Why I Don't Like to Use Extensions

Why I Don't Like to Use Extensions

Show Video

The most dangerous thing in your browser might  be the browser extension you installed yourself.  Some extensions have access to everything you  do—every keystroke, every page, every password.   And not all of them have good intentions. A distressing number of extensions are   covertly in the business of spying  on you and selling the data. Extensions can be incredibly useful. Maybe you  installed one to find coupon codes, write better  

emails, or block cookie banners. But there are  many that, while seeming to be harmless, quietly   sell your browsing history, inject malicious  code to drain your wallet, or install spyware.  There are even extensions that have been  caught stealing emails and attachments   straight from users’ inboxes—funneling private  data directly to foreign intelligence operations. In this video, we dive into the dark  side of browser extensions and give   you chilling real-world examples of  how they’ve been hacked, repurposed,   or deliberately built to exploit users. We also break down what different browser  

permissions actually do. Because here’s the catch:   malicious extensions often ask for  the SAME permissions as the good ones. It's very difficult for a  user to be able to tell, like,   this is a good extension and it's asking  for permission that it absolutely needs,   versus this is a bad extension, that  is gonna use this for bad purposes It’s not about what they ask  for, it’s about how they use   it. We’ll show you exactly what’s  possible with browser extensions,   and how to protect yourself. First let's highlight the problem. We probably all use browser extensions as a  normalized part of using the internet, but these   things are far more permissive than most people  realize and can sometimes have malicious intent.

Just take the case of DataSpii. Back in 2019 there   was a suite of productivity tools  in the form of browser extensions. HoverZoom was one extension. It's basically  a magnifying glass. If you have this browser   extension enabled and you hover over an image  it gets bigger so you can see it better. This extension has hundreds of thousands  of installs. Trusted by so many people.

That must mean it's safe right? Right? Security researcher Sam Jadali  discovered that Hover Zoom was   collecting and sending user data to a data  broker. Browser History, search history,   and data typed into forms, were all  collected without the users knowing. As he dug deeper, he discovered the developer  had 8 extensions that were all doing this. Very innocent looking ones too, like a  measurement tool, and a text to speech tool. This turned into the DataSpii scandal,   where over 4 million users had their  browsing data taken without their consent. All these tools were free by the way. The way the  developer made money was by selling the user data.

Google removed these extensions from the  Chrome store after hearing about this. Now even if you trust the developer, it  still doesn’t mean an extension is safe. Take what happened at Mega. This  is a cloud file storage service,   which is actually really good about privacy.

I mean I've trusted them with my files even. And they have a browser extension which  helps you upload and manage files. Well, in 2018, someone hacked into  where Mega maintains the extension   and added some malicious code into it,  and pushed it out to all the users. Even a company that you really trust might  one day be hacked and neither you nor the   developer might immediately realize.  What happened next was terrifying. The extension immediately got to  work stealing passwords you typed   into websites. And it wasn't  just grabbing all passwords,   it was specifically looking for passwords you have  on Google, Github, Microsoft, and crypto sites.

Mega, of course, fixed this  problem within 4 hours and   now takes extra steps at securing things  like this from happening in the future. But it’s just one of many examples of users  getting their accounts hijacked and crypto   stolen by an extension that they trusted was safe. Or take this recent extension  drama that happened in December   2024. Chrome reported they got  their browser extension hacked. Now Chrome is a cyber security  company which creates a browser   extension that monitors what you type  and warns you before putting sensitive   information into a website or email. It's  actually a trusted and legitimate tool.

But someone phished the company, and got  control of their Chrome extension code,   and uploaded a new version of the  extension with malicious code in it. This resulted in hundreds of thousands of  people getting their data scraped by this   extension until Chrome discovered it and fixed  it. But it was too late, lots of people had   their cookies stolen, session tokens taken,  and even authentication credentials grabbed. People who had this extension installed and were   also logged into Facebook were getting  their Facebook accounts taken over. This incident caught the eye of  security researcher John Tuckner. My name is John Tucker. I'm  the founder of Secure Annex

