Google Chrome at risk from shape-shifting browser extensions — how to stay safe

and image of the Google Chrome logo on a laptop
(Image credit: Shutterstock)

Just like malicious apps on your smartphone, malicious browser extensions can put your devices and the sensitive data stored in your browser at serious risk.

The problem with malicious browser extensions is that, unlike with the apps on your phone, you never see them after installation unless you go into Chrome’s Manage Extensions menu. If these harmful extensions weren’t a big enough problem already, a new polymorphic attack allows them to instantly transform their appearance to mimic the legitimate ones installed in your browser.

As reported by BleepingComputer, the cybersecurity company SquareX Labs devised this new attack as a proof of concept. If it ended up in the hands of hackers, though, it could be really dangerous as malicious extensions could then be used to impersonate the best password managers and other extensions for banking apps, crypto wallets and more, which all store loads of sensitive personal and financial data.

Here’s everything you need to know about this new polymorphic attack and some tips and tricks on staying safe from malicious extensions after your browser data.

Fooling the Chrome Web Store

A computer showing the Chrome Web Store

(Image credit: Tom's Guide)

To pull off this attack, a hacker, scammer or other cybercriminal would first need to submit a malicious extension with polymorphic capabilities to the Chrome Web Store. The extension itself would need to do exactly what its listing page describes for it to bypass Google’s stringent security checks, though.

Once installed, this bad extension then abuses Chrome’s own ‘chrome.management’ API to get a list of all of the other extensions installed in a victim’s browser. If it doesn’t have permission to access this API though, SquareX explains in a blog post that this can be achieved by using a malicious script to load a specific file or URL unique to the legitimate extensions that are being targeted.

From here, this list of installed extensions is then sent back to a hacker-controlled server. If one of the targeted extensions — like 1Password — is installed, the malicious extension then transforms to completely copy it. This includes changing its icon and name to match the real extension.

A fake login popup appears to trick victims into entering their credentials, impersonating the real extension. Since some victims might not login, this attack also uses a fake “Session Expired” prompt to make them think they’ve been logged out.

Now for the kicker. Once a victim has logged in and inadvertently given their credentials over to hackers (or, in this case, SquareX Labs' researchers), the malicious extension then changes back to its original appearance and the real extension is re-enabled. From a victim’s perspective, everything now looks normal, and they might not even realize they’ve been hacked.

Unfortunately, in this case, there’s no immediate fix for this attack since it’s using Chrome’s own API against it as opposed to exploiting a patchable vulnerability. SquareX has reached out to Google, though and has recommended that the company implement specific defenses to protect against this attack.

As it stands now, no protective measures have been implemented by Google to stop a polymorphic browser extension attack like the one described above, but that could change soon. I’ll keep an eye out if and when a fix becomes available to update this story accordingly.

How to stay safe from malicious browser extensions

Padlock shadow in front of the Google Chrome logo

(Image credit: Ink Drop/Shutterstock)

So, what can you do in the meantime to stay safe from malicious extensions? Well, there are a few steps you can take to avoid installing bad extensions in the first place.

For starters, you want to limit the overall number of extensions you have installed just like you should with the apps on your phone. Ask yourself if you really need an extension first before installing anything. Chances are you might be able to get the same functionality elsewhere without putting your browser data at risk.

If you find an extension you need to install, you will want to scrutinize its rating and reviews first. Since these can be faked, though, it’s also worth taking a close look at the extension’s developer and their past work.

To stay safe from malicious extensions spreading malware and other viruses, you should be using the best antivirus software on your Windows PC or the best Mac antivirus software on your Apple computer. As they can also steal your personal and financial data to commit fraud, it might also be worth investing in one of the best identity theft protection services as they can help you recover your identity and any lost funds after falling victim to a cyberattack.

Browser extensions can be extremely useful, but just like with other software, installing them comes with its own set of risks. If you’re careful online, picky about which extensions you install and take the time to periodically audit all of your existing extensions, you should be safe, though.

More from Tom's Guide

TOPICS
Anthony Spadafora
Managing Editor Security and Home Office

Anthony Spadafora is the managing editor for security and home office furniture at Tom’s Guide where he covers everything from data breaches to password managers and the best way to cover your whole home or business with Wi-Fi. He also reviews standing desks, office chairs and other home office accessories with a penchant for building desk setups. Before joining the team, Anthony wrote for ITProPortal while living in Korea and later for TechRadar Pro after moving back to the US. Based in Houston, Texas, when he’s not writing Anthony can be found tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
and image of the Google Chrome logo on a laptop
Over 600,000 Chrome users at risk after 16 browser extensions compromised by hackers — what you need to know
and image of the Google Chrome logo on a laptop
Popular Chrome extensions hijacked by hackers in widespread cyberattack — 3.2 million at risk
and image of the Google Chrome logo on a laptop
Billions of Chrome users at risk from new browser-hijacking Syncjacking attack — how to stay safe
A hacker typing quickly on a keyboard
Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
A laptop displaying the Chrome logo
Don't click this — malicious ads impersonating Google Chrome spreading dangerous malware
A hacker typing quickly on a keyboard
Hackers can steal your accounts, and all it takes is a double-click — don’t fall for this new form of clickjacking
Latest in Online Security
and image of the Google Chrome logo on a laptop
Google Chrome at risk from shape-shifting browser extensions — how to stay safe
Green skull on smartphone screen.
Over 1 million Android devices infected with password-stealing, pre-installed botnet malware — how to stay safe
Android 12
Google March Android Security Update fixes two high severity vulnerabilities — update now
An Android bot next to an Android TV remote
Millions of Android TVs hijacked in massive botnet — how to see if yours is at risk
Poster of Elon Musk saying "I am stealing from you"
Elon Musk's DOGE blocked from accessing your data – and 3 in 4 Americans agree
A fake text message on a smartphone being held by both hands.
Toll road scams are worse than ever — what to look for and how to stay safe
Latest in News
and image of the Google Chrome logo on a laptop
Google Chrome at risk from shape-shifting browser extensions — how to stay safe
YouTube Premium logo on a phone in front of YouTube on a browser
YouTube Premium Lite vs YouTube Premium: What's the difference?
Shogun season 1
'Shogun' season 2 just got an ominous update from a prominent Disney executive
iOS 18.4 logo on an iPhone
iOS 18.4 public beta 2 is here — new emoji and everything else to try on your iPhone
AMD Radeon RX 9070 XT
Where to buy AMD Radeon RX 9070 and RX 9070 XT — I recommend these retailers in US and UK
(L to R) Noah Centineo as Owen Hendricks, Maddie Hasson as Nichika Lashin in "The Recruit"
Netflix just canceled 'The Recruit' after 2 seasons and I'm stunned