{"id":23612,"date":"2023-12-15T08:30:33","date_gmt":"2023-12-15T16:30:33","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/12\/15\/news-17342\/"},"modified":"2023-12-15T08:30:33","modified_gmt":"2023-12-15T16:30:33","slug":"news-17342","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/12\/15\/news-17342\/","title":{"rendered":"Malicious browser extensions in 2023 | Kaspersky official blog"},"content":{"rendered":"<p><strong>Credit to Author: Alanna Titterington| Date: Fri, 15 Dec 2023 15:59:36 +0000<\/strong><\/p>\n<p>We often write here on these blog pages about how browser extensions can be very dangerous. To illustrate this fact, we decided to dedicate an article to it. In this post, we&#8217;ll look at the most interesting, unusual, widespread, and dangerous cases involving malicious extensions in 2023. We&#8217;ll also discuss what these extensions were capable of \u2014 and, of course, how to protect yourself from them.<\/p>\n<h2>Roblox extensions with a backdoor<\/h2>\n<p>To set the tone and also highlight one of the biggest concerns associated with dangerous extensions, let&#8217;s start with a story that began last year. In November 2022, two malicious extensions with the same name \u2014 SearchBlox \u2014 were <a href=\"https:\/\/twitter.com\/Roblox_RTC\/status\/1595236988533313536\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> in the Chrome Web Store, the official store for Google Chrome browser extensions. One of these extensions had over 200,000 downloads.<\/p>\n<p>The declared purpose of the extensions was to search for a specific player on the Roblox servers. However, their actual purpose was to hijack Roblox players&#8217; accounts and steal their in-game assets. After information about these malicious extensions <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoored-chrome-extension-installed-by-200-000-roblox-players\/\" target=\"_blank\" rel=\"nofollow noopener\">was published<\/a> on BleepingComputer, they were removed from the Chrome Web Store, and automatically deleted from the devices of users who&#8217;d installed them.<\/p>\n<div id=\"attachment_50065\" style=\"width: 1262px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-01.jpg\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-50065\" class=\"size-full wp-image-50065\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-01.jpg\" alt=\"SearchBlox: malicious browser extensions with a backdoor in the Chrome Web Store\" width=\"1252\" height=\"630\" \/><\/a><\/p>\n<p id=\"caption-attachment-50065\" class=\"wp-caption-text\">Malicious SearchBlox extensions published in the Google Chrome Web Store hijacked Roblox players&#8217; accounts. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoored-chrome-extension-installed-by-200-000-roblox-players\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>However, the Roblox story doesn&#8217;t end there. In August 2023, two more malicious extensions of a similar nature \u2014 <a href=\"https:\/\/devforum.roblox.com\/t\/psa-do-not-install-chrome-webstore-plugin-rotracker-which-is-being-advertised-on-the-website\/2561666\" target=\"_blank\" rel=\"nofollow noopener\">RoFinder and RoTracker<\/a> \u2014 were discovered in the Chrome Web Store. Just like SearchBlox, these plugins offered users the ability to search for other players on the Roblox servers, but in reality had a backdoor built into them. The Roblox user community eventually managed to get these extensions removed from the store as well.<\/p>\n<div id=\"attachment_50060\" style=\"width: 1264px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-02.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50060\" class=\"size-full wp-image-50060\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-02.png\" alt=\"RoTracker: another malicious browser extension with a backdoor\" width=\"1254\" height=\"697\" \/><\/a><\/p>\n<p id=\"caption-attachment-50060\" class=\"wp-caption-text\">The RoTracker malicious extension, also hosted on the Google Chrome Web Store. <a href=\"https:\/\/devforum.roblox.com\/t\/psa-do-not-install-chrome-webstore-plugin-rotracker-which-is-being-advertised-on-the-website\/2561666\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>This suggests that the quality of moderation at the world&#8217;s most official platform for downloading Google Chrome extensions leaves much to be desired, and it&#8217;s easy enough for creators of malicious extensions to push their creations in there. To get moderators to spot dangerous extensions and remove them from the store, reviews from affected users are rarely sufficient \u2014 it often requires efforts from the media, security researchers, and\/or a large online community.