John analyzed the malicious code put  into the CyberHaven Chrome extension,   then looked to see if any other  extensions had that same malicious code. It was actually a really interesting  incident because it was very targeted   across not just CyberHaven, but another, uh,  13 or so extensions that also had the same   code deployed, and the developers of those  extensions were phished in the same manner, In total there were countless users  likely getting their data stolen,   and the extension creators probably  didn't even know they were compromised. A lot of people think that these extensions  are meant for a single purpose, but they are   really able to capture the information as you  go through every website that you're visiting. Everything that people were  doing could be recorded. Their entire browsing behaviors,  their web searches, their,   uh, form submissions browser extensions are even  able to take screenshots of what you're visiting. The reason why these kinds of vulnerabilities  are possible is because extensions are able to   update themselves. This means they can switch  out the code that’s been installed on your  

computer at any given time, without the user  even knowing. As a result, makers of popular   extensions are constant targets for attack.  But they’re also targeted for other reasons;   under the constant pressure to sell their  extension to people who want to buy them. You may create an extension to provide  some functionality to a user base,   and you find that extension becomes  wildly successful. That developer  

would love to be compensated for their great work. And so they’re usually receptive  when someone reaches out and asks   if they can purchase the extension. This  isn’t always some innocent purchase,   though. Far too often it’s much darker than that. There's this, um, whole underground industry. Matt Frisbee is the author of Building Browser  Extensions, and he first encountered this seedy   underground world of buying and selling browser  extensions when he launched his own extension.

It got a pretty good number of users and, you  know, I started to get inbound of people wanting   to buy it. They don't really explain what  they want it for. This happens to everyone   that has a well used extension. You can get a  pretty good payout if you have a lot of users. And why do they want to buy them? The unspoken conclusion there is that they're  using it for bad purposes and they're sort   of selling the data or stealing it in worse  cases or like injecting ads or whatever it is. If it has access to Facebook, someone  goes in and goes, “Oh, I can steal the   Facebook data of a hundred thousand people's  users? Let's send 'em an offer! Why not?” You might have installed something legitimate,   but it’s since changed hands and is being  used for a completely different purpose. Like The Great Suspender, for  example. This was a browser   extension which simply closed  tabs you weren't using anymore.

Very popular, and developed by someone trusted  in the developer community. If you were   ultra-cautious about installing extensions,  this one would have passed all your tests. But then, in mid-2020, the developer  quietly sold it to an unknown entity,   and that’s when things took a dark turn.

Without warning, the new owner turned The  Great Suspender into a surveillance tool,   injecting malicious code that secretly  connected to third-party servers. It could track users’ browsing habits, manipulate  web traffic, and possibly even commit ad fraud. Microsoft was the first to  detect the suspicious activity,   pulling it from their Edge extension store.

But on Chrome, the malware-laced version  remained live, quietly spying on users. Until people started digging into  the code and discovered the truth. By the time Google finally removed it,  millions of users had already been exposed.

A once-trusted tool had become  a mass surveillance weapon,   watching everything your browser  saw, without you ever knowing. And not all of this buying and selling goes  on behind closed doors, there are all kinds   of marketplaces with hundreds of thousands of  installs for sale. Of course not all of these   sales are dodgy; but the fact is, it’s never been  easier for someone to buy a popular extension,   insert malicious code, and now that extension  you thought was safe is spying on you.

So what can we do to protect ourselves? I think a lot of us, when  installing an extension or app,   look to see how many downloads it  has. If it’s popular, we think it's   probably safe. But some wildly popular  extensions have turned out to be malware. In 2020 one study revealed 33 million downloads   of malicious extensions that they  traced back to just one company. What if you just look at reviews, and  make sure it’s a developer you trust? But as we just saw, that kind of validation  simply doesn't work when extensions get hacked,   or sold to whoever wants to steal and  sell your data without you knowing. Can you just install antivirus  software to protect yourself? It’s actually really hard for antivirus safeguards   to detect malicious activity when  it comes from inside a browser. And if you think installing  another browser extension is   going to protect you against  malicious browser extensions,   think again. An extension cannot  intercept traffic from another extension.

They can only operate on traffic  that's coming from web pages. One thing we can do is better  understand the permissions we   grant to extensions—because that tells  us what they’re actually capable of. Even though extensions can silently  update their code without you ever   knowing, they’re still restricted to the  original permissions that you approved. 

