Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Watch Out for Malicious Browser Extensions

Watch Out for Malicious Browser Extensions

Browser extensions are nifty little programs that can be implemented into your web browser itself, adding onto its capabilities and utility… at least, that’s the concept. Unfortunately, these programs also give cybercriminals a means of secretly launching an attack. The security firm Avast recently identified 28 such third-party extensions that have been installed—according to the download numbers, at least—by about three million people on Google Chrome and Microsoft Edge combined.

How Do These Threats Work?

These attacks work similarly to how a phishing attack or a spoofed email would, as a user is promised one thing but winds up receiving something very different. While a malicious application may perform the task it claims to, it also may redirect the user to a phishing website or ad (making the cybercriminal some money) or simply steal some of the user’s information, like their birthday or email address.

In the case of these extensions, the code needed for several different malicious operations was present, including:

  • Redirecting traffic to advertisements (falsely generating revenue)
  • Redirecting traffic to phishing websites
  • Collecting personal data
  • Collecting browsing history
  • Downloading additional malware onto a user’s device

Avast’s researchers believe that only the first code was actively utilized, generating ill-gotten revenue for the creators of these extensions. Regardless, these extensions should be removed from any systems on your business’ network that they may be installed on.

The impacted extensions are as follows:

Chrome

  • App Phone for Instagram
  • Direct Message for Instagram
  • DM for Instagram
  • Downloader for Instagram
  • Invisible mode for Instagram Direct Message
  • Odnoklassniki UnBlock. Works quickly.
  • Spotify Music Downloader
  • Stories for Instagram
  • The New York Times News
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Vimeo™ Video Downloader
  • VK UnBlock. Works fast.
  • Zoomer for Instagram and Facebook

Edge

  • DM for Instagram
  • Downloader for Instagram
  • Instagram App with Direct Message DM
  • Instagram Download Video & Image
  • Pretty Kitty, The Cat Pet
  • SoundCloud Music Downloader
  • Stories for Instagram
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Video Downloader for YouTube
  • Vimeo™ Video Downloader
  • Volume Controller

Again, we encourage you to check your company’s network to ensure that these extensions are not installed in any of your users’ browsers, and that you encourage your employees to do the same.

Not sure how to go about doing so? Total Tech Care can help. As a managed service provider, our services include remotely monitoring your business’ technology and network for threats while keeping abreast of this kind of news so that we can proactively resolve any issues that may influence your operations. 

Find out more today by reaching out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Upgrade Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Saving Money Holiday Tech Term Gadgets Chrome Virtualization Social Media Managed Service Managed IT Services Microsoft Office Automation Cybercrime Operating System Artificial Intelligence Facebook Computers BYOD Health Mobile Device Management Networking Internet of Things IT Support Hacking Wi-Fi Information Spam Managed Service Provider Alert Office 365 Remote Telephone Systems Information Technology Covid-19 Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Data Breach Application Human Resources Law Enforcement Remote Monitoring Big Data Password App Money History Encryption Mobile Computing Applications Government Remote Computing Mobile Office Private Cloud How To Managed IT Office Tips Apps Data Storage Training Patch Management Blockchain Paperless Office VPN Website Budget Servers Two-factor Authentication Infrastructure Avoiding Downtime Voice over Internet Protocol Mouse Data Security HaaS Bring Your Own Device Data Management Work/Life Balance Wireless Flexibility Vulnerability Marketing Gmail WiFi Windows 7 Word IT solutions Google Drive Settings Entertainment HIPAA Sports Remote Work Firewall Connectivity Redundancy USB Keyboard Vendor Management Employee/Employer Relationship RMM Virtual Reality Apple Social User Error Meetings Save Time Data Protection Risk Management Cleaning Hacker Conferencing The Internet of Things End of Support Vendor Lithium-ion battery Managed Services Physical Security Scam Education Telephone System Staff Software as a Service Display Safety Machine Learning Botnet PDF Update IT Plan Fax Server Hard Drive Proactive IT Google Docs Identity Theft Unsupported Software SaaS IT Consultant Best Practice Computing YouTube Charger Black Market Network Congestion Compliance Humor Augmented Reality OneNote eWaste Computer Care Fraud Current Events Document Management Telephony Remote Worker Solid State Drive Wireless Technology Samsung Digital Signage How to Downtime Cryptocurrency Wearable Technology Value Retail Hard Drives Data storage Spam Blocking Procurement Electronic Medical Records Instant Messaging Automobile Excel Workplace Strategy Robot Comparison Net Neutrality Computing Infrastructure CES Hiring/Firing Biometrics Help Desk Virus Printing Going Green Virtual Desktop Business Technology Content Management Unified Threat Management Computer Accessories DDoS Access Control Managed Services Provider Battery Virtual Assistant SharePoint Shadow IT Legal Business Intelligence Authentication Database Audit Remote Workers Internet Exlporer Worker Printer IT Management Customer Service Bluetooth Processor Environment Computer Tips Computer Fan Antivirus Digital Signature Managed IT Service Rootkit Security Cameras Biometric Security Windows 8 Printer Server Warranty Virtual CIO OneDrive HVAC Peripheral Relocation Workers IT service Google Apps Benefits Digital Security Cameras FENG Analysis Using Data 5G Tablet Administrator Video Games Devices Copiers IBM Enterprise Content Management Quick Tip Domains Smart Technology Worker Commute Flash Experience MSP Ergonomics Accountants Smartwatch Credit Cards OLED Microchip Scalability Software Tips IaaS Thought Leadership Development Supercomputer Maintenance Password Management PCI DSS Emails Password Manager Virtual Machine Bloatware Business Owner Sync 2FA Fiber Optics NarrowBand Multi-Factor Security Employee Cabling Tablets Search Engine Search Twitter Messaging NIST Policy iPhone Netflix Business Mangement Hypervisor Two Factor Authentication Entrepreneur Dark mode Root Cause Analysis Smart Tech Trend Micro Consultant Trending Amazon Default App Music Analytics HBO Addiction SMS Knowledge Shortcut Procedure Files Recycling Saving Time Cost Management Skype Wiring dark theme Data loss Practices Shopping Chromecast Social Networking Best Available Google Search WIndows 7 Amazon Web Services IT Infrastructure Troubleshooting Outlook Cache AI Leadership Safe Mode FinTech Colocation Criminal Uninterrupted Power Supply Bing Start Menu GDPR Screen Mirroring Running Cable Hosted Computing Social Network Loyalty Online Shopping Investment Books Memory Frequently Asked Questions Wireless Internet Monitor File Sharing Employees Windows 10s Employee/Employer Relationships Mobile Camera Windows 365 Cast Inventory Specifications ISP User Evernote ROI Streaming Media Emergency PowerPoint Windows Media Player Tip of the week Wire Video Conferencing Reputation webinar Content Professional Services Sales Public Cloud Bitcoin Tech Support Employer Employee Relationship Travel Shortcuts Science Printers Point of Sale Techology Personal Laptop Assessment Millennials Cryptomining Customers Managing Stress Wireless Charging Windows Server 2008 Smart Office Supply Chain Management Audiobook Tools Monitoring Batteries Cameras Virtual Private Network Windows 8.1 Distributed Denial of Service Digitize Touchpad Television Customer Relationship Management Workforce Cables Windows Server 2008 R2 Analyitcs Politics Customer relationships Advertising Programming Telecommuting Manufacturing Project Management Email Best Practices Nanotechnology IT Assessment Public Computer Cortana Notifications Transportation Regulations

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code