<\/p>\n<h2>Fake ChatGPT extensions hijacking Facebook accounts<\/h2>\n<p>In March 2023, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-accounts-hijacked-by-new-malicious-chatgpt-chrome-extension\/\" target=\"_blank\" rel=\"nofollow noopener\">two malicious extensions<\/a> were <a href=\"https:\/\/thehackernews.com\/2023\/03\/fake-chatgpt-chrome-extension-hijacking.html\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> in the Google Chrome Web Store within a few days of each other \u2014 both taking advantage of the hype surrounding the ChatGPT AI service. One of these was an infected copy of the legitimate &#8220;ChatGPT for Google&#8221; extension, offering integration of ChatGPT&#8217;s responses into search engine results.<\/p>\n<p>The infected &#8220;ChatGPT for Google&#8221; extension was uploaded to the Chrome Web Store on February 14, 2023. Its creators waited for some time and only started actively spreading it precisely a month later, on March 14, 2023, using Google Search ads. The criminals managed to attract around a thousand new users per day, resulting in over 9000 downloads by the time the threat was discovered.<\/p>\n<div id=\"attachment_50063\" style=\"width: 926px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102424\/dangerous-browser-extensions-2023-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50063\" class=\"size-full wp-image-50063\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102424\/dangerous-browser-extensions-2023-03.jpg\" alt=\"Infected version of the \" width=\"916\" height=\"860\" \/><\/a><\/p>\n<p id=\"caption-attachment-50063\" class=\"wp-caption-text\">The infected version of &#8220;ChatGPT for Google&#8221; looked just like the real thing. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-accounts-hijacked-by-new-malicious-chatgpt-chrome-extension\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>The trojanized copy of &#8220;ChatGPT for Google&#8221; functioned just like the real one, but with extra malicious functionality: the infected version included additional code designed to steal Facebook session cookies stored by the browser. Using these files, the attackers were able <a href=\"https:\/\/www.kaspersky.com\/blog\/ducktail-steals-facebook-business-accounts\/49845\/\" target=\"_blank\" rel=\"noopener\">to hijack the Facebook accounts<\/a> of users who&#8217;d installed the infected extension.<\/p>\n<p>The compromised accounts could then be used for illegal purposes. As an example, the researchers mentioned a Facebook account belonging to an RV seller, which started promoting ISIS content after being hijacked.<\/p>\n<div id=\"attachment_50069\" style=\"width: 4253px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102433\/dangerous-browser-extensions-2023-04.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50069\" class=\"size-full wp-image-50069\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102433\/dangerous-browser-extensions-2023-04.jpg\" alt=\"Hijacked Facebook account promoting ISIS content\" width=\"4243\" height=\"4332\" \/><\/a><\/p>\n<p id=\"caption-attachment-50069\" class=\"wp-caption-text\">After being hijacked, the Facebook account started promoting ISIS content. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-accounts-hijacked-by-new-malicious-chatgpt-chrome-extension\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>In the other case, fraudsters created a completely original extension called &#8220;Quick access to Chat GPT&#8221;. In fact, the extension actually did what it promised, acting as an intermediary between users and ChatGPT using the AI service&#8217;s official API. However, its real purpose was again to steal Facebook session cookies, allowing the extension&#8217;s creators to hijack Facebook business accounts.<\/p>\n<div id=\"attachment_50064\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102425\/dangerous-browser-extensions-2023-05.