Malicious Extensions: Uncovering Add-ons that Manipulate Search Behavior
âAn examination of how malicious extensions infiltrate organizations, bypassing network and endpoint security measures. The analysis reveals strategies used by attackers to capture and monitor user inputs, enabling adversarial groups to harbor sensitive data of users and generate illicit ad revenue.
Key Takeaways
- Keep Aware analyzes browser extensions to understand methods of infection and the behavior of malicious extensions.
- Attackers continue to use subtle, repeatable social engineering techniques to establish footholds in browsers.
- Keep Aware's Threat Research team highlights five specific malicious browser extensions of a campaign that has captured millions of installs in the Chrome and Edge extension stores.
- Malicious browser extensions are an extensive threat â and will continue to be.
- IT and security teams need to implement management strategies for browser extensions.
Introduction
Keep Aware's Threat Research team is looking closely into malicious extensions and how high-risk and extremely permissive extensions take hold within organizations and an employee's workspace. While browsers continue to address user privacy concerns and attempt to prevent malicious extensions from ending up on user devices, it is far too easy for attackers to evade existing measures against browser extensions.
We have analyzed a handful of strategies that attackers use to establish a foothold in an organization and remain under the radar from existing security technology stacks. Specifically, this analysis unpacks the methods and excessive permissions an attacker uses to gain illicit ad revenue and to capture, monitor, and spy on user inputs across websites and user search activity. We determined with confidence that certain groups use this technique and repeatable campaigns to capture user search activity and generate illegitimate ad revenue.
DocToPDF, Your Docs To PDF, YourPDFBuddy⊠the List Goes On
We have observed patterns of malicious browser extensions that are added to everyday work browsers across client environments. This analysis focuses on extensions that inconspicuously monitor and inject results into user search activity and perform illicit ad revenue activity. These browser extensions continue to be a subtle and hidden way for attackers to gain excessive control within an organization. Many of these extensions are linked to wider campaigns with coordinated efforts across the last 3 years. Yet, Chrome, Edge, and Firefox browsers continue to silently run these types of extensions. We analyze the behaviors of these extensions and offer explanations as to how they are able to gain initial access to a device. The extensions we cover in this analysis include:
- Your Docs To PDFÂ
- DoctoPDF
- MyPDFMaker ads
- YourPDFBuddy ads
- QuickMail
Before delving into the details of these specific extensions, let's first discuss the common ways malicious browser extensions are installed.
Social Engineering: Two Subtle But Effective Infection Strategies
Keep Aware first observed these types of extensions while hunting for suspicious extension manifest characteristics. The names of these extensions are indicative of their ability to 'fly under the radar', though the initial infection vectors are much more subtle. These extensions claim to manage simple and widely-searched functions such as ad-blocking, personal security, and in this specific campaign, document helpers.
We have observed two similar methods that malicious extensions commonly get added to a browser and each utilizes social engineering. This is a form of using human psychology to manipulate the user into performing a specific action (The specific action, in this case, is installing a malicious extension).
- Legitimate Site Compromise: An attacker has compromised and modified a legitimate site and added code that prompts a user to install a browser extension.
- Search Engine Ads: Appearing as a promoted ad in search engine results is another popular strategy for attackers to eventually get users to install browser extensions.
Because these social engineering strategies are subtle and can be incredibly effective, in the next section we walk through how an attacker uses these two strategies to dupe a user into installing a malicious extension.
Caution: Ads and Legitimate Sites in Search Results May Be Malicious
Promoted ads and compromised but legitimate search results are often the initial infection strategy across several browser-based infections. This initial infection chain consists of 3 major parts: compromised search results, redirected installation, and initial browser configuration changes. Figure 1 shows the chain of events leading to infection and the initial foothold.
Using Search Engine Results as an Initial Infection Strategy
The attack scenario is as follows:
- A user uses a search engine (e.g., Google or Bing) to search for help converting a PDF, for example.
- The search engine provides a list of results: first, a list of promoted ads and then a list of non-ad results.
- The user clicks on a result â either a promoted ad to an attacker's website or a link to a legitimate but compromised site.
