malware

Almost 7 million users have attempted to install malicious browser extensions since 2020, with 70% of those extensions used as adware to target users with advertisements.

The most common payloads carried by malicious web browser extensions during the first half of 2022 belonged to adware families, snooping on browsing activity and promoting affiliate links.

This finding is based on telemetry data collected by Kaspersky, which reports over 1,300,000 attempts by users to install malicious extensions throughout H1 '22, an increase compared to last year's figures.

Number of malicious extension installation attempts
Number of malicious extension installation attempts (Kaspersky)

From January 2020 to June 2022, Kaspersky recorded adware extensions targeting 4.3 million unique users, corresponding to roughly 70% of all malicious extensions in that period.

This stat reflects how large of an adware delivery funnel malicious extensions are, compared to any other delivery mechanism.

It should also be noted that these numbers only reflect telemetry from users who utilize Kaspersky software. The numbers are likely far more significant when considering users protected by other security vendors.

Biggest 2022 threats

Starting with 'WebSearch,' Kaspersky says they detected related extensions targeting 876,924 users this year, typically mimicking productivity tools such as DOC to PDF converters and document merging utilities.

According to Kaspersky, WebSearch monitors users' browsing activity to profile them based on their interests and then promotes links from affiliated marketing programs that help monetize the infection.

Additionally, WebSearch changes the browser's home page with AliExpress or Farfetch, generating funds from the extension through clicks on affiliated links on the search results.

New homepage set by EasyPDFCombine
New homepage set by the EasyPDFCombine extension (Kaspersky)

The second most common adware hiding in the browser extension scripts is 'AddScript,' seen in attacks against 156,698 unique users.

AddScript runs covertly in the background while the extensions that carry it offer the promised functionality: downloading videos from the web.

The malware uses JavaScript fetched after installation to run videos in the background and log "views" on YouTube channels, thus increasing ad revenue.

Malicious code in AddScript
Malicious code in AddScript (Kaspersky)

Additionally, the AddScript injects affiliate cookies on the host, receiving commissions for purchases made through the browser.

The third-most popular adware nesting on people's machines via malicious extensions is 'DealPly,' responsible for 97,525 infection attempts in the first half of the year.

This adware begins with the execution of pirated software like KMS activators and game cheat engines downloaded from peer-to-peer networks and shady sites.

This is followed by the automatic injection of the browser extensions and the addition of new registry keys.

Registry keys added by DealPly
Registry keys added by DealPly (Kaspersky)

These keys add persistence, so if the user removes the extension, it is re-downloaded and installed on the browser when the program is relaunched.

DealPly also changes the browser's home page to promote affiliate sites that match the user's search queries.

Scrutinizing user's search queries to promote links
Scrutinizing user's search queries to promote affiliate links (Kaspersky)

How to stay safe

To keep your browser free of adware infections, only download extensions from the browser's official web store, examine user comments and reviews, and run a background check on the developer/publisher.

Some extensions require powerful permissions to offer the promised functionality, so it's essential to review their privacy policy and data collection practices carefully before agreeing to them.

Finally, try to use the least amount of extensions you need and periodically review the installed add-ons to remove any that you are unsure of how they were installed.

Related Articles:

Google Chrome's new post-quantum cryptography may break TLS connections

Chrome Enterprise gets Premium security but you have to pay for it

Fake Facebook MidJourney AI page promoted malware to 1.2 million people

Google fixes one more Chrome zero-day exploited at Pwn2Own

New Chrome feature aims to stop hackers from using stolen cookies