×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

GS-III :
  • 21 June, 2020

  • 10 Min Read

Has Google failed to protect its Chrome browser?

Has Google failed to protect its Chrome browser?

Context

  • A few days ago, Reuters reported a “newly discovered spyware effort” targetting users of Google’s browser Chrome.
  • The spyware, it said, has been pushed through at least 111 malicious or fake Chrome browser extensions, which have been downloaded some 32 million times.

(Browser extensions are add-ons that provide additional capabilities to the user.)

  • The report also said Google had taken off more than 70 extensions from its official Web Store last month after being alerted to their malicious nature by researchers at Awake Security.

How do these malicious extensions get in to the Chrome store in the first place?

Short answer: they seem harmless, to being with.

  • According to the report by Awake Security, which brought this issue to light, these “sleeper agent extensionsappear to do nothing in the beginning.
  • The “malicious payloads” are only pushed on to the extensions much after the “clean” versions have been approved.

What do the malicious extensions do?

  • They can take “screenshots, read the clipboard, harvest credential tokens stored in cookies or parameters, grab user keystrokes (like passwords),” says the report.

How has Google reacted to this?

  • As mentioned above, Google has recently removed the malicious extensions.

It has been mentioned that some of the fake extensions were never in the Chrome Web Store. How were they made to work then?

  • This is due to the misuse of an open-source browser project, Chromium — installing it can lead to malicious add-ons.
  • This works as a rogue browser when users unwittingly give it the okay to run when prompted.

Are browser extensions a vulnerability?

  • A significant part of what we do on the computer these days is via the browser.
  • Also, the research report points out that it has been a challenge for security solutions to spot malicious activity that is happening within the browser.
  • The Awake Security report says, “Rogue access to the browser therefore frequently means rogue access to the ‘keys to the kingdom’ — from email and corporate file sharing to customer relationship management and financial databases.”

How are users fooled?

  • Watch out for prompts that urge you to make a new browser as default.
  • The security firm has also documented some standard characteristics of malicious campaigns. For starters, some of these malicious players have professional-looking web sites that peddle false promises. An example recorded is that of a security extension that certifies a page with malicious content as secure.

Identifiers of a malicious web extensions

  • Security experts can visually figure out if an extension is malicious or fake, says the Awake Security report, listing out the following easy identifiers:
  • These extensions, for an unknown brand and little information, have a huge following; the user reviews are always great; these extensions have a huge following despite being relatively new in the market.

What other vulnerability has this finding revealed?

  • The Awake Security report ends with a question mark on the conduct and practices of a small Israel-based domain registrar called Galcomm, formally known as CommuniGal Communication Ltd according to Reuters.
  • Its report says 60% of its domains are high risk for organisations.
  • These malicious domains have managed to evade categorisation as unsafe because their actions depend on where the client is connecting to it from.
  • They act maliciously only if the client connects from a broadband or cable network.
  • They act benignly if the request comes from a data centre or virtual private network.
  • It says, “This registrar, who also maintains a Registrar Accreditation Agreement with ICANN (The Internet Corporation for Assigned Names and Numbers), is responsible for putting far more malicious domains, malware, and exploitative content on the internet than legitimate content.
  • We believe the research and analysis summarized in this report proves that Galcomm is at best complicit in malicious activity.”
  • The bigger issue raised by the report is one of lack of oversight by ICANN, which oversees domain name standards.

Domain Registrar

  • A domain name registrar is a business that handles the reservation of domain names as well as the assignment of IP addresses for those domain names.
  • Domain names are alphanumeric aliases used to access websites; for example Google's domain name is 'google.com' and their IP address is 192.168. 1.1.

What has been Galcomm’s response?

  • Reuters reported that Galcomm owner Moshe Fogel has denied any wrong-doing.

Source: TH


Formation Day

On 1st November, eight Indian states—Andhra Pradesh, Chhattisgarh, Haryana, Karnataka, Kerala, Madhya Pradesh, Punjab, and Tamil Nadu—along with five Union Territories—Andaman and Nicobar Islands, Chandigarh, Delhi, Lakshadweep, and Puducherry—celebrate their Formation Day. This date marks an important milestone in India

Turtle (Kachhua) Wildlife Sanctuary

The Turtle Wildlife Sanctuary, also known as the Kachhua Sanctuary, is located in the Varanasi district of Uttar Pradesh. It is recognised as India’s first freshwater turtle wildlife sanctuary, established to conserve endangered turtle species and support the ecological health of the Ganga River. Location and Extent The sanctuary co

Introduction of AI and Computational Thinking (CT) in

The Ministry of Education plans to introduce Artificial Intelligence (AI) and Computational Thinking (CT) from Class 3 onwards in the 2026–27 academic year. This initiative is part of the National Curriculum Framework for School Education (NCF-SE) 2023 and aligns with the National Education Policy (NEP) 2020. The aim is to prepare student

Sal Tree

Scientists from the Environment Department of Himachal Pradesh University (HPU) in Shimla have recently revealed that the Sal tree (Shorea robusta) is the most effective natural air purifier for combating rising pollution levels. Their findings highlight the tree’s superior capacity to trap dust, absorb gases, and cleanse the air compared

US Resumes Nuclear Weapon Testing

The President of the United States has ordered the resumption of nuclear weapon testing after a gap of 33 years, the last test being in 1992. This decision marks a significant shift in global nuclear policy and has far-reaching implications for geopolitics, the environment, and international security. Status of Global Nuclear Weapon Testing

DNA

03 Dec,2025

Toppers

Search By Date

Newsletter Subscription
SMS Alerts

Important Links

UPSC GS Mains Crash Course - RAW Prelims Answer Key 2024