Google removes more than 70 malicious Add-Ons from the Chrome Web Store

Google has just announced that it has removed more than 70 extensions on the Chrome Web Store (Chrome Web Store).

Add-Ons, Extensions (also known as extensions) are applications that users install on the browser to support that browser. However, sometimes hackers also take advantage of these Add-Ons themselves to spread malware as well as perform malicious acts targeting internet users.

After receiving a series of detailed reports of malicious activities related to some Chrome extensions containing malicious code, Google has just announced that it has deleted more than 70 extensions on the Chrome Store Online (Chrome Web Store). These are all Add-Ons that are supposed to contain malicious code or stealthily perform malicious activities (according to the discovery of international security company Awake Security), with a total of 32 million downloads and installs by Google users all over the world.

Google removes more than 70 malicious Add-Ons from the Chrome Web Store Picture 1Google removes more than 70 malicious Add-Ons from the Chrome Web Store Picture 1 Chrome Web Store

This fact partly shows the failure of technology in general and security in particular to protect users on browser platforms, which are increasingly used for sensitive work related to email, payroll, finance, and more.

Talking about the incident, Scott Westover, a spokesman for Google, said:

'After receiving a warning that some of the Chrome Web Store extensions violated the platform's privacy policy, we immediately took action at the highest level. Also learn from this incident to improve security tools and automated censorship on the platform. "

Most extensions are intended to alert users about malicious activity on websites or the behavior of converting files from one format to another. In fact, they are used to illegally access browser history and collect logins stored on the platform. Having 70 extensions removed at the same time shows the seriousness of Google, and this has become the largest malicious add-on purge campaign ever on the Chrome Web Store. However, it is still not clear what the agent behind the above malware distribution is.

Here is the list of ID and the name of the malicious add-on that has been removed:

