These Browser Extensions Spy on 8 Million Users

نویسنده

  • Michael Weissbacher
چکیده

This work investigates the upalytics.com library for Chrome and Firefox extensions, which performs real time tracking of users on all sites they visit. The code is bundled with free extensions in the official extension stores, exfiltrating browsing history as a feature. Within the top 7,000 Chrome extensions, the library is used 42 times with over 8 million installations, the most widely used one has 1.48M installations alone. For Mozilla Firefox we found 400,000 users to be affected. We also look into the relationship of upalytics with similarweb.com, a third-party web analytics company, which is using that library for their own extension. We reported the suspicious Chrome extensions in March 2016 and they were deleted from the Google Chrome Web Store within 24 hours. Mozilla deleted three out of five reported extensions. In August 2016 we reviewed the Chrome Web Store and found no evidence of this library in the top 7,000 extensions. While this work focuses on one privacy perpetrator, tracking in browser extensions presents a wider research problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hulk: Eliciting Malicious Behavior in Browser Extensions

We present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension’s expectations in web page structure and content. Second, Hulk employs a fuzzer to drive t...

متن کامل

Spy Watch: A Tool for Transparency in Web Tracking

This is in part a position paper and in part a description of a Google Chrome privacy extension we built. We make the case that our first goal when tackling the issue of privacy and third party tracking of user’s browsing should be to increase transparency. We describe a browser extension we have built, that enables users to see which third party has observed what about them. We discuss the res...

متن کامل

Effective detection of vulnerable and malicious browser extensions

Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and ...

متن کامل

Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser

Browser extensions enhance the user experience in a variety of ways. However, to support these expanded services, extensions are provided with elevated privileges that have made them an attractive vector for attackers seeking to exploit Internet services. Such attacks are particularly vexing for the sites being abused because there is no standard mechanism for identifying which extensions are r...

متن کامل

Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions

Users have come to rely on browser extensions to realize features that are not implemented by browser vendors. Extensions offer users the ability to, among others, block ads, de-clutter websites, enrich pages with third-party content, and take screenshots. At the same time, because of their privileged position inside a user’s browser, extensions have access to content and functionality that is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016