One example of such a practice is the appearance and re-appearance of low-quality imitator apps that try to look as close to the original as possible in order to capitalize on the original’s popularity and get more downloads. In a blog post by AdGuard, where they describe the issue in more detail, the ad-blocking provider also addresses some other bad practices, commonly encountered on the Google Web Store. Soon after the report and a tweet from AdGuard addressing the issue, some of the apps started to get removed from the Web Store. Up until earlier today, all of the reported extensions were still available on the Chrome Web Store. However, some of the other extensions are weather forecast browser widgets and fake ad-blocker add-ons.Īccording to AdGuard’s report, all of the apps that make up the detected browser-hijacking cluster use the from where they load their malicious ad-injecting code. For the most part, the detected apps are simple and have the function of adding a custom background to Chrome’s new-tab page. During this investigation, AdGuard happened upon a large cluster of different types of malicious Chrome extensions that were primarily used to put ads inside users’ search results on Google and Bing. ![]() Initially, AdGuard was investigating some fake ad-blockers that, instead of doing their job of keeping ads away from users’ browsers, were themselves used for advertising purposes. ![]() Recently, AdGuard, a company that provides ad-blocking solutions, has reported that a big number of Google Chrome extensions have been detected to hijack the Google and Bing search engines and to inject ads into them.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |