Tuesday 4 October 2016

Consequences Of Colluding Browser Extension Attack!!!


The add-ons that get installed in the browser extension help in increasing the functionality of the browser. So it is important to add those extensions that will help you in browsing, but in some cases it has been seen that some add-ons gets installed automatically without users approval, and such extensions are responsible for exposing your system to various external threats.

How malicious add-ons get installed in Browser Extension?

The developers program malicious codes and place them in the Custom and Advanced section of the software and distribute it all over the internet for free. When the users download or install such software in their system, this malicious code also gets installed in the system and the user do not even know that their system has been infected by the malicious codes developed by the user. Such codes get installed as add-ons in the browser extensions. And thus the possessions of the Browser are at privilege escalation, risk and many more. Such browser extension would not allow the web applications to perform properly, it would redirect you to unwanted web address or you will get lots of pop up ads while browsing the web pages. And all this issues are due to the malicious add-ons and it can even track your personal, confidential files from the host system file and can even initiate the arbitrary processes. Along with it, the extension would even plan along with a range of extensions that has been installed.


This attack allows two malicious extensions to communicate as well as collaborate with one other and as a result the developers would be able to achieve their malevolent intention. Such susceptible extension can be easily identified in the framework like sharing of the object reference and overriding of preference. In this way the effectiveness of such attacking scenarios can be illustrated. In this way the details of model illustration of the web domains along with shopping as well as Banking would be proved and thus the privacy of the users gets hampered and the system gets exposed to various cyber threats.

For more details you can visit:

0 comments:

Post a Comment