
There are only 6 extensions in this group, with just over 1.5 million users total, but I'm almost 100% sure that all of them are real active users.
#ADCLEAR VS ADGUARD FULL#
The full list of extensions from the first group can be found here.
#ADCLEAR VS ADGUARD CODE#
The part of the code that was injected into the pseudo-analytics script does a very simple thing: it adds an obfuscated script into every freshly opened tab. But don't you decide that these are measures to hide a spooky script, I've got more for you. The thing is, the malefactor's server tracks your browser's cookies and only inserts malicious code for users it can recognize. Keep in mind, it will only transform for you personally - any other person will see the same old harmless script. You don't want to see your browser extensions do that The snag is, just you wait a couple days and this script will 'evolve' a bit:

Every such extension loads a seemingly harmless script with 'analytics' from. They are perfect specimens to illustrate the 'botnet' thesis as well - they don't become malicious right away but only after receiving a signal from a remote server. Also, I am sure there are actually more extensions like this, and CWS team will be able to find them all. It consists of all kinds of extensions, but the biggest part are all kinds of "wallpaper" extensions. Note that fake ad blockers is just a small part of this group. This group is especially curious because of the measures they take to conceal their actions. It includes 295 extensions with total number of 80 million users if we're to believe Chrome Web Store data. This is the most large-scale group of malicious extensions from my experience. Adblocker for YouTube - Youtube Adblocker, 2,000,000+ usersĪs you can see, authors aren't spending sleepless nights trying to come up with a witty name.Ad-block for YouTube - Youtube Ad-blocker Pro, 2,000,000+ users.Here's a couple of popular examples from this group (UPD: all links to the Chrome Store, now non-working, are in the gist below): Let's look deeper into each of aforementioned cases. This code may be changed any time, no reviews or updates are required. The trick is they are using third-party code loaded from a remote server and controlled by their owners. Numerous, I couldn't even count them all so I selected 5 most popular ones with 10 million users combined (again, bots have been employed most likely).Īnd you know what else is important and relevant for most of these extensions? At any point, WITHOUT ANY UPDATES they can change their behavior and start doing whatever. They can start doing some shady stuff at any second. Spam extensions that are like time bombs.

They even reuse the same code! Six of these guys this time, with 1,650,000 total users (and here I believe it's a real number). These are my old pals, I exposed an entire brood of them last year.

Click on every extension that looks like a scam (basically every other one, there's no shortage).Search the Store with terms 'adblock', 'adguard', 'ublock', 'ad blocker'.How would you do it? Here's a tested and trusted method:

Imagine you need to find a malicious browser extension that disguises itself as a legit one, like an ad blocker. 80M People Scammed by Chrome Fake Ad Blockers: the Same Old Song
