Browser Extensions: It’s Time to Mitigate the Risks

browser extensions

Written by Jackie Bilodeau

I am the Communications Director for CGNET, having returned to CGNET in 2018 after a 10-year stint in the 1990's. I enjoy hiking, music, dance, photography, writing and travel. Read more about my work at CGNET here.

August 31, 2023

Let’s talk about extensions, the apps for your browser that enhance your experience. There are shopping extensions, like those from Rakuten and Capital One, that help you save you money. There’s the Grammarly extension that provides writing suggestions wherever you write online. There are extensions to increase productivity, enhance security and privacy, extensions for developers and bloggers and… well, you get the idea. There are hundreds of thousands of browser extensions available.  And most of us have installed at least one on our computers and/or mobile phones.

As it turns out, unfortunately, even having a single extension might present a risk to you – or your organization’s – confidential data. Because a recent security study revealed that more than half of a sampling of 300,000 installed extensions should be categorized as high-risk.

The study

Palo Alto-based SaaS security company Spin.AI released a risk report detailing their assessment of these 300K extensions in use within enterprise environments. Their particular focus was on Chromium-based browser extensions across multiple browsers, like Google Chrome and Microsoft Edge. Keep in mind that these extensions, often used with SaaS apps like Google Workspace and Microsoft 365, have permissions set to allow access to high levels of content. Now think of the risks this access presents, including those to data stored in browsers like Chrome and Edge, or SaaS data stored in platforms like Google Workspace and Microsoft 365.

The findings

The study revealed that 51% of all installed extensions they analyzed fell into the high-risk category. These had the potential to cause extensive damage to the organizations using them, including the ability to run malicious JavaScript and steal sensitive data. While more than half of the extensions they evaluated were productivity-related, the ones found to be most high-risk were those found in cloud software development environments.

An under-regulated marketplace

But where are these dangerous extensions coming from?  If we get them from the Chrome Web Store or Windows Admin Center, aren’t we safe? Unfortunately, no…or at least, not yet.

Here’s one example:

Back in March, a ChatGPT Chrome browser extension became available through the Chrome Web Store and was advertised on Facebook. It was subsequently installed by over 9,000 users.  Unfortunately, what had once been a legitimate open-source browser add-on had been weaponized into a Trojan horse. It proceeded to steal the Facebook login credentials of at least 6,000 corporate and 7,000 VPN accounts.

And unregulated ChatGPT extensions are popping up in the Chrome Web Store (and other places) like crazy. Spin.AI’s researchers discovered that while back in May there were only 11 ChatGPT extensions, 3 months later there are over 200!

And there are other concerns…

Official web stores, as under-regulated as they may currently be, are still quick to remove dangerous extensions once they’re discovered. But there are other things to worry about:

Automatic updates

Some perfectly good browser extensions can pick up malicious qualities during the update process. This can happen when an attacker infiltrates an organization’s supply chain and inserts malicious code into a legitimate update. Or, when a developer sells their extension to a third party that has bad intentions.

In-house developers

Some organizations develop their own extensions for internal use and upload them. However, these may also present risk if they aren’t put through the same level of scrutiny and security checks as those available in official stores.

Unknown authors, unknown sources

Spin.AI’s study revealed that many of the browser extensions installed by their corporate subjects – 42,938 to be precise – had unknown authors. This underscores how anyone can easily publish an extension in the official marketplace. Even worse, workers had sourced many of them from outside an official marketplace.

Permissions problems

Another factor to consider is how a browser extension might use its permissions to behave in unexpected ways. “For example, an extension could obtain ‘identity’ permission and then use the ‘webrequest’ permission to send this information to a third party,” explained one of the study’s researchers.

Mitigating your organization’s risks

When it comes to the use of extensions, it’s important for organizations to establish, enforce and regularly update security policies surrounding them.  Extensions – like other applications – should be assessed for operational, security, privacy, and compliance risks. You should also consider putting automated controls in place to help protect data.

Steps to extension risk mitigation include:

  1. Discovery/Inventory – Investigate and log all extensions in use organization-wide.
  2. Risk Assessments – Conduct ongoing assessments of extensions to identify potential security risks. Consider the permissions requested by the extension, whether the author is known, and if so, their reputation, and if they followed security protocols during development.
  3. Policies – Establish and enforce policies based on third-party risk management frameworks. Include extension adoption policies that require an appropriate evaluation process before installation can take place.
  4. Controls – Implement automated controls to allow or block extensions and applications based on organizational policies.

