• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 15th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Crime
Scams and Fraud

37K Chrome Users Tricked into Downloading Fake Adblock Plus Extension

October 11th, 2017 Waqas Security, Cyber Crime, Scams and Fraud 0 comments
37K Chrome Users Tricked into Downloading Fake Adblock Plus Extension
Share on FacebookShare on Twitter

For those who use Adblock Plus alongside with Google Chrome web browser or recently installed its extension, here is some bad news for them. A fraudulent developer cloned fake Adblock Plus extension for Chrome and successfully bypassed Google verification process ending up getting over 37,000 downloads.

The extension remained available for download with the original one until it was removed by Google after getting alerts from SwiftOnSecurity, a researcher who tweeted that “Google allows 37,000 Chrome users to be tricked with a fake extension by a fraudulent developer who clones popular name and spams keywords.”

Google allows 37,000 Chrome users to be tricked with a fake extension by fraudulent developer who clones popular name and spams keywords. pic.twitter.com/ZtY5WpSgLt

— SwiftOnSecurity (@SwiftOnSecurity) October 9, 2017

SwiftOnSecurity bashed Google for its poor verification process that lets spammers compete with legitimate developers. “Legitimate developers just have to sit back and watch as Google smears them with fake extensions that steal their good name,” said the tweet.

Legitimate developers just have to sit back and watch as Google smears them with fake extensions that steal their good name pic.twitter.com/3Tnv4NtY9t

— SwiftOnSecurity (@SwiftOnSecurity) October 9, 2017

[fullsquaread][/fullsquaread]

One of the users who downloaded the fake extension said that upon installing the extension, their browser was spammed with ads. However, it is unclear if it dropped any malware or other malicious payloads since the extension has already been removed.

Adblock Plus, on the other hand, has thanked SwiftOnSecurity for alerting users about fake AdBlock Plus extension. In their official blog post, Ben Williams of AdBlockPlus wrote that “We’ve been following this story carefully, and were pleased to see how quickly the false extension was kicked out. It’s a bit troubling, of course, that it made it in there in the first place. Because of this, we’ve stayed on top of would-be scammers for years now, so that you can trust what you’re getting is actually what you want.”

If you have installed the fake Adblock Plus, go to Chrome > More Tools > Extensions and make sure to check its developer’s credentials on Chrome web store.

This is not the first time when a Google Chrome extension has created havoc. A couple of months ago, 7 Chrome extensions were compromised by hackers to conduct malvertising campaign while Google’s security made a laughing stock of itself.

  • Tags
  • Chrome
  • Fraud
  • Google
  • internet
  • Malvertising
  • Malware
  • Scam
  • security
  • Spam
  • Technology
Facebook Twitter LinkedIn Pinterest
Previous article Massive Trove of Sensitive 'Accenture' Data Exposed Online
Next article Medical Records and Sensitive Data of 150,000 US Patients Exposed
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Unpatched MS Exchange servers hit by cryptojacking malware

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

FBI accessing computers across US to remove malicious web shells

FBI accessing computers across US to remove malicious web shells

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Unpatched MS Exchange servers hit by cryptojacking malware
Security

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data
Leaks

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

FBI accessing computers across US to remove malicious web shells
Security

FBI accessing computers across US to remove malicious web shells

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us