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50064\" class=\"size-full wp-image-50064\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102425\/dangerous-browser-extensions-2023-05.jpg\" alt=\"Quick access to Chat GPT malicious extension\" width=\"1400\" height=\"592\" \/><\/a><\/p>\n<p id=\"caption-attachment-50064\" class=\"wp-caption-text\">&#8220;Quick access to Chat GPT&#8221; malicious extension. <a href=\"https:\/\/labs.guard.io\/fakegpt-new-variant-of-fake-chatgpt-chrome-extension-stealing-facebook-ad-accounts-with-4c9996a8f282\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>Most interestingly, to promote this malicious extension, the perpetrators used Facebook ads, paid for by \u2014 you guessed it \u2014 the business accounts they&#8217;d already hijacked! This cunning scheme allowed the creators of &#8220;Quick access to Chat GPT&#8221; to attract a couple of thousand new users per day. In the end, both malicious extensions were removed from the store.<\/p>\n<h2>ChromeLoader: pirated content containing malicious extensions<\/h2>\n<p>Often, creators of malicious extensions don&#8217;t place them in the Google Chrome Web Store, and distribute them in other ways. For example, earlier this year researchers noticed a new malicious campaign related to the ChromeLoader malware, already well-known in the cybersecurity field. The primary purpose of this Trojan is to install a malicious extension in the victim&#8217;s browser.<\/p>\n<p>This extension, in turn, displays intrusive advertisements in the browser and spoofs search results with links leading to fake prize giveaways, surveys, dating sites, adult games, unwanted software, and so on.<\/p>\n<p>This year, attackers have been using a variety of pirated content as bait to make victims install ChromeLoader. For example, in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chromeloader-campaign-lures-with-malicious-vhds-for-popular-games\/\" target=\"_blank\" rel=\"nofollow noopener\">February 2023<\/a>, researchers reported the spread of ChromeLoader through <a href=\"https:\/\/en.wikipedia.org\/wiki\/VHD_(file_format)\" target=\"_blank\" rel=\"nofollow noopener\">VHD files<\/a> (a disk image format) disguised as hacked games or game &#8220;cracks&#8221;. Among the games used by the distributors were Elden Ring, ROBLOX, Dark Souls 3, Red Dead Redemption 2, Need for Speed, Call of Duty, Portal 2, Minecraft, Legend of Zelda, Pokemon, Mario Kart, Animal Crossing, and more. As you might guess, all these VHD files contained the malicious extension installer.<\/p>\n<p>A few months later, in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites\/\" target=\"_blank\" rel=\"nofollow noopener\">June 2023<\/a>, another group of researchers released a detailed report on the activities of the same ChromeLoader, detailing its spread through a network of sites offering pirated music, movies, and once again, computer games. In this campaign, instead of genuine content, <a href=\"https:\/\/en.wikipedia.org\/wiki\/VBScript\" target=\"_blank\" rel=\"nofollow noopener\">VBScript<\/a> files were downloaded onto victims&#8217; computers, which then loaded and installed the malicious browser extension.<\/p>\n<div id=\"attachment_50062\" style=\"width: 2020px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102429\/dangerous-browser-extensions-2023-06.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50062\" class=\"size-full wp-image-50062\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102429\/dangerous-browser-extensions-2023-06.jpg\" alt=\"ChromeLoader malware installs a malicious browser extension\" width=\"2010\" height=\"1276\" \/><\/a><\/p>\n<p id=\"caption-attachment-50062\" class=\"wp-caption-text\">One of the sites that distributed the ChromeLoader malware under the guise of pirated content. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>Although the altered search results quickly alert victims to the presence of the dangerous extension in their browser, getting rid of it isn&#8217;t so easy. ChromeLoader not only installs the malicious extension but also adds scripts and Windows Task Scheduler tasks to the system that reinstall the extension every time the system reboots.<\/p>\n<h2>Hackers reading Gmail correspondence using a spy extension<\/h2>\n<p>In March 2023, the German Federal Office for the Protection of the Constitution and the South Korean National Intelligence Agency <a href=\"https:\/\/www.verfassungsschutz.de\/SharedDocs\/publikationen\/EN\/prevention\/2023-03-20-joint-cyber-security-advisory-korean.html\" target=\"_blank\" rel=\"nofollow noopener\">issued<\/a> a joint report on the activities of the <a href=\"https:\/\/securelist.com\/the-kimsuky-operation-a-north-korean-apt\/57915\/\" target=\"_blank\" rel=\"noopener\">Kimsuky<\/a> cybercriminal group. This group uses an infected extension for Chromium-based browsers \u2014 Google Chrome, Microsoft Edge, as well as the South Korean browser Naver Whale \u2014 to read the Gmail correspondence of their victims.