TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Another cluster of potentially malicious Chrome extensions

102 pointsby supermatoualmost 2 years ago

10 comments

smallerfishalmost 2 years ago
Having just started on creating chrome extensions recently:<p>a) I was surprised that they don&#x27;t require access to the source code in order to review. I wrote everything using typescript and uploaded the packed&#x2F;obfuscated output, which wasn&#x27;t a problem at all. I&#x27;m sure they have software that unpacks and attempts to detect hazardous patterns, but clearly humans are not actually trying to understand the code&#x27;s structure. It would be a low bar to require well commented source code (and even to require certain coding conventions) to make extension code more reviewable. Want to be on our platform? Write it this way. Show us the source.<p>b) On the flip side, trying to do anything interesting requires adding permission after permission to the manifest, which of course results in the scary messaging at install time. While you&#x27;re asked to justify each permission when you upload, as far as I&#x27;m aware extension authors have to provide their own copy to end users attempting to explain permissions - I&#x27;ve certainly never seen it as an end user when installing an extension. Including these explanations either in the initial install dialog, or on first usage of each permission, would be beneficial. Of course this would require that extension reviewers verify the usage of each of the permissions, but since they&#x27;re universally accessed through the chrome api, they should be easy to spot in the source (and #a would help this significantly).
评论 #36241470 未加载
评论 #36241350 未加载
评论 #36241711 未加载
prakhar897almost 2 years ago
I made a chrome extension that has about 3000 users and adding about 100 users weekly. One Day someone reached out to me offering to pay 0.20$&#x2F;user for it. The extension required manual data input from time to time so I was happy to get my hands off it.<p>I was confused as after buying the guy seemingly did nothing with the extension. Now I&#x27;m realizing that it has become a part of the malware community. I was also using ESCompiler to bundle files which was naturally obfuscating it a lot.<p>The point is that these people acquire extensions when they have a growth trajectory, then sit back and let the cash roll in. Kinda like VCs. That&#x27;s why they have such a huge collection of popular extensions.<p>Also, To get &quot;Featured&quot; on chrome, you just have to fill a paltry form about accessibility etc and wait for a few weeks. &quot;Featured&quot; does not mean the application is safe in any way. I&#x27;d say it&#x27;s the contrary since the scammers know exactly how to get the tag to look more trustworthy.
评论 #36244436 未加载
评论 #36243743 未加载
toygalmost 2 years ago
It&#x27;s now clear that I need some sort of semi-automated system to periodically review the list of installed extensions against a database of known-malicious IDs. I&#x27;m not going to manually go through a list of more than 100 extensions. We need something like HaveIBeenPwned, is there anything like that already?
评论 #36241444 未加载
评论 #36241469 未加载
lapcatalmost 2 years ago
Ironically, Google <i>eliminated</i> Chrome Web Store payments, so extension developers can no longer directly monetize extensions from the Chrome Web Store.<p>As always, if you&#x27;re not the customer, you&#x27;re the product.
ChrisLTDalmost 2 years ago
I only trust three extensions, and maybe that&#x27;s too many:<p>1) My password manager extension, 2) EFF&#x27;s Privacy Badger, 3) Vimium<p>Everything else I run only temporarily or with the option where I have to click to enable it for certain sites.
评论 #36242608 未加载
评论 #36245605 未加载
评论 #36244535 未加载
lofaszvanittalmost 2 years ago
Sigh, these articles are good, but at the same time someone will look at it and do stupid we gonna solve this right now kinda optimizations. Extensions are already behind a group icon, just do not tighten them up even more in stupid ways. It&#x27;s already problematic, because average users doesn&#x27;t even know how many extensions and what kind are installed. If you have an army of icons next to your url bar at least you know that something is there.<p>At the same time if you have an extension that shows some status via the pinned icon you have to guide them step by step.<p>If an extension doesn&#x27;t steal your data, then leave them be. If you don&#x27;t do your homework, well, then live with the &quot;bloodsucker mosquito&quot;. We don&#x27;t have to protect everyone from the real world at the expense of the many.
butzalmost 2 years ago
After so many incidents when legit extension is sold to another entity that implements malware, why there are no mechanism to additionally approve extension usage when developer changes? Sure, most users probably will click agree, but that would be a good start.
评论 #36243999 未加载
anonymouscalleralmost 2 years ago
My question is how are these extensions with malware being &quot;featured&quot; on the web store? Are humans at Google running these applications and featuring them or is it AI&#x2F;an algorithm?
评论 #36241149 未加载
eviksalmost 2 years ago
If only there were some tech to grep store extension comments for malware complaints...
评论 #36242531 未加载
评论 #36244134 未加载
supriyo-biswasalmost 2 years ago
Question for the author since they’re semi active here: How do you choose to investigate these malicious extensions in the first place?
评论 #36244069 未加载