  1. acmnokigkgihogfbeooklgemindnbine
  2. apgohnlmnmkblgfplgnlmkjcpocgfomp
  3. apjnadhmhgdobcdanndaphcpmnjbnfng (ViewPDF)
  4. bahkljhhdeciiaodlkppoonappfnheoi (Search Manager)
  5. bannaglhmenocdjcmlkhkcciioaepfpj (PDF Opener)
  6. bgffinjklipdhacmidehoncomokcmjmh (easyconvert)
  7. bifdhahddjbdbjmiekcnmeiffabcfjgh
  8. bjpknhldlbknoidifkjnnkpginjgkgnm (doctopdf)
  9. blngdeeenccpfjbkolalandfmiinhkak (ByteFence Secure Browsing)
  10. ccdfhjebekpopcelcfkpgagbehppkadi (ByteFence Secure Browsing)
  11. cceejgojinihpakmciijfdgafhpchigo (theeasywaypro)
  12. cebjhmljaodmgmcaecenghhikkjdfabo
  13. chbpnonhcgdbcpicacolalkgjlcjkbbd (TheSecuredWeb)
  14. cifafogcmckphmnbeipgkpfbjphmajbc
  15. clopbiaijcfolfmjebjinippgmdkkppj (mydocstopdf)
  16. cpgoblgcfemdmaolmfhpoifikehgbjbf
  17. dcmjopnlojhkngkmagminjbiahokmfig
  18. deiiiklocnibjflinkfmefpofgcfhdga
  19. dipecofobdcjnpffbkmfkdbfmjfjfgmn
  20. dopkmmcoegcjggfanajnindneifffpck
  21. dopmojabcdlfbnppmjeaajclohofnbol
  22. edcepmkpdojmciieeijebkodahjfliif
  23. ekbecnhekcpbfgdchfjcfmnocdfpcanj
  24. elflophcopcglipligoibfejllmndhmp
  25. eogfeijdemimhpfhlpjoifeckijeejkc
  26. fcobokliblbalmjmahdebcdalglnieii
  27. fgafnjobnempajahhgebbbpkpegcdlbf
  28. fgcomdacecoimaejookmlcfogngmfmli
  29. fgmeppijnhhafacemgoocgelcflipnfd
  30. fhanjgcjamaagccdkanegeefdpdkeban
  31. flfkimeelfnpapcgmobfgfifhackkend
  32. fmahbaepkpdimfcjpopjklankbbhdobk
  33. foebfmkeamadbhjcdglihfijdaohomlm
  34. fpngnlpmkfkhodklbljnncdcmkiopide
  35. gdifegeihkihjbkkgdijkcpkjekoicbl
  36. gfcmbgjehfhemioddkpcipehdfnjmief
  37. gfdefkjpjdbiiclhimebabkmclmiiegk
  38. ggijmaajgdkdijomfipnpdfijcnodpip
  39. ghgjhnkjohlnmngbniijbkidigifekaa
  40. gllihgnfnbpdmnppfjdlkciijkddfohn
  41. gmmohhcojdhgbjjahhpkfhbapgcfgfne
  42. gofhadkfcffpjdbonbladicjdbkpickk
  43. hapicipmkalhnklammmfdblkngahelln
  44. hijipblimhboccjcnnjnjelcdmceeafa
  45. hmamdkecijcegebmhndhcihjjkndbjgk
  46. hodfejbmfdhcgolcglcojkpfdjjdepji
  47. hpfijbjnmddglpmogpaeofdbehkpball
  48. ianfonfnhjeidghdegbkbbjgliiciiic
  49. ibfjiddieiljjjccjemgnoopkpmpniej
  50. inhdgbalcopmbpjfincjponejamhaeop
  51. iondldgmpaoekbgabgconiajpbkebkin
  52. ipagcbjbgailmjeaojmpiddflpbgjngl
  53. jagbooldjnemiedoagckjomjegkopfno
  54. jdheollkkpfglhohnpgkonecdealeebn
  55. jfefcmidfkpncdkjkkghhmjkafanhiam
  56. jfgkpeobcmjlocjpfgocelimhppdmigj
  57. jghiljaagglmcdeopnjkfhcikjnddhhc
  58. jgjakaebbliafihodjhpkpankimhckdf
  59. jiiinmeiedloeiabcgkdcbbpfelmbaff
  60. jkdngiblfdmfjhiahibnnhcjncehcgab
  61. jkofpdjclecgjcfomkaajhhmmhnninia
  62. kbdbmddhlgckaggdapibpihadohhelao
  63. keceijnpfmmlnebgnkhojinbkopolaom
  64. khhemdcdllgomlbleegjdpbeflgbomcj
  65. kjdcopljcgiekkmjhinmcpioncofoclg
  66. kjgaljeofmfgjfipajjeeflbknekghma
  67. labpefoeghdmpbfijhnnejdmnjccgplc
  68. lameokaalbmnhgapanlloeichlbjloak
  69. lbeekfefglldjjenkaekhnogoplpmfin
  70. lbhddhdfbcdcfbbbmimncbakkjobaedh
  71. ldoiiiffclpggehajofeffljablcodif
  72. lhjdepbplpkgmghgiphdjpnagpmhijbg
  73. ljddilebjpmmomoppeemckhpilhmoaok
  74. ljnfpiodfojmjfbiechgkbkhikfbknjc
  75. lnedcnepmplnjmfdiclhbfhneconamoj
  76. lnlkgfpceclfhomgocnnenmadlhanghf
  77. loigeafmbglngofpkkddgobapkkcaena
  78. lpajppfbbiafpmbeompbinpigbemekcg
  79. majekhlfhmeeplofdolkddbecmgjgplm
  80. mapafdeimlgplbahigmhneiibemhgcnc
  81. mcfeaailfhmpdphgnheboncfiikfkenn
  82. mgkjakldpclhkfadefnoncnjkiaffpkp
  83. mhinpnedhapjlbgnhcifjdkklbeefbpa
  84. mihiainclhehjnklijgpokdpldjmjdap
  85. mmkakbkmcnchdopphcbphjioggaanmim
  86. mopkkgobjofbkkgemcidkndbglkcfhjj
  87. mpifmhgignilkmeckejgamolchmgfdom
  88. nabmpeienmkmicpjckkgihobgleppbkc
  89. nahhmpbckpgdidfnmfkfgiflpjijilce
  90. ncepfbpjhkahgdemgmjmcgbgnfdinnhk
  91. npaklgbiblcbpokaiddpmmbknncnbljb
  92. npdfkclmbnoklkdebjfodpendkepbjek
  93. nplenkhhmalidgamfdejkblbaihndkcm
  94. oalfdomffplbcimjikgaklfamodahpmi
  95. odnakbaioopckimfnkllgijmkikhfhhf
  96. oklejhdbgggnfaggiidiaokelehcfjdp
  97. omgeapkgiddakeoklcapboapbamdgmhp
  98. oonbcpdabjcggcklopgbdagbfnkhbgbe
  99. opahibnipmkjincplepgjiiinbfmppmh
  100. pamchlfnkebmjbfbknoclehcpfclbhpl
  101. pcfapghfanllmbdfiipeiihpkojekckk
  102. pchfjdkempbhcjdifpfphmgdmnmadgce (EasyConvert)
  103. pdpcpceofkopegffcdnffeenbfdldock
  104. pgahbiaijngfmbbijfgmchcnkipajgha
  105. pidohlmjfgjbafgfleommlolmbjdcpal
  106. pilplloabdedfmialnfchjomjmpjcoej
  107. pklmnoldkkoholegljdkibjjhmegpjep
  108. pknkncdfjlncijifekldbjmeaiakdbof
  109. plmgefkiicjfchonlmnbabfebpnpckkk
  110. pnciakodcdnehobpfcjcnnlcpmjlpkac
  111. ponodoigcmkglddlljanchegmkgkhmgb

You can view the detailed report here if needed:

https://awakesecurity.com/wp-content/uploads/2020/06/GalComm-Malicious-Chrome-Extensions-in-store-extensions.txt
4.1 ★ | 59 Vote