A Security Researcher Discovers 22 Crypto-Stealing Google Chrome Extensions.

A Security Researcher Discovers 22 Crypto-Stealing Google Chrome Extensions.
Share this:

A security researcher discovered another 22 Google Chrome web browser extensions trying to steal users’ cryptocurrencies.

A security researcher has found out another 22 Google Chrome web browser extensions designed to steal users’ cryptocurrencies.

According to a cybersecurity news blog—Naked Security, security researcher by name Harry Denley specializing in cryptocurrencies, has discovered 22 more malicious Google Chrome extensions.

The malicious Google Chrome extension that was discovered had reportedly impersonated well-known crypto firms like Ledger, KeepKey, MetaMask, and Jaxx. 

The malicious Google Chrome extensions trick trick users into giving away their cryptocurrency wallet credentials needed to access their wallets.

As at the time of this report, most of the phishing extensions have already been taken down. From the Naked Security news report, most of these extensions were taken down within 24 hours after Denley reported. 

Read Also: Nigeria Should be Prepared to Fight New Styles of Cyber Attacks in 2020 Says CSEAN After Nigeria had 167 Cyber Criminals Out of the 281 Global Cyber Criminals Arrested in 2019.

Google Chrome extensions are often used for phishing

Google Chrome’s extensions is commonly used by cybercriminals looking to steal cryptocurrencies. In April, Google managers changed the rules governing the publication of Chrome extensions in a way to make it difficult for scammers to spread malicious code.

Some reports suggests that the advertisement platform of Google called Google Ads, is a tool used by cybercriminals to attract victims to the phishing clone of a cryptocurrency exchange. 

Ripple Labs had filed a lawsuit against YouTube, the video streaming platform owned by Google, seeking damages after crypto scammers mimicked them on the YouTube.


Discover more from DiutoCoinNews

Subscribe to get the latest posts sent to your email.

Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    Your email address will not be published. Required fields are marked *