- The user is then taken to the website, where the attacker injects a prompt, tricking the user to think they must download an extension before continuing to the website they are trying to navigate to. Below is an example of this type of prompt. The below image shows this behavior.
- The user clicks to install the browser extension and is then redirected to the website they were trying to navigate to.
Throughout our research, we have observed that, when provided a prompt like the one above, many users will, unfortunately, click the first button they see that will allow them to move past this prompt â and thus, they install unwanted or malicious browser extensions, often without realizing the potential risks.
Now that we understand common initial infection strategies, let's delve into a handful of malicious extensions we have discovered in our environment.
Evidence of Five Malicious Extensions
During our research into browser extensions with malicious manifest characteristics, we identified five malicious browser extensions. These extensions have the following characteristics:
- They immediately receive excessive permissions, such as searchProvider, tabs, webRequest, and webRequestBlocking, all of which include the ability to inspect and alter user search activity.
- After installation, the extension either changes the default search provider of the browser or the new tab page, which is often used for the same purpose.
- While it is already highly risky to have the above type of behavior in an unauthorized application, these extensions do not stop there. They include source code that further requests permissions from the user, such as management of other extensions, cross-site cookie management, and the ability to view browsing history.
- They were downloaded from the Chrome Web Store but are no longer available there.
- They communicate with domains that are either parked, expired, and/or have a reputation for browser-hijacking activity.
- Some rely on Javascript libraries that fingerprint the user and their browser.
- Some are written in a sophisticated, repeatable manner such that the attacker continues to post multiple versions and evade the Chrome and Edge extension store review processes (and even track the success of particular IDs).
Listed below is each extensionâs ID, name, description (verbatim from its manifest file), permissions it requests, and some of the initial reasons â or, indicators â our Threat Research team has deemed these extensions malicious.
Even though explaining browser permissions is outside the scope of this article, the above findings underline the importance of managing browser extensions â of reviewing them and their permissions. Why does a âPDF convertingâ extension need permission to change your browserâs search engine provider (permission: searchProvider) and to manage your other browser extensions (permission: management)? Short answer: It doesnât. Why should your IT security teams allow browser extensions that communicate with parked or expired domains, let alone domains that are notorious for browser hijacking activity? They shouldnât!
Though we have deemed these browser extensions as malicious, we also have evidence that suggests they are part of a campaign.
Ties to a Larger Malicious Extension Campaign
In addition to surface-level similarities to each other, these extensions appear to be related to a larger campaign of malicious extensions tied to the domain registrar named CommuniGal Communication Ltd.
The first pair of extensions (Your Docs To PDF; DoctoPDF) listed in the above table have the exact same description (including the incorrect capitalization of âAllowsâ) and both list the exact same three suspicious domains (apiprxy[.]com, pdfsrch[.]com, yourdocstopdf[.]com) in their manifest files. These two extensions have domains linked to a registrar, CommuniGal Communication Ltd., that has a reputation for registering domains for a slew of malicious browser extensions.
The next extension (QuickMail), upon first glance, doesnât appear to be related to any other extension listed. However, one of the domains it communicates with (srchbar[.]com) has also been reported as a malicious domain part of the CommuniGal registrarâs malicious extension campaigns.
The last pair of extensions listed (MyPDFMaker ads; YourPDFBuddy ads) are also related to each other: they have similarly structured names, have the same structure for their descriptions (âPromotions by <extension name> adsâ), and list the same suspicious domain (alltexts[.].com) in their manifest files. Â While we do not possess conclusive evidence linking these two browser extensions to the same malicious campaign as the other three, their shared behavior â a 'PDF'-related extension, with a poor reputation, displaying unauthorized advertisements and requesting excessive and intrusive permissions â raises significant red flags. In the realm of IT security, it's prudent to question the legitimacy of any extension explicitly advertising its purpose as serving ads/promotions; discerning users would be unlikely to knowingly incorporate such tools into their browsing experience.
The Massive Scale of Malicious Browser Extensions
We have discussed five malicious browser extensions identified in across our environments, but below are a couple more examples that highlight that the scale of this threat is far more expansive and pervasive.
