A Brief Guide to Help You Avoid Malicious Browser Extensions

A Brief Guide to Help You Avoid Malicious Browser Extensions

There are dozens of Internet browsers on the market. They are typically all free and when they come stock, are pretty much all the same. Most of the most popular ones come with an app store where users can download useful apps to make their experience better. Unfortunately, there are times that malicious code gets in there. Security firm Avast recently found 28 third-party extensions that are extraordinarily popular that had malicious code found in them.

How Do Browser Extension Threats Work?

These attacks work in much the same fashion as a phishing attack or spoof would. The user is promised something but winds up infected. The software that is downloaded might perform the task as advertised, but it may also redirect users to a malicious ad or website, or simply siphon data from the browser.

In the extensions found to have malignant code, Avast found code that was:

  • Redirecting traffic to advertisements (falsely generating revenue)
  • Redirecting traffic to phishing websites
  • Collecting personal data
  • Collecting browsing history
  • Downloading additional malware onto a user’s device

The company’s researchers believe that the first code was the one actively used. It generated fraudulent revenue for the creators of these extensions. If they haven’t been removed already, they should be removed immediately by your IT admin to avoid data theft.

Here is a complete list:


  • App Phone for Instagram
  • Direct Message for Instagram
  • DM for Instagram
  • Downloader for Instagram
  • Invisible mode for Instagram Direct Message
  • Odnoklassniki UnBlock. Works quickly.
  • Spotify Music Downloader
  • Stories for Instagram
  • The New York Times News
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Vimeo™ Video Downloader
  • VK UnBlock. Works fast.
  • Zoomer for Instagram and FaceBook


  • DM for Instagram
  • Downloader for Instagram
  • Instagram App with Direct Message DM
  • Instagram Download Video & Image
  • Pretty Kitty, The Cat Pet
  • SoundCloud Music Downloader
  • Stories for Instagram
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Video Downloader for YouTube
  • Vimeo™ Video Downloader
  • Volume Controller

Check your company’s network to see if any of these are being actively utilized and block them immediately.

If you need help to keep control over your IT, call the IT professionals at BNMC today at 978-482-2020. Our experts can help you maintain and manage your software to ensure that you won’t have to deal with malicious software in the future.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Microsoft Network Security Software Hackers Efficiency Business Data Workplace Tips Hosted Solutions Hardware Computer Google Malware Communication IT Services IT Support Small Business Mobile Devices Smartphone Internet Mobile Device Android Cloud Computing Tech Term Data Recovery Phishing Ransomware Managed IT Services Backup Smartphones Innovation Users Outsourced IT Windows VoIP Saving Money Miscellaneous Upgrade Cybersecurity Network Information Microsoft Office Social Media Data Backup Disaster Recovery communications Passwords Quick Tips Facebook Browser Windows 10 Business Continuity Server Office 365 Business Management Productivity Internet of Things Managed Service Managed IT Services Data Management Apps Windows 10 COVID-19 App Collaboration Vulnerability Word Remote Monitoring Analytics Save Money Gmail Artificial Intelligence Gadgets Remote Work Mobile Office Encryption Conferencing Chrome Managed Service Provider Money Remote Workers Infrastructure WiFi Government Router BYOD Google Drive Website Display Company Culture Networking VPN Access Control Employer-Employee Relationship Paperless Office Settings Virtual Reality IT Support Spam Applications Tip of the week Information Technology Holiday Antivirus Risk Management Bandwidth Maintenance Content Filtering Firewall Office Tips Document Management Education Apple Storage Wireless IT Management Data Security Big Data Robot Business Technology Automation Virtual Private Network Development Employee-Employer Relationship Hacker Data storage End of Support HIPAA BDR Unified Threat Management Operating System YouTube Wi-Fi Computers Avoiding Downtime Administration Compliance Business Intelligence Customer Relationship Management Scam Best Practice Retail Alert Mouse Vendor Break Fix Search Regulations Going Green Laptop Augmented Reality Monitors iOS Solid State Drive The Internet of Things MSP Vendor Management Printing Managing Stress Identity Theft Chromebook Password Training Server Management IT Hard Disk Drive Cybercrime Touchscreen Downtime Social Network Managed Services Managed IT Marketing How To Tablet Remote Computing Computing OneNote Outlook Data Breach Data loss Mobile Security Bring Your Own Device SaaS Social Windows 7 LiFi Two-factor Authentication Telephone Systems Virtualization Software as a Service Managed IT Service desktop Hosted Solution Humor Print Toner Myths Specifications Meetings Disaster Current Events Slack Hard Disk Drives Digital Scary Stories Hotspot Internet Exlporer Dark Data Update FBI IT Technicians Optimization Inventory Messaging Running Cable Connectivity Remote Content Huawei Heating/Cooling Multi-Factor Security Leominster Asset Management Entertainment Modem FinTech Politics Battery Digital Signage Data Warehouse Time Management Printer Buisness Staff Cryptocurrency Shortcuts Mobile Management Black Friday Uninterrupted Power Supply Virtual Desktop IT solutions Work/Life Balance Peripheral Monitoring Solid State Drives Spyware Sports Language Value Google Docs Customer Service K-12 Education Mirgation Hacks Recycling Office Samsung Shadow IT Employee-Employer Relationships Emergency Computer Care IBM IoT Health Private Cloud user treats Streaming Processor Servers Google Calendar File Sharing Bitcoin K-12 Schools Memes Hybrid Cloud Dark Web Cookies Google Wallet Tech Support Files Troubleshooting Business Analysis Network Management Security Cameras Profiles Cyber Monday Social Networking Management Spying National Security Computing Infrastructure Business Growth Professional Services Instant Messaging Chatbots eWaste Social Engineering Gamification Analysis Students Corporate Profile Star Wars Legal Shopping Human Error Memory Legislation Wearable Technology Windows 8 Network upgrade Twitter Scalability Microsoft Excel G Suite Unified Communications Nanotechnology Drones Websites RMM Virus SharePoint Automobile Utility Computing Smart Technology Dell Motherboard Cables Policy Updates Techology Alerts USB Cabling Identity Mobile Device Management Continuity Safety Mixed Reality Lenovo WannaCry Fraud Deep Learning Cost Management Employees Device Reducing Cost Statistics Smart Office Holidays Migration Consulting Mail Merge Blockchain Screen Reader Charging Banking LED Threats Downloads Google Maps Distribution Laptops Shortcut Distributed Denial of Service Wires Procedure PowerPoint VoIP Unified Threat Management Licensing Alt Codes Dongle Network Congestion Bluetooth Comparison Solar Firefox Superfish Halloween Assessment Gig Economy Mobility Batteries Work Writing Payment Card Address Permissions Smart Tech Budget Reviews Co-Managed IT Logistics Managed Services Provider Patch Management Voice over Internet Protocol PCI DSS Onboarding GDPR User Error Digital Payment Cooperation Typing Service Level Agreement Tracking Cleaning Computer Repair Relocation CCTV Mobile Data Webcam How To Recovery Black Market Error Point of Sale Ben McDonald shares Law Enforcement Notifications Electronic Medical Records Travel Physical Security Printers Upgrades Gadget Supercomputer CrashOverride Emoji Motion Sickness Crowdsourcing Staffing Taxes Personal Information Botnet Administrator Cortana Web Server what was your? 3D Printing IT Budget Mobile Computing GPS Processors IT Consultant Regulation Machine Learning Financial Cameras Unsupported Software

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3