{"id":101226,"date":"2024-08-07T00:53:20","date_gmt":"2024-08-07T07:53:20","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=101226"},"modified":"2025-04-25T10:20:15","modified_gmt":"2025-04-25T17:20:15","slug":"chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/","title":{"rendered":"Chrome extensions are a security nightmare; here&#8217;s why you should avoid them"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-101212\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>For decades, popular Web browsers have offered the ability to extend their capabilities through the use of third-party extensions.<\/p>\n<p>Today, Google Chrome is the most popular desktop browser on the planet, with a roughly <a href=\"https:\/\/gs.statcounter.com\/browser-version-partially-combined-market-share\/desktop\/worldwide\" target=\"_blank\" rel=\"noopener\">65% market share<\/a>. Microsoft Edge is the number-two browser, with a 13% market share, and it&#8217;s also based on Chromium\u2014the open-source version of Chrome. These and other Chromium-based browsers support extensions from Google&#8217;s <a href=\"https:\/\/chromewebstore.google.com\/\" target=\"_blank\" rel=\"noopener\">Chrome Web Store<\/a>.<\/p>\n<h3>Malware in Google&#8217;s Chrome Web Store<\/h3>\n<p>Google would have you believe that Chrome extensions are, by and large, extremely safe. On June 20, the Chrome Security Team <a href=\"https:\/\/security.googleblog.com\/2024\/06\/staying-safe-with-chrome-extensions.html\" target=\"_blank\" rel=\"noopener\">wrote<\/a> on the Google Security Blog, that &#8220;In 2024, <strong>less than 1% of all installs from the Chrome Web Store were found to include malware<\/strong>,&#8221; noting &#8220;We&#8217;re proud of this record.&#8221;<\/p>\n<p>It seems odd to be &#8220;proud&#8221; that close to 1 in every 100 extension installs from their store contains malware. Imagine a doctor bragging to patients, &#8220;Only 1 in 100 patients gets sick as a result of visiting our office!&#8221; That&#8217;s an alarming failure rate.<\/p>\n<p>Also concerning is that Google&#8217;s claim presumably* didn&#8217;t even take into consideration an August 6 <a href=\"https:\/\/reasonlabs.com\/research\/new-widespread-extension-trojan-malware-campaign\" target=\"_blank\" rel=\"noopener nofollow\">report<\/a> about &#8220;at least 300,000 users across Google Chrome and Microsoft Edge&#8221; who had unknowingly installed extensions from a specific malware campaign over the past three years. (*The exact timeline of communication between the researchers and Google is unclear.)<\/p>\n<h3>Extension risks go far beyond malware<\/h3>\n<p>Two days before the Google blog post, researchers from Stanford University published a <a href=\"https:\/\/arxiv.org\/abs\/2406.12710\" target=\"_blank\" rel=\"noopener\">study<\/a> examining the safety of extensions in the Chrome Web Store (CWS). Most of their sample data was collected through May 2023. But the results may reflect a somewhat similar situation to today&#8217;s Chrome Web Store\u2014and they&#8217;re shocking.<\/p>\n<p>The researchers defined <strong>&#8220;security-noteworthy extensions&#8221; (SNE)<\/strong> as malware-containing, privacy-violating, or known-vulnerable extensions. And they found many of each.<\/p>\n<p>Some of the key takeaways from the research include:<\/p>\n<ul>\n<li>SNE &#8220;stay in the CWS for years, meaning that their <strong>user base can stay at risk for years<\/strong>.&#8221;<\/li>\n<li>&#8220;<strong>Over 346 million users installed a SNE in the last 3 years.<\/strong>&#8220;<\/li>\n<li>&#8220;Users do not give SNE lower ratings.&#8221; In other words, even unsafe extensions often have high user ratings.<\/li>\n<li>&#8220;Almost 60% of extensions have never received any updates.&#8221; The researchers note that unmaintained extensions miss out on &#8220;security and privacy improvements such as those offered by Manifest V3,&#8221; a platform update that improves baseline extension security.<\/li>\n<li>At least 42% of vulnerable extensions were &#8220;still in the CWS and still vulnerable 2 years after disclