Cybersecurity researchers have found 57 suspicious extensions within the official Chrome Internet Retailer with greater than six million customers. The plugins caught their consideration as a result of the permissions they request don’t match their descriptions.
What’s extra, these extensions are “hidden” — which means they don’t present up in Chrome Internet Retailer searches, and serps don’t index them. Putting in such a plugin requires a direct hyperlink to it within the Chrome Internet Retailer. This publish particulars why extensions could be a harmful instrument in cybercriminal palms, explains the direct menace posed by these lately found plugins, and provides recommendations on how to not fall sufferer.
Why extensions are harmful, and the way comfort undermines safety
We’ve posted many instances about why browser extensions shouldn’t be put in thoughtlessly. Browser plugins typically assist customers velocity up routine duties, resembling translating info on web sites or checking spelling; nevertheless, the minutes you save typically come at the price of privateness and safety.
It is because, so as to work successfully, extensions usually want entry to the whole lot you do within the browser. Even Google Translate asks for permission to “Learn and alter all of your information on all web sites” you go to — that’s, not solely can it monitor what you do on-line, but in addition alter any info on a web page. For instance, it’d show a translation as an alternative of the unique textual content. If that’s what a web based translator can do, simply think about what a malicious extension with the identical entry can stand up to!
The issue is that the majority customers are unaware of the dangers posed by plugins. Whereas executable information from untrusted sources have come to be considered as probably harmful, browser extensions get pleasure from a broad degree of belief — particularly if downloaded from an official retailer.
Too many pointless permissions
Within the case of the 57 suspicious extensions discovered within the Chrome Internet Retailer, the principle signal of malicious intent was the broad sweep of permissions requested, resembling entry to cookies — together with authentication ones.
In observe, this enables attackers to steal session cookies from victims’ units, and people session cookies are used to keep away from coming into a password every time they go to an internet site. Such cookies additionally allow scammers to check in to victims’ private accounts on social networks or on-line shops.

Browser Checkup for Chrome by Physician is likely one of the suspicious extensions masquerading as an “antivirus” for the browser. Supply
As well as, the permissions requested grant the malicious extensions a number of attention-grabbing capabilities, together with:
- Monitoring person actions in Chrome
- Altering the default search engine and modifying search outcomes
- Injecting and executing scripts on pages visited by customers
- Remotely activating superior monitoring of person actions
How the investigation started
Cybersecurity researcher John Tuckner acquired on the path of the suspicious extensions after analyzing the code of one in every of them: Hearth Defend Extension Safety. Tuckner initially noticed this extension as a result of it was revealed within the official Chrome retailer as hidden — it didn’t present up in search outcomes and was accessible solely through a direct hyperlink to the web page within the Chrome Internet Retailer.
Word that hidden extensions and apps in official shops should not unheard-of. The massive platforms enable builders to cover them from the eyes of unusual customers. Such a observe tends to be the protect of homeowners of personal company software program, and supposed to be used solely by workers of a selected firm. One other legitimate motive for hiding a product is when it’s nonetheless within the improvement stage.
Nonetheless, each these explanations might be dominated out within the case of Hearth Defend Extension Safety, boasting 300 000-plus customers: a non-public company instrument within the improvement stage with such a person base? Not going.

Suspicious extensions with 200–300 thousand customers every. Supply
What’s extra, the plugin options didn’t match the profile of a extremely specialised company resolution: the outline stated that Hearth Defend checks permissions requested by different extensions put in by the person, and warns about unsafe plugins.
To carry out such duties, it solely wanted permission to make use of the chrome.administration API, which might enable it to get details about, and handle different put in plugins. However Hearth Defend wished a lot broader rights, which we’ve listed above with an outline of the threats related to this degree of entry.

Suspicious plugin needs too many permissions — together with entry to all websites, cookies, and person exercise. Supply
57 plugins disguised as legit instruments
Whereas analyzing Hearth Defend Extension Safety, Tuckner discovered a clue that led to 35 extra suspicious plugins. Among the many hyperlinks extracted from the extension code, he seen a site known as unknow[.]com (seemingly a misspelling of “unknown”). A typo in a site is a crimson flag to any cybersecurity knowledgeable, because it’s a typical trick utilized by scammers, who hope the sufferer received’t discover.
Utilizing a particular instrument, Tuckner discovered 35 extra extensions related to the identical suspicious area. The names of the extensions additionally had lots in widespread, which confirmed their being linked. And so they all requested broad entry rights that didn’t match their acknowledged description.
![Extensions associated with the suspicious domain unknow[.]com](https://media.kasperskydaily.com/wp-content/uploads/sites/86/2025/05/29162637/suspicious-chrome-extensions-with-6-million-installs-4-1024x637.jpg)
Extensions related to the area unknow[.]com, which kickstarted John Tuckner’s investigation. Supply
Many of the suspicious extensions Tuckner discovered had a reasonably commonplace set of described options: blocking adverts, enhancing search outcomes, and defending person privateness. In actuality, nevertheless, many lacked the code to carry out these duties. A few of the extensions all got here from the identical firms.
Additional analysis led Tuckner to unearth 22 extra suspicious plugins, a few of which had been publicly obtainable (not hidden). Right here’s the full listing of them — under we give solely hidden extensions with essentially the most downloads:
- Hearth Defend Extension Safety (300 000 customers)
- Complete Security for Chrome (300 000 customers)
- Protecto for Chrome (200 000 customers)
- Securify for Chrome (200 000 customers)
- Select Your Chrome Instruments (200 000 customers)
Backside line
All of the proof factors to attackers hiding their malicious plugins to keep away from detection by official retailer moderators. On the identical time, such extensions are sometimes distributed by means of search adverts or malicious websites.
The researchers discovered no situations of detected suspicious extensions stealing person passwords or cookies. After an in depth examine of the code, plus a collection of experiments, they concluded that prolonged monitoring of person exercise doesn’t begin instantly however a while after set up of the extension, and might be launched by a command from a distant server.
The character of their code, the choice of distant management, their repeating habits patterns, and embedded performance lead us to conclude that the extensions all belong to the identical household of spy ware or data-stealing packages. As such, we advise that you simply:
- Verify your gadget for suspicious extensions (see the full listing).
- Obtain solely these extensions that you really want; periodically verify the listing in your browser, and delete any unused or suspicious ones instantly.
- Set up a dependable safety resolution on all of your units to warn you of any hazard in good time.
Browser plugins are extra harmful than they appear. Learn additionally: