Building a slide deck, pitch, or presentation? Here are the big takeaways:
- Five malicious ad blockers found in the Google Chrome Store had already been downloaded 20 million times before Google removed them. — Adguard, 2018
- Users should not download an extension unless they trust the author. — Adguard, 2018
Google removed five fake ad blockers from the Chrome Store after they were flagged by a researcher, but they had already been downloaded more than 20 million times.
The malicious ad blockers were discovered by Andrey Meshkov, co-founder of Adguard, who detailed his findings in a blog post. While he noted that hackers have long created cloned versions of popular ad blockers, they have grown more sophisticated.
These criminals still use simple rip-offs of popular products, with a few lines of code added by the "authors," Meshkov wrote in the post. But instead of using similar names (like "Adguard Hardline" or "Adblock Plus Premium"), they spam keywords into the extension's description, trying to move it to the top search results and increase the likelihood of getting a victim to download it.
SEE: Security awareness and training policy (Tech Pro Research)
Cloning real ad blockers and adding malicious features to them has become a popular tactic for cybercriminals, as noted by our sister site ZDNet. For example, in 2017, a researcher discovered a fake Adblock Plus Chrome extension that tricked 37,000 users into installing it.
"Basically, this is a botnet composed of browsers infected with the fake adblock extensions," Meshkov wrote in the post. "The browser will do whatever the command center server owner orders it to do."
The following five ad blockers were found to use this malicious approach, according to the post:
- AdRemover for Google Chrome™ (10M+ users)
- uBlock Plus (8M+ users)
- Adblock Pro (2M+ users)
- HD for YouTube™ (400K+ users)
- Webutation (30K+ users)
Meshkov reported these findings to Google on Tuesday. By Wednesday, all five fake ad blockers were removed.
To best protect yourself, look very closely at any extension before you install it, Meshkov said in the post. You should check who the author of the extension is, and avoid installation if you cannot confirm that they are trusted.
- 17 tips for protecting Windows computers and Macs from ransomware (free PDF) (TechRepublic)
- Cybersecurity report card: Why too many companies are graded 'could do better' (ZDNet)
- Cheat sheet: How to become a cybersecurity pro (TechRepublic)
- Improve your cybersecurity strategy: Do these 2 things (ZDNet)
- No, private browsing mode won't hide your search history from advertisers (TechRepublic)
Alison DeNisco Rayome is a Staff Writer for TechRepublic. She covers CXO, cybersecurity, and the convergence of tech and the workplace.