But here’s the catch: what they can do  within those permissions is incredibly broad. An extension that once blocked  ads can update itself to start   logging keystrokes or exfiltrating data  without ever asking for new permissions. That’s why understanding those permissions  isn’t just important, it’s essential.  What are some of the worst offenders on  here that we should be worried about? Do I have to just pick one? Let's start with the “history”  permission. What does that mean? The browser will happily dump out your history  as a, as an array. Like, this is your browsing  

history, you visited these websites, we  can, you know, build this profile of you. So literally, the extension gets full access to   your browsing history and can  use that data how they want. Then there’s the cookie permission If you call this single line of JavaScript,   it dumps out a list of all your cookies and  all the domains they're associated with. That's how our browsers authenticate with servers. If someone steals your cookies, they can  pretend to be you in all sorts of nasty ways.

That’s how hackers took over  Linus Tech Tips’ Youtube account,   they didn’t need to steal his password  or 2FA. They just stole his cookies. Next, screen captures. There are actually a number of APIs that an  extension can use to capture your desktop capture   the current page you're looking at and all of  these will incur a pop-up. For example it'll say,   you know, which window do you want?  Or, which desktop screen do you want? But there’s also a 3rd  capture option, tab capture. The capture visible tab  API, no warning and it just,   it takes a screen grab and sends it off  and you will never know what's happening.

Let's say you could detect  they’re on a banking website,   I could take a screenshot  every second and send that off. That’s quite a permission. Next, the Web request permission. You can basically sniff the request going  to every website and see what it's sending.

It doesn't matter if it's https,  it's basically a man in the middle   and it can see everything. You're sending. So  stripe.com, like their security is immaculate,   it doesn't matter. I can see what  you're sending to stripe.com. Anything that's watching traffic, especially  the payloads, that's pretty damaging.

It's all plain text and they can just read it  right out of there. You would see all your credit   card information, address, password, username,  everything, of all the things I'd put here.   This is probably the most offensive vector. What about the web navigation permission? This API I is a real time feed  of wherever you're navigating. It's grabbing the top level details of  basically where you went on the page.

Now let’s look at keyloggers. This one's super easy cuz this one you  don't actually need any permissions. Yep, you heard that right. You don’t need  a special keylogger permission to use one.

This is the first that only  requires a content script. This   is just a tiny piece of JavaScript  that you're running on the page. This content script, technically called  a host permission, would create a popup   that says “allow this extension to  read everything on, say, Google.com” If you're adding an extension that does  something fun to your Google search results,   of course it's gonna run on Google.com.

Really it's able to see everything  you're doing on Google.com,   all the things you're searching,  all your keystrokes, everything. It would send them to our background script;  background script sends them to our server.  None of that requires any permissions other than  the ability to run this script on Google.com. It's incredibly dangerous and very easy to do.

Then there’s Input capturing, which  happens inside another content script This is pretty similar to the key logger. This one can be used for logging  things like password manager inputs,   where they autofill your login  credentials automatically. Those might not be registered as keystrokes. So  as a malicious actor, I still want that data. So   instead I'm going to watch anytime an input  changes, which is a login box, search bar,   credit card entry, whatever. Anytime they  change, I want to capture what's changed. So even if you’re trying to be  safe by using a password manager,   a malicious extension that’s capturing inputs  would be able to see these private details. Geolocation capturing is a tricky  activity to perform because there   are some restrictions in place  around how it can be collected.

The only place that I can get  geolocation is in a real user interface. This means a background worker can’t  collect geolocation without the user’s   knowledge. But an extension can render a  real user interface in the form of a popup,   and then it can collect your location.

So I click to take a note, if I  have the geolocation permission,   I can read where you are  every time you open the popup. But there’s another, sneakier way an  extension can get a user’s geolocation. If they visit a website that already  has the geolocation permission,   it is actually possible to piggyback  off the page's permissions. It really shouldn't work that way. To do this, it uses a content script.

