• Tech - News - Blockchain Technology
  • Updated: May 14, 2023

Crypto Theft: Checking Your Browser Extensions

Crypto Theft: Checking Your Browser Extensions

Chrome Extension Involved in Crypto Stealing PHOTO CREDIT: BLEEPING COMPUTER

Browser extensions, a piece of software that users can install to customize the functionality of a web browser, can pose serious threats to privacy and security as well as be useful.

Browser extensions can be used to steal cryptocurrency in a variety of ways.

Malicious extensions can be used to inject malicious code into web pages, allowing attackers to steal private keys, passwords, and other sensitive information.

Attackers can also use extensions to redirect users to malicious websites, where they can be tricked into entering their credentials or downloading malicious software. 

Experts observed a 2-fold increase in the number of malicious browser extensions designed to steal cryptocurrencies, specifically by web injections.

With an increasing number of people starting to rely on cryptocurrencies for online transactions, cybercriminals are adapting their tactics accordingly.

Thus, browser extensions are becoming an attractive target for hackers looking to take advantage of unsuspecting crypto users.

It can be difficult to detect this with anti-virus software.

Malicious extensions can change what the user sees in their browser, as opposed to what is actually sent by the server.

For example, these extensions can add or remove text, tags, text fields, and other website elements.

Malicious extensions can track member ID numbers, engage in phishing activities, and steal credentials, as well as steal cryptocurrencies.

In order to protect yourself, do not install too many extensions.

Not only do they affect computer performance, but they are also a potential attack vector, so minimize their number as the most beneficial ones.

Download extensions only from official Internet stores.

There they come under at least some scrutiny as security experts filter out the malicious ones from top to bottom.

Pay attention to the permissions required by the extensions.

If an extension already installed on your computer is asking for new permission, it is a danger sign; something is probably going on.

This extension may have been compromised or sold.

And before installing any extension, it is always a good idea to review the permissions it requires and consider whether they match the functionality of the app.

If you can't find a logical explanation for the permissions, then it's probably better not to install that extension.

Related Topics

Join our Telegram platform to get news update Join Now

0 Comment(s)

See this post in...


We have selected third parties to use cookies for technical purposes as specified in the Cookie Policy. Use the “Accept All” button to consent or “Customize” button to set your cookie tracking settings