Feeds

Google pulls Chrome extensions after new owners subvert web tools

This could get a lot worse before it gets better

Protecting against web application threats using SSL

Google has pulled at least two Chrome extensions from its online store after spammers and malware merchants bought established software from developers and updated it to suit their own nefarious purposes.

The whistle was blown by developer Amit Agarwal, who spent a lazy hour or so coding a Chrome extension for the popular RSS reader Feedly; his handiwork soon garnered over 30,000 users. In a blog post, Agarwal recounted how he received "a four-figure" offer for the rights to the code, and considering that a good return for such little work, he accepted the offer and signed over the rights.

"A month later, the new owners of the Feedly extension pushed an update to the Chrome store," he wrote. "No, the update didn't bring any new features to the table nor contained any bug fixes. Instead, they incorporated advertising into the extension," he explained.

"These aren't regular banner ads that you see on web pages, these are invisible ads that work the background and replace links on every website that you visit into affiliate links. In simple English, if the extension is activated in Chrome, it will inject adware into all web pages."

Agarwal said that while there is an opt-out function on the extension, it's not set as the default and he advised users to switch to other options.

Another extension, Tweet This Page, is also on hiatus after following a similar route, and the development team behind yet another popular extension, Honey, has said that it was offered substantial sums to subvert their code.

In a Reddit conversation, the Honey team said it had received one offer worth "six figures a month" to feed data on its 700,000 users to a data-mining firm. Another offered a cash deal to replace Google ads on the extension with similar looking faux ads from the Chocolate Factory which could contain whatever the hirer wanted.

"I've spoken to a few on the phone and they sound just like normal people proposing a business deal," said the Honey team leader.

. "I'm sure they've justified what they do in their own mind so they don't sound shifty or unsure at all. Mental gymnastics is an amazing thing."

Google has declined to comment on the matter directly, but the firm tightened up the terms and conditions of its extensions policy in December to try and crack down on code that includes nasty little surprises. It also warned about code subversion in October, and has been steadily locking down its distribution channel for extensions.

People close to the matter said that this problem isn't going to go away soon, however, and expressed fears that we might be on the cusp of a new malware vector similar to that seen with the boom in spyware apps 20 years ago.

The solution is to check applications automatically or by hand to see if there are any unpleasant additions to seemingly innocuous apps, but that's a massive task, say sources. End users are going to be the first responders if something does happen, but it seems Google is planning a major investment in systems to clean up any infection points as soon as they occur.

The company could, of course, take the Apple route and lock down its software distribution to a single store where all apps are tightly checked before release. But this goes very much against Google's open-code ethos, and is rather expensive and restrictive to boot.

In the meantime it's a case of buyer beware and keeping vigilant. Developers might also want to consider any offers for their code if they are to avoid besmirching their long-term reputations for short-term profit. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.