Briefly touched upon in the previous section, a domain registrar, CommuniGal Communication Ltd., has been clearly linked to malicious browser extension campaigns, which appear to be easily repeatable because several versions of its extensions, with a similar malicious codebase, have been successfully published to the Chrome Web Store. In fact, Awake Security's report on CommuniGal's malicious browser extension campaign reports that, in 2020, 111 malicious browser extensions accounted for over 32 million downloads from the Chrome Web Store aloneâ and mentions that there were many more downloads of malicious extensions through means that bypassed the browsers' web store. Some of these malicious extensions identified in articles by Innovate Cybersecurity and Awake Security still remain on the web store, ready to be downloaded and installed at the click of a button.
In addition to this domain registrar's malicious behavior, a cybersecurity researcher, Wladimir Palant, recently published two research articles describing not just the malicious behaviors of many seemingly-benign extensions but highlighting just how pervasive these threats are:
- Over 2 million downloads from the Chrome Web Store for "PDF Toolbox", an extension disguised as a legitimate extension API wrapper but with additional, non-advertised capabilities, according to Palant's article.
- 19 other malicious Chrome extensions, each with over 2 million active users at the time Palant's article was written (That's a combined 38+ million infections with merely 19 extensions! And more extensions were listed in the article.)
Though this article mentions only a subset of malicious browser extensions, there are plenty more malicious extensions available in browsers' web stores and elsewhere online â and you can expect new ones to keep coming.
Best Practice: Frequently Review Browser Extensions
Browser extensions are often left unscrutinized by IT and security teams. Ensuring users have benign and secure browser extensions is a function traditionally left for the browsers to manage; however, we have illustrated that, in our environment and in the broader browsing base, malicious extensions continue to bypass browsers' web store checks and can remain installed on users' browsers even after they had been removed from the browser web store. We should no longer allow browsers to be the first and last line of defense for keeping users safe from malicious browser extensions.
To provide a more robust and holistic cybersecurity posture, we recommend that IT and security teams proactively manage extensions in their organization. To search for potentially malicious browser extensions, we recommend performing a periodic review of extensions installed in your organization and investigating any that have malicious indicators, such as:
- Manifest File Characteristics:
- Its update URL is not from the browserâs web store
- It's no longer available on the browserâs web store
- It's requesting more permissions than it likely needs
- Its homepage URL is no longer valid (if its homepage URL is not the browserâs web store)
- Its description is vague or filled with grammatical errors
- Behavior:
- It communicates with sites/domains of poor reputationÂ
- It hijacks the browser (e.g., redirects traffic)
- It serves intrusive or unwanted ads
- It has any other unexpected and/or intrusive behaviors
- Updates:
- It obtains its updates from a location other than the browserâs web store. (Malicious extensions could have their update URL as a site thatâs not the browserâs app store; this allows the extension to update its code with code that hasnât been approved by the browserâs app store.)
- Poor/Non-Existent Reputation:
- It has poor or non-existent user reviews
- The extensionâs author has a poor or non-existent reputation
- How It Was Installed:
- Its install type is âadminâ (which means it was force-installed) but wasnât installed by your companyâs IT or Security team
- It was installed because the user was prompted to by a popup/notification
- It was installed without the user knowing about it
Conclusion
Browser extensions pose a significant and ongoing threat to cybersecurity. Through subtle and effective social engineering techniques, attackers have been infecting browsers. And, because attackers know that browser extensions are still often overlooked by IT and security teams, expect more malicious extensions to continue to appear in the browser extension landscape. We encourage IT and security teams to employ a browser extension management strategy, which should include a periodic review of installed extensions, to keep this threat at bay in your organization.
Authors:
Lead Threat Researcher
Erin Kuffel on LinkedIn
Erin Kuffel
Ryan Boerner on LinkedIn
Ryan Boerner
Appendix: IOCs
Extensions
Domains
- apiprxy[.]com
- goquickmails[.]com
- mypdfmaker[.]com
- pdfsrch[.]com
- srchbar[.]com
- yourdocstopdf[.]com
- yourpdfbuddy[.]com