Another example is the Stylish extension, which was updated after several owner changes to include tracking capabilities for logging the browsing history of its users. But not every developer resists the temptation of money: About a year ago, for example, the Chrome add-on Particle (formerly YouTube+) changed hands, and the new owner immediately turned the extension into adware. The developers of the Chrome extension Honey report on Reddit that they got corresponding offers from malware, adware, and data collection companies, all of which they rejected. On the other hand, developers of popular browser extensions regularly receive purchase offers from shady companies. Open lists of malicious sites that are automatically monitored by the program. For what I understand from their blog this was a generic filtering engine capable of simple ABP filtering (which is quite a feat when you consider that at DNS level only host file blocking rules were possible). Fraudsters “hijacked” the Chrome add-ons and modified them to insert ads into web pages their users viewed. A special Adguard indexing server that analyzes the elements of web pages and checks them for virus signatures. AdGuard moved the filtering engine outof their products (AG for Windows, AG DNS and AG extension). This happened last year to the developers of the Web Developer and the Copyfish extensions. ![]() On the one hand, developers can lose control over their software, for example, if they fall for a phishing attack. Besides extensions that don’t do any good right from the start, there are also harmless add-ons that suddenly become malicious due to various reasons.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |