Hackers exploit Google Chrome and Microsoft Edge browser extensions to spread malware.
Hackers Now they are using browser extensions Spread Malicious program and infect devices, according to a recent report by Cybersecurity ReasonLabs reveals that users of Google Chrome and Microsoft Edge are particularly at risk, with the report showing that at least 300,000 users have fallen victim since 2021.
Browser extensions are small programs designed to improve the web browsing experience, but some of them have been used as a weapon by hackers. These malicious extensions often pose as legitimate tools and trick users into installing them. Once installed, they can steal sensitive information such as passwords, financial data, and browsing history.
One of the most alarming aspects of these infected extensions is their persistence. Even if you remove the extension from your browser, the malware can remain on your computer and activate itself every time you turn it on. This makes the threat not only intrusive, but also persistent and difficult to eradicate.
How to detect malware
If your computer is infected, you may notice frequent redirects to unknown search portals, regardless of whether you use Bing or Google. Additionally, checking your system files for unusual activity can help identify whether your computer is infected.
How the attack works
This malware campaign uses a technique called “malvertising,” where malicious ads trick users into downloading harmful software. For example, if you search for a tool to convert Word documents to PDF, you might see an ad for an extension that claims to offer unlimited conversions. These ads often lead to fake websites that mimic popular software, causing unsuspecting users to download and install malicious extensions.
Steps to remove malware
If you suspect that you have installed a malicious extension, it is critical to act quickly. ReasonLabs outlines a process for removing malware:
– Delete scheduled tasks: Open Task Scheduler and look for suspicious tasks that may be linked to malware. Kill them to prevent the malware from running.
– Delete registry keys: Access your system’s registry editor and look for the keys associated with the malicious extension. Deleting them may help remove traces of the malware.
– Remove malware Files: Finally, locate and delete all files related to the malware. These are usually hidden in system folders, so a thorough search may be necessary.
By staying alert and following these steps, you can better protect your device from these malicious attacks. Remember to always be careful when installing browser extensions and verify their legitimacy before adding them to your browser.
Disclaimer
The information contained in this post is for general information purposes only. We make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the post for any purpose.
We respect the intellectual property rights of content creators. If you are the owner of any material featured on our website and have concerns about its use, please contact us. We are committed to addressing any copyright issues promptly and will remove any material within 2 days of receiving a request from the rightful owner.