1 / 3

Chrome Users are Warned to Delete These 16 Extensions Immediately

Google Chrome users are warned to remove 16 famous extensions that were found to be a threat to their security. The list of extended extensions consists of Super Dark Mode, KProxy, Page Refresh, and more (provided on this Blog).

Shivangi31
Download Presentation

Chrome Users are Warned to Delete These 16 Extensions Immediately

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chrome Users are Warned to Delete These 16 Extensions Immediately Google Chrome users are warned to remove 16 famous extensions that were found to be a threat to their security. The list of extended extensions consists of Super Dark Mode, KProxy, Page Refresh, and more (provided on this page). It was found that these extensions inject harmful scripts into browsers. Thus, the user’s data is endangered, which eases search engine fraud. According to GitLab Threat Intelligence, these extensions, having more than 3.2 million users, were hijacked. Hackers used these extensions for updates, which allowed these cyber attackers to steal users’ data and perform fraudulent activities. These cheaters injected unauthorized advertisements and manipulated web traffic for data theft. Compromised Extensions You Must Delete Immediately One can easily install these extensions from the Chrome Web Store, but they can lead to a cyberattack. So, if you have installed any of the extensions listed below, eliminate them manually right away. 1. KProxy 2. Super Dark Mode

  2. 3. Wistia Video Downloader 4. Adblock for You 5. Color Changer for YouTube 6. Nimble Capture 7. Page Refresh 8. Adblock for Chrome 9. Adblocker for Chrome (NoAds) 10. Mike Adblock für Chrome | Chrome-Werbeblocker 11. Emojis (Emoji keyboard) 12. Emoji Keyboard Emojis for Chrome 13. Video Effects for YouTube and Audio Enhancer 14. WAToolkit 15. Blipshot (one click full page screenshots) 16. Themes for Chrome and YouTube Picture-in-Picture Steps to Delete a Chrome Extension The following are the two ways to delete a Chrome extension, and each of these ways is given in steps: Way 1: Uninstall an extension: 1. Go to the right of your address bar and look for the extension icon. 2. Then, right-select the icon and hit Remove from Chrome. Way 2: This way is for those who can’t find the icon of the extension. So, if you are unable to find the extension icon, follow the steps below: 1. Open Chrome on your computer system. 2. At the top right, hit More: > and then Extensions > and after that, Manage extensions. 3. Now, when you see the extension, you want to remove, click on Remove. 4. To confirm, choose Remove. When did GitLab Inform Google of This Threat? According to Gitlab, it informed Google about these extensions in January. After that, Google took down all of them from the Chrome Web Store. However, it won’t automatically remove them from your Chrome tab. Therefore, you must uninstall them manually and run antivirus software to scan for potential malware or other viruses. How It All Started?

  3. The extensions provided in the list above are used for various purposes. These functions are screen capture, emoji keyboards, and ad blocking. However, hidden scripts are included in updates, which makes it possible to inject ads upon webpages, alter HTTP requests and secretly steal sensitive data without any authorization. These extensions were already provided with the rights from users, which is why the users didn’t know about these changes. Due to this, attackers could control online activities immediately. The most notable thing is that experts found these extensions risky because of the permissions offered to them, like host access and scripting controls. The cyberattack was linked to compromised developer accounts. Some developers provided attackers with authority over their extensions, as the developers didn’t know the danger lurking behind them. After that, these attackers used the extensions to spread malicious updates using the official browser extension store.

More Related