And then rinse and repeat annually. Because to effectively mitigate the risks that browser extensions present, you need to have a comprehensive, proactive and regular assessment process.  You also need strict policies that are well-known, enforced, and routinely adjusted as risks evolve through time. Only then can you relax, knowing your organization has done all it can to stay safe from threat.

 

 

 

 

Written by Jackie Bilodeau

I am the Communications Director for CGNET, having returned to CGNET in 2018 after a 10-year stint in the 1990's. I enjoy hiking, music, dance, photography, writing and travel. Read more about my work at CGNET here.

You May Also Like…

Demystifying the Dark Web

Demystifying the Dark Web

The Dark Web. A virtual space with an ominous-sounding label. In my mind, it has always been a cryptic, shadowy place...

You May Also Like…

Demystifying the Dark Web

Demystifying the Dark Web

The Dark Web. A virtual space with an ominous-sounding label. In my mind, it has always been a cryptic, shadowy place...

0 Comments

Trackbacks/Pingbacks

  1. Risiko keamanan terdapat pada lebih dari 50% ekstensi browser - IPMU - […] Sumber :https://www.osibeyond.com/blog/malicious-browser-extensions-security-risk/https://brave.com/learn/what-are-web-browser-extensions/https://usa.kaspersky.com/blog/dangers-of-browser-extensions/27020/https://security.berkeley.edu/education-awareness/browser-extensions-how-vet-and-install-safelyhttps://securelist.com/threat-in-your-browser-extensions/107181/https://cgnet.com/blog/browser-extensions-its-time-to-mitigate-the-risks/https://spin.ai/blog/browser-extension-risk-report/https://www.darkreading.com/cloud-security/more-than-half-of-browser-extensions-pose-security-riskshttps://www.techfinitive.com/business-high-risk-chrome-extensions/https://www.fastcompany.com/90997838/5-cybersecurity-predictions-for-2024https://www.linkedin.com/pulse/cyber-security-attacks-prediction-2024-digialerthttps://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-24-security-predictions-for-2024-part-2https://venturebeat.com/security/five-bold-cybersecurity-predictions-for-2024/ […]
  2. Risiko keamanan terdapat pada lebih dari 50% ekstensi browser - IAES - […] Sumber :https://www.osibeyond.com/blog/malicious-browser-extensions-security-risk/https://brave.com/learn/what-are-web-browser-extensions/https://usa.kaspersky.com/blog/dangers-of-browser-extensions/27020/https://security.berkeley.edu/education-awareness/browser-extensions-how-vet-and-install-safelyhttps://securelist.com/threat-in-your-browser-extensions/107181/https://cgnet.com/blog/browser-extensions-its-time-to-mitigate-the-risks/https://spin.ai/blog/browser-extension-risk-report/https://www.darkreading.com/cloud-security/more-than-half-of-browser-extensions-pose-security-riskshttps://www.techfinitive.com/business-high-risk-chrome-extensions/https://www.fastcompany.com/90997838/5-cybersecurity-predictions-for-2024https://www.linkedin.com/pulse/cyber-security-attacks-prediction-2024-digialerthttps://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-24-security-predictions-for-2024-part-2https://venturebeat.com/security/five-bold-cybersecurity-predictions-for-2024/ […]
  3. Security risks are present in over 50% of browser extensions - IPMU - […] Sources :https://www.osibeyond.com/blog/malicious-browser-extensions-security-risk/https://brave.com/learn/what-are-web-browser-extensions/https://usa.kaspersky.com/blog/dangers-of-browser-extensions/27020/https://security.berkeley.edu/education-awareness/browser-extensions-how-vet-and-install-safelyhttps://securelist.com/threat-in-your-browser-extensions/107181/https://cgnet.com/blog/browser-extensions-its-time-to-mitigate-the-risks/https://spin.ai/blog/browser-extension-risk-report/https://www.darkreading.com/cloud-security/more-than-half-of-browser-extensions-pose-security-riskshttps://www.techfinitive.com/business-high-risk-chrome-extensions/https://www.fastcompany.com/90997838/5-cybersecurity-predictions-for-2024https://www.linkedin.com/pulse/cyber-security-attacks-prediction-2024-digialerthttps://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-24-security-predictions-for-2024-part-2https://venturebeat.com/security/five-bold-cybersecurity-predictions-for-2024/ […]

Submit a Comment

Your email address will not be published. Required fields are marked *

Translate »
Share This
Subscribe