How do the Chrome Store's malicious ad blockers show the duplicity that end users face in cybersecurity?
The tech press widely reported that over 20 million users had installed some form of one of these fake ad blockers before Google decided to yank them from the inventory. ZDNet provided a breakdown where one product, AdRemover for Google Chrome, was utilized by over 10 million users, with another variety, uBlock Plus, garnering 8 million users and a fake AdBlock Pro getting more than 2 million users.
After cybersecurity experts discovered malicious features in the cloned ad blockers, Google decided to remove many of the worst offenders. But people are still talking about how lackluster vetting can produce additional dangers for customers.
At issue is the Google Chrome extension – a type of small software program that users can add to Google Chrome to enhance how the browser works. Extensions are distributed through the Chrome developer dashboard and they are published to the Chrome Web store – but some are saying that without more involved screening for these third-party products, more end users could see their systems jeopardized.
Part of the deceptive nature of these new types of hacking is that hackers prey on the idea that users have to safeguard their systems. An ad blocker or anti-malware program seems like it's intended to enhance security, not detract from it. The issue lies in what happens behind the scenes, and how hackers clone, imitate and hijack legitimate systems, names and techniques to befuddle their targets.
It's a little like another major hack making its way around the consumer community now. Many PC users have heard a warning voice suddenly screech out of their laptop or desktop computer talking about how they could harm files or destroy systems if they don't do certain immediate tasks. The irony is that this message is intended as a phishing attempt and does not constitute a legitimate cybersecurity alert.
With all of this sophisticated hacking in the mix, end users will have to get more educated on how to maintain their systems. The arms race between hackers and security professionals is only going to heat up as new artificial intelligence and machine learning technologies make their way to the scene. Problems like those recently highlighted with the Google Chrome store reveal how important it is to have universal and consistent safeguards for a community of users.
More Q&As from our experts
- How can my business establish a successful BYOD policy?
- What is the difference between little endian and big endian?
- How can unstructured data benefit your business's bottom line?
- Google Chrome
- Ad Blocker
- Web Browser
- Armored Virus
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
- The Business' Guide to Building Responsible AI
- The CIO Guide to Information Security
- Robotic Process Automation: What You Need to Know
- Data Governance Is Everyone's Business
- Key Applications for AI in the Supply Chain
- Service Mesh for Mere Mortals - Free 100+ page eBook
- Do You Need a Head of Remote?