Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Watch Out for Malicious Browser Extensions

Watch Out for Malicious Browser Extensions

Browser extensions are nifty little programs that can be implemented into your web browser itself, adding onto its capabilities and utility… at least, that’s the concept. Unfortunately, these programs also give cybercriminals a means of secretly launching an attack. The security firm Avast recently identified 28 such third-party extensions that have been installed—according to the download numbers, at least—by about three million people on Google Chrome and Microsoft Edge combined.

How Do These Threats Work?

These attacks work similarly to how a phishing attack or a spoofed email would, as a user is promised one thing but winds up receiving something very different. While a malicious application may perform the task it claims to, it also may redirect the user to a phishing website or ad (making the cybercriminal some money) or simply steal some of the user’s information, like their birthday or email address.

In the case of these extensions, the code needed for several different malicious operations was present, including:

  • Redirecting traffic to advertisements (falsely generating revenue)
  • Redirecting traffic to phishing websites
  • Collecting personal data
  • Collecting browsing history
  • Downloading additional malware onto a user’s device

Avast’s researchers believe that only the first code was actively utilized, generating ill-gotten revenue for the creators of these extensions. Regardless, these extensions should be removed from any systems on your business’ network that they may be installed on.

The impacted extensions are as follows:

Chrome

  • App Phone for Instagram
  • Direct Message for Instagram
  • DM for Instagram
  • Downloader for Instagram
  • Invisible mode for Instagram Direct Message
  • Odnoklassniki UnBlock. Works quickly.
  • Spotify Music Downloader
  • Stories for Instagram
  • The New York Times News
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Vimeo™ Video Downloader
  • VK UnBlock. Works fast.
  • Zoomer for Instagram and Facebook

Edge

  • DM for Instagram
  • Downloader for Instagram
  • Instagram App with Direct Message DM
  • Instagram Download Video & Image
  • Pretty Kitty, The Cat Pet
  • SoundCloud Music Downloader
  • Stories for Instagram
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Video Downloader for YouTube
  • Vimeo™ Video Downloader
  • Volume Controller

Again, we encourage you to check your company’s network to ensure that these extensions are not installed in any of your users’ browsers, and that you encourage your employees to do the same.

Not sure how to go about doing so? Total Tech Care can help. As a managed service provider, our services include remotely monitoring your business’ technology and network for threats while keeping abreast of this kind of news so that we can proactively resolve any issues that may influence your operations. 

Find out more today by reaching out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Outsourced IT Data Backup Ransomware Windows 10 Office Server Save Money Data Recovery Cloud Computing Passwords Windows 10 Tech Term Saving Money Holiday Chrome Virtualization Gadgets Social Media Microsoft Office Managed IT Services Managed Service Automation Cybercrime Operating System Computers Facebook Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Hacking Internet of Things Wi-Fi Covid-19 Managed Service Provider Spam Office 365 Remote Telephone Systems Information Alert Information Technology Recovery Employer-Employee Relationship Bandwidth Router Social Engineering Mobility BDR Application Money Human Resources Encryption Applications Data Breach Remote Monitoring Big Data Law Enforcement App History Mobile Computing Password Apps Data Storage Patch Management Remote Computing Mobile Office Government Blockchain Paperless Office Private Cloud How To Office Tips Managed IT Training VPN Settings Vulnerability Windows 7 Word Two-factor Authentication Google Drive Servers Mouse HaaS Avoiding Downtime Data Security Flexibility Marketing Wireless WiFi Bring Your Own Device IT solutions Entertainment Data Management Infrastructure Website Voice over Internet Protocol Work/Life Balance Gmail Budget USB Conferencing Firewall End of Support Scam Employee/Employer Relationship Education Physical Security Virtual Reality Data Protection RMM Safety Apple HIPAA Sports Vendor Management Redundancy Social Keyboard User Error Meetings Staff Software as a Service Telephone System Risk Management Machine Learning Hacker Save Time Connectivity Remote Work The Internet of Things Vendor Lithium-ion battery Managed Services Cleaning Display Customer Service Environment Processor Augmented Reality Fraud Business Intelligence Battery Fax Server IT Consultant Hard Drive Shadow IT Remote Worker Worker Audit Legal IT Management Humor SaaS Cryptocurrency Internet Exlporer Botnet Computing IT Plan Network Congestion Comparison PDF eWaste Unsupported Software CES Proactive IT Charger Digital Signage Best Practice Business Technology Content Management Access Control Compliance YouTube Computer Care Black Market Wearable Technology OneNote Hard Drives Current Events Virtual Assistant Retail Authentication Instant Messaging Telephony Procurement Virus Samsung Net Neutrality Robot Workplace Strategy Excel Document Management Unified Threat Management Wireless Technology Biometrics Computer Accessories Solid State Drive Help Desk How to Value Downtime Virtual Desktop Printing Update Spam Blocking Electronic Medical Records Data storage DDoS Google Docs Automobile Managed Services Provider SharePoint Identity Theft Printer Hiring/Firing Database Bluetooth Computing Infrastructure Going Green Remote Workers IT Assessment Assessment Manufacturing Reputation Streaming Media Password Management Email Best Practices Password Manager Windows Server 2008 Multi-Factor Security Content Tech Support Security Cameras Laptop Search Engine Antivirus Twitter Tools Computer Tips Managed IT Service Techology OneDrive Television Biometric Security Customers NIST Virtual CIO Business Mangement Windows 8 Smart Tech Peripheral Trending Audiobook IT service Touchpad Addiction Digital Security Cameras Amazon Using Data Copiers Public Computer 5G Recycling Tablet Practices Regulations Quick Tip Politics Advertising Transportation Wiring Domains Rootkit Smartwatch Cache Ergonomics Amazon Web Services Computer Fan Development OLED IaaS Notifications Safe Mode Maintenance Criminal Hosted Computing Bloatware PCI DSS Consultant Workers Virtual Machine Benefits GDPR Employee Wireless Internet 2FA Online Shopping FENG Fiber Optics Analytics Tablets Messaging IBM Cabling Relocation File Sharing Inventory Entrepreneur Flash Policy Best Available Specifications Hypervisor Smart Technology Camera Wire Dark mode WIndows 7 Evernote Trend Micro Video Games Software Tips SMS Travel Worker Commute Supercomputer Default App Shortcut Printers Cost Management Sync Procedure Millennials Experience Emails Saving Time Scalability Google Search Smart Office Social Networking dark theme Wireless Charging Shopping AI Business Owner IT Infrastructure NarrowBand Virtual Private Network FinTech Workforce Netflix Two Factor Authentication Bing Search Windows Media Player Running Cable User Cables Root Cause Analysis Social Network PowerPoint Memory HBO Knowledge Investment iPhone Music Project Management Nanotechnology Skype Employees Telecommuting Employee/Employer Relationships ISP Windows 365 Managing Stress Cortana Data loss Digital Signature Outlook Video Conferencing Leadership ROI Files Troubleshooting Chromecast Warranty Start Menu Sales Bitcoin Cameras Shortcuts Personal Loyalty Cryptomining HVAC Point of Sale Google Apps Science Screen Mirroring Analysis Frequently Asked Questions Supply Chain Management Colocation Books Uninterrupted Power Supply Administrator Devices Mobile Monitoring Windows 10s Batteries Digitize Monitor Distributed Denial of Service Enterprise Content Management Customer Relationship Management Windows 8.1 Cast Accountants Analyitcs Tip of the week webinar Windows Server 2008 R2 Emergency MSP Microchip Thought Leadership Programming Professional Services Customer relationships Credit Cards Public Cloud Printer Server Employer Employee Relationship

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code