Is that Chrome extension filled with malware? • Blisstech Solutions

You’re probably familiar with extensions if you use Google Chrome in your business. These valuable tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – any software intentionally designed to cause damage to a computer, server, or network. Cybercriminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cybercriminals. While cyber-attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google monitors its Chrome Web Store closely, the risk remains. A recent report claims that 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for eight and a half years before removal.

So, how can you protect yourself and your business from these malicious extensions? We recommend these five steps.

  1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.
  2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.
  3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defence if you accidentally install a malicious extension.
  4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.
  5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cybercriminals. Google’s security team works hard to review every Chrome extension to ensure its safety, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or you’d like more advice on keeping your business secure, our team can help. Get in touch.

More Content

3 essential security tools for every business

Your data is one of your most valuable business assets. Keeping it safe should be one of your main priorities.

Unlock your potential with Copilot

Unlock your potential with Copilot

Tried Microsoft Copilot yet? It’s a smart tool baked into the applications you use every day, that could save you time. Here we tell you some cool ways it can help.

Tech Tip: How to create a transcript using Word

Welcome to another Blisstech Solutions Tuesday Tech Tip! Are you tired of rewinding and pausing video or audio content just to jot down notes? Say goodbye to that tedious process and hello to a more efficient solution. In this tech tip video, we'll show you how to...

Tech Tip: How to search for files in Window and Microsoft 365

Welcome to a new Tuesday tech tip video where we will show you how to find your files using the powerful search features of Windows and Microsoft 365. Even if you are very organised with filing your data, sometimes, you just cannot find the file that you are looking...
Businesses are taking too long to fix vulnerabilities

Businesses are taking too long to fix vulnerabilities

If you knew your systems were at risk of attack, you’d jump in and get things locked down fast – right? Actually… many businesses take too long to fix vulnerabilities. Here’s why that’s a problem.

Tech risks law firms can’t afford to ignore

Your law firm runs on trust, deadlines, and confidential data. But small tech decisions can quietly undermine all three. From hybrid working shortcuts to security gaps you don’t see day-to-day, many practices carry risks without realising it. The question is simple:...
Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...
A man talking to his colleagues in an online meeting similar to Microsoft Teams

How to use MS Teams to replace your file server

You all know MS Teams as a video conferencing tool, but do you know about all of its other cool features? One such feature enables businesses to replace file servers, allowing users to work from anywhere and collaborate on documents in real-time.  This video shows you...

What is Proactive Monitoring and how can it protect your business?

How proactive monitoring will help your business weather any storm. You are the captain of your business's ship. You have a loyal and skilled team behind you. You are ready for any challenge! Or so you thought. Then, one day, without warning, a vast digital monster...
1 in 4 people struggle with password overload. Here’s the answer

1 in 4 people struggle with password managment. Here’s the answer

Struggling from password overload? You’re not alone, and it’s putting your business at risk of data theft. Good news: There’s a very simple solution and we’ll tell you all about it.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05