Let's say I have a content script  that can run on all Google domains. So if the user goes to maps.google.com and  they've previously said “maps.google.com can   read my location,” then the extension  running on that page can say, “Oh,   they already have geolocation permission.  I don't need to prompt the user again,   I can piggyback on that permission and  then grab their location additionally.” No pop-ups generated. Hulu for example, they  require your location every time they go to   hulu.com, “Great. I don't need to ask them, I  can grab their location.” The piggybacking of the  

permissions is an especially disturbing one. Not  hard to think of ways that this could be abused. There are other permissions that  extensions can piggyback on. Lots of sites say, “Can I show  notifications? “And I always go,   “No, you can't show notifications!” If  you said yes to anywhere, that would be   another one that the extensions API  could theoretically piggyback on. So that’s the next thing we can do  to try to stay safe: Be careful of   granting permissions in general, because they  could be abused in ways you hadn’t realized. You don't need all of these permissions to do  something bad, right? You need maybe one or two. Next, use extensions sparingly. Does  

this mean that people shouldn’t use  extensions at all? Not necessarily. Password managers and ad blockers are very,   very powerful tools for consumer privacy.  I think everyone should use them. They are   going to have to request dangerous APIs. The  ones that I use are from reputable sources. I don't think the thing to take away from  that is don't use a password manager. Pete Snyder is the principal privacy  researcher at Brave software,   who says that you SHOULD use a password manager,  even if it comes in the form of an extension.

Certainly better than not using  a password manager at all. But you want to really make sure that  it’s from a company you really trust.   Remember, every extension is an  attack vector that could turn   into something malicious without you even  realizing, whether intentionally or not. You should really think deeply, uh, if  you actually need that extension or not. Next, instead of installing privacy  extensions you can try using a browser   that has those privacy protections built  in by default. Adding many extensions to   your browser actually becomes a way of  fingerprinting you. Browsers like Brave,  

Firefox, and Tor work hard at trying to  protect you by blocking browser fingerprinting. You very likely are undoing some  of those protections by throwing   a whole bunch of customizations on  top of the browser. Extensions are,   are the easiest way to shoot  yourself in the foot doing that. If you’re just using one extension that’s  really popular, like uBlock Origin, there’s   not as much danger because you’re still blending  in with a large group of all the other people who   also have uBlock Origin. But if you also add a  password manager like BitWarden, you’re now part   of a smaller group that has both uBlock Origin and  BitWarden installed. The more extensions you add,

You're pretty quickly becoming a party  of one. By installing more extensions to   try to be more private, you actually  end up sticking out very uniquely. Next, If you do have an extension installed,  grant it the least privilege needed.

For example you’ll be asked to choose  when the extension is allowed to operate,   and you can pick either: on all  sites, on this particular site,   or when you click the extension. Whenever  possible, have the extension only operate   when it’s clicked, so that it’s not  reading your content at all times. And finally, there are more and more resources   where you might be able to  do a code review yourself.

John is building a tool called Secure Annex,   there’s Extension Auditor, as well  as Extension Total, as examples. These sites help you try to understand Does this extension actually do what it's  intending or what it describes to the user,   or does it have an ulterior motive? Is there  something deep in the code that a user might   not be thinking about, or it might not line  up with the actual intent of that service. It’s not going to be able to make your choices  for you, but it’s a good place to start when   it comes to understanding whether an  extension might have any red flags.

So in summary, extensions  may seem like fun add-ons,   that can add sparkles to your cursor, change  every photo to a picture of Nicolas Cage,   generate text with AI, or  any number of things. But- The consumer has no idea what they're installing,   really. I think that's the,  that's the long and short of it. And given how much sensitive stuff you  do in your browser, like your banking,   logging in with important passwords,  or writing private communications,   you should think REALLY carefully  before installing anything. NBTV is a project of the Ludlow Institute. A  non profit research and media institute, that   educates people about how to reclaim ownership of  their digital lives. Help us shift culture around  

privacy. Visit ludlowinstitute.org/donate  or support us by buying some cool shirts,   like this one with a cat on it, or this other  one with a cat on it! I really like cats. Treat your extensions like one of your  exes. If they get too controlling,   just remove them from your life.

2025-04-24 16:38

Show Video

Other news

IBM Quantum Industry Webinar Series: Quantum Computing for the Automotive Industry 2025-04-30 07:03
2. Реквизит серии AI. Продвинутый уровень: Web интерфейс, составление программ и настройка. 2025-04-27 22:57
Wireless Technology - CompTIA A+ 220-1101 – 4.15 2025-04-26 08:05