<\/p>\n<p>The attack begins with the perpetrators sending emails to specific individuals of interest. The email contains a link to a malicious extension called AF, along with some text convincing the victim to install the extension. The extension starts working when the victim opens Gmail in the browser where it&#8217;s installed. AF then automatically sends the victim&#8217;s correspondence to the hackers&#8217; C2 server.<\/p>\n<p>Thus, Kimsuky manages to gain access to the contents of the victim&#8217;s mailbox. What&#8217;s more, they don&#8217;t need to resort to any tricks to hack into this mailbox; they simply bypass the two-factor authentication. As a bonus, this method allows them to do everything in a highly discreet manner \u2014 in particular, preventing Google from sending alerts to the victim about account access from a new device or suspicious location, as would be the case if the password were stolen.<\/p>\n<h2>Rilide: malicious extension stealing cryptocurrency and bypassing two-factor authentication<\/h2>\n<p>Criminals also often use malicious extensions to target cryptocurrency wallets. In particular, the creators of the Rilide extension, first discovered in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-rilide-browser-extension-to-bypass-2fa-steal-crypto\/\" target=\"_blank\" rel=\"nofollow noopener\">April 2023<\/a>, use it to track cryptocurrency-related browser activity of infected users. When the victim visits sites from a specified list, the malicious extension steals cryptocurrency wallet info, email logins, and passwords.<\/p>\n<p>In addition, this extension collects and sends browser history to the C2 server and lets the attackers take screenshots. But Rilide&#8217;s most interesting feature is its ability to bypass two-factor authentication.<\/p>\n<p>When the extension detects that a user is about to make a cryptocurrency transaction on one of the online services, it injects a script into the page that replaces the confirmation code input dialog, and then steals that code. The payment recipient&#8217;s wallet is replaced with one belonging to the attackers, and then, finally, the extension confirms the transaction using the stolen code.<\/p>\n<div id=\"attachment_50061\" style=\"width: 1168px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-07.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50061\" class=\"size-full wp-image-50061\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-07.jpg\" alt=\"Promotion of Rilide under the guise of a blockchain game\" width=\"1158\" height=\"935\" \/><\/a><\/p>\n<p id=\"caption-attachment-50061\" class=\"wp-caption-text\">How the malicious Rilide extension was promoted on X (Twitter) under the guise of blockchain games. <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/new-rilide-stealer-version-targets-banking-data-and-works-around-google-chrome-manifest-v3\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>Rilide attacks users of Chromium-based browsers \u2014 Chrome, Edge, Brave, and Opera \u2014 by imitating a legitimate Google Drive extension to avoid suspicion. Rilide appears to be freely sold on the black market, so it&#8217;s used by criminals unrelated to one another. For this reason, various distribution methods have been discovered \u2014 from malicious websites and emails to infected <a href=\"https:\/\/en.wikipedia.org\/wiki\/Blockchain_game\" target=\"_blank\" rel=\"nofollow noopener\">blockchain game<\/a> installers promoted on <span style=\"text-decoration: line-through;\">Twitter<\/span> X.<\/p>\n<p>One of the particularly interesting Rilide distribution methods was through a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-malware-rilide-targets-enterprise-users-via-powerpoint-guides\/\" target=\"_blank\" rel=\"nofollow noopener\">misleading PowerPoint presentation<\/a>. This presentation posed as a security guide for Zendesk employees, but was actually a step-by-step guide for installing the malicious extension.<\/p>\n<div id=\"attachment_50067\" style=\"width: 1697px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102428\/dangerous-browser-extensions-2023-08.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50067\" class=\"size-full wp-image-50067\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102428\/dangerous-browser-extensions-2023-08.jpg\" alt=\"Rilide installation guide disguised as a cybersecurity presentation\" width=\"1687\" height=\"949\" \/><\/a><\/p>\n<p id=\"caption-attachment-50067\" class=\"wp-caption-text\">A step-by-step guide for installing the malicious extension, disguised as a security presentation for Zendesk employees. