Is that Chrome extension filled with malware? • Blisstech Solutions

You’re probably familiar with extensions if you use Google Chrome in your business. These valuable tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – any software intentionally designed to cause damage to a computer, server, or network. Cybercriminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cybercriminals. While cyber-attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google monitors its Chrome Web Store closely, the risk remains. A recent report claims that 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for eight and a half years before removal.

So, how can you protect yourself and your business from these malicious extensions? We recommend these five steps.

  1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.
  2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.
  3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defence if you accidentally install a malicious extension.
  4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.
  5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cybercriminals. Google’s security team works hard to review every Chrome extension to ensure its safety, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or you’d like more advice on keeping your business secure, our team can help. Get in touch.

More Content

Why all businesses should adopt MFA now

Years ago, Multi-Factor Authentication (MFA) used to be called 2FA, or Two Factor Authentication.  This was made up of: Something you have, like a device that can generate a one-time password (OTP). Something you know, like a password. MFA has extended things meaning...
And the award for most common phishing scam goes to…

And the award for most common phishing scam goes to…

Which phishing scam are you and your employees most at risk from? We tell you about the most common phishing emails and the easy way to stay safe.

Cyber security training once a year isn’t working

Cyber security training once a year isn’t working

You’re wasting your time on annual cyber security training. Why? Because it’s simply not cutting it anymore. Discover a better plan here.

Are you losing hours each week setting up video calls?

You could be losing a full-time working week for every member of your team, thanks to the hassle of setting up video calls.

Passkeys could change passwords forever

Back in May, we heard there would soon be a successor to the password – the Passkey. Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited. Though it’s caused a bit of confusion. Apple is going to great...
Reverse image search makes purchasing and marketing easier

Bing Visual Search makes purchasing and marketing easier

Think the Windows 11 Photo app has little use in your business? Visual Search with Bing is about to change that, with some very useful new functionality… Find out more here.

Power Automate and Flows Thumbnail

Tech Tip: What is Microsoft Power Automate?

Welcome to a new Tuesday tech tip video where I will give you a quick introduction to Microsoft Power Automate. We all want to streamline our work life and make ourselves more productive. Well, if you use Microsoft 365, you can do just that by using Power Automate....

Bot malware is a growing security threat

Bot malware is a worrying new security risk. Malware bots steal whole user profiles – that’s a complete snapshot of your ID and settings.

Before you replace your slow PCs…

Before you replace your slow PCs…

Windows PCs running slowly? It doesn’t necessarily mean it’s time to replace them. There are some other ways you can give things a boost. We’ll tell you how.

How many devices do you use every workday?

Gadget overload? How many devices do you use at work?

Are all the devices your team uses helping them stay productive – or hindering them? Every extra gadget means another thing to remember, charge, and carry. There’s a simple way to help streamline tech in your business…

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05