Google removed two extensions from the Chrome Web Store. The fully functional ad blockers were caught trying do deceive users by using names of other well-known ad blocker extensions.
“AdBlock” by “AdBlock, Inc” and “uBlock” by “Charlie Lee” were also caught performing cookie stuffing – a method to hijack traffic from its legitimate source. The extentions were modifying cookie files and adding a parameter so that the authors of the extentions would earn a commission from the payments ursers made on the websites.
According to ZDNet, the extensions would activate on Teamviewer, Microsoft, LinkedIn, AliExpress and many other huge websites.
Andrey Meshkov, the co-founder of AdGuard and the one who discovered the fraud, mentioned that after 55 hours after installation, the malicious behaviour would start and would end if the user opened Chrome’s Developer Tools
AdBlock and uBlock were both based on the code of the original AdBlock extention and were used
Both extensions, that had together more than 1.5 millions installs, were based on the code of the original “AdBlock”. They were removed by Google after more news websites mentioned Mesjkov’s research.
Despite being replaced by the ScanSnap iX1300 scanner, the Fujitsu ScanSnap S1300i remains a highly…
The 2025 Microsoft Vulnerabilities Report stated that the security risks for Windows systems reached a…
Epson L5290 is recognized as a good all-in-one printer. This EcoTank printer is especially praised…
Are you unable to access the Linux environment, as a required feature, typically the Virtual…
Being writers, we spend a lot of time on Google Docs, writing these tech guides…
Imagine one-click access to the people you communicate with most, directly from your computer’s Taskbar.…