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-malware-rilide-targets-enterprise-users-via-powerpoint-guides\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<h2>Dozens of malicious extensions in the Chrome Web Store \u2014 with 87 million downloads combined<\/h2>\n<p>And, of course, one cannot forget the story of the summer when researchers discovered <a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-chrome-extensions-87-million\/48562\/\" target=\"_blank\" rel=\"noopener\">several dozen malicious extensions<\/a> in the Google Chrome Web Store, which collectively had more than 87 million downloads from the store. These were various kinds of browser plugins \u2014 from tools for converting PDF files and ad blockers to translators and VPNs.<\/p>\n<p>The extensions were added to the Chrome Web Store as far back as 2022 and 2021, so by the time they were discovered they&#8217;d already been there for several months, a year, or even longer. Among reviews of the extensions, there were some complaints from vigilant users who reported that the extensions were spoofing search results with advertisements. Unfortunately, the Chrome Web Store moderators ignored these complaints. The malicious extensions were only removed from the store after two groups of security researchers brought the issue to Google&#8217;s attention.<\/p>\n<div id=\"attachment_50066\" style=\"width: 1040px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-09.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50066\" class=\"size-full wp-image-50066\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102426\/dangerous-browser-extensions-2023-09.jpg\" alt=\"Malicious Autoskip extension for YouTube in the Google Chrome Web Store\" width=\"1030\" height=\"1210\" \/><\/a><\/p>\n<p id=\"caption-attachment-50066\" class=\"wp-caption-text\">The most popular of the malicious extensions \u2014 Autoskip for YouTube \u2014 had over nine million downloads from the Google Chrome Web Store. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-chrome-extensions-with-75m-installs-removed-from-web-store\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<h2>How to protect yourself from malicious extensions<\/h2>\n<p>As you can see, dangerous browser extensions can end up on your computer from various sources \u2014including the official Google Chrome Web Store. And attackers can use them for a wide range of purposes \u2014 from hijacking accounts and altering search results to reading correspondence and stealing cryptocurrencies. Accordingly, it&#8217;s important to take precautions:<\/p>\n<ul>\n<li>Try to avoid installing unnecessary browser extensions. The fewer extensions you have in your browser, the better.<\/li>\n<li>If you do install an extension, it&#8217;s better to install it from an official store rather than from an unknown website. Sure, this doesn&#8217;t eliminate the risk of encountering dangerous extensions completely, but at least the Google Chrome Web Store does take its security seriously.<\/li>\n<li>Before installing, read reviews of an extension. If there&#8217;s something wrong with it, someone might have already noticed it and informed other users.<\/li>\n<li>Periodically review the list of extensions installed in your browsers. Remove any you don&#8217;t use \u2014 especially ones you don&#8217;t remember installing.<\/li>\n<li>And be sure to use <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\">reliable protection<\/a> on all your devices.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/50059\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/12\/15102428\/dangerous-browser-extensions-2023-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Alanna Titterington| Date: Fri, 15 Dec 2023 15:59:36 +0000<\/strong><\/p>\n<p>Stealing cryptocurrency, hijacking accounts in games and social networks, manipulating search results, and other dirty tricks of malicious browser extensions in 2023.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[14980,10468,12014,10699,14147,11058,1670,10602,714,10438],"class_list":["post-23612","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-accounts","tag-adware","tag-browsers","tag-chrome","tag-cryptocurrencies","tag-extensions","tag-google","tag-passwords","tag-security","tag-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23612"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23612\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23612"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}