoji Keyboard Online (Chrome)
  • Free Weather Forecast (Chrome)
  • Unlock Discord (Chrome)
  • Dark Theme (Chrome)
  • Volume Max (Chrome)
  • Unblock TikTok (Chrome)
  • Unlock YouTube VPN (Chrome)
  • Geco Colorpick (Chrome)
  • Weather (Chrome)
  • Flash Video Player (Chrome)
  • Unlock TikTok (Edge)
  • Volume Booster (Edge)
  • Web Sound Equalizer (Edge)
  • Header Value (Edge)
  • Flash Player (Edge)
  • YouTube Unblocked (Edge)
  • SearchGPT (Edge)
  • Unlock Discord (Edge)

Immediate Actions to Protect Your Data and Devices

Immediate removal of the listed extensions is crucial for protecting personal data and devices. Users should take the following steps:

  • Remove all affected extensions immediately from both Chrome and Edge browsers.
  • Clear your browser data to eliminate stored tracking identifiers.
  • Run a full system malware scan using reputable antivirus software to detect any additional threats.
  • Monitor your online accounts closely for unusual or suspicious activity, especially if you accessed sensitive sites while the extensions were active.
  • Review all your installed extensions for any suspicious behavior or unknown origins, and remove anything you don’t recognize or trust.

Long-term Strategies for Browser Security

Beyond immediate actions, developing long-term strategies to ensure browser security is essential. Here are several recommended practices:

  • Check your accounts for unusual activity: If you accessed sensitive sites while the extension was active, review those accounts for suspicious behavior. Change passwords as necessary.
  • Enable two-factor authentication (2FA): For added security, activate 2FA on accounts that offer this feature.
  • Use strong antivirus software: Regular scans can help identify hidden threats that conventional browser checks might miss.
  • Reset your browser settings: Default browser settings can undo unauthorized modifications stemming from malicious extensions.
  • Stay alert for security alerts: Being vigilant regarding notifications from services you use can help you detect unauthorized activity early.
  • Utilize a browser with extension permission controls: Limiting what data extensions can access reduces the risk of future attacks.
No. Key Points
1 18 harmful browser extensions were discovered, affecting over 2 million users.
2 Attackers initially released legitimate tools to gain user trust before injecting malicious scripts.
3 Users are urged to remove affected extensions and clear their browser data.
4 Enabling two-factor authentication offers additional security for online accounts.
5 Regular reviews of installed extensions can help maintain browser security.

Summary

The discovery of malicious browser extensions that have been tracking users highlights the critical need for vigilance in online environments. With attackers using trusted avenues to deliver harmful updates, individuals must take proactive measures to protect themselves. Uninstalling suspicious extensions and implementing better security practices are essential steps toward safeguarding personal data in an increasingly complex digital landscape.

Frequently Asked Questions

Question: How can I identify if a browser extension is malicious?

Look for unusual behavior, such as excessive permissions requested by the extension or unexpected changes in browser settings. Reading user reviews and checking for verified badges can also provide initial assurance, but they are not foolproof.

Question: What should I do if I suspect I have malicious extensions installed?

Immediately remove any suspect extensions from your browser, clear your cache, and run a malware scan using reputable antivirus software to detect any additional issues.

Question: How often should I review my browser extensions?

It is advisable to review your browser extensions regularly, perhaps every few weeks, to ensure that you only keep those that you actively use and trust.

Activity Artificial Intelligence Blockchain browser Cloud Computing Consumer Electronics Cybersecurity Data Science E-Commerce Extensions Fintech Gadgets Innovation Internet of Things Mobile Devices Monitor online Programming Robotics Software Updates Startups Tech Reviews Tech Trends Technology user Virtual Reality
Share. Facebook Twitter Pinterest LinkedIn Email Reddit WhatsApp Copy Link Bluesky
News Editor
  • Website

As the News Editor at News Journos, I am dedicated to curating and delivering the latest and most impactful stories across business, finance, politics, technology, and global affairs. With a commitment to journalistic integrity, we provide breaking news, in-depth analysis, and expert insights to keep our readers informed in an ever-changing world. News Journos is your go-to independent news source, ensuring fast, accurate, and reliable reporting on the topics that matter most.

Keep Reading

Tech

Smart Home Hacking Attacks Less Common Than Reported

8 Mins Read
Tech

ClickFix Campaign Deploys Fake Windows Updates to Distribute Malware

5 Mins Read
Tech

British Couple Ignites Global Movement for Smartphone-Free Childhoods

6 Mins Read
Tech

Pentagon Launches Military AI Platform Amidst Tech Debates from Leaders and Industry Titans

6 Mins Read
Tech

Disney Commits $1 Billion to OpenAI in New Licensing Deal

4 Mins Read
Tech

ShadyPanda Malware Campaign Converts Chrome and Edge Extensions into Spyware

7 Mins Read
Journalism Under Siege
Editors Picks

Tesla Sees 22% Increase in May Following Musk’s Departure from Trump’s DOGE

May 30, 2025

Conservatives Urge GOP Leaders Not to Undermine DOGE Ahead of Shutdown Deadline

March 4, 2025

Bill Maher Discusses Trump Meeting at the White House

April 11, 2025

Tesla and Alphabet Encounter Tariff Uncertainty

April 21, 2025

Protesters March on White House Against Trump Administration Policies

April 19, 2025

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

News

  • World
  • U.S. News
  • Business
  • Politics
  • Europe News
  • Finance
  • Money Watch

Journos

  • Top Stories
  • Turkey Reports
  • Health
  • Tech
  • Sports
  • Entertainment

COMPANY

  • About Us
  • Get In Touch
  • Our Authors
  • Privacy Policy
  • Terms and Conditions
  • Accessibility

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

© 2025 The News Journos. Designed by The News Journos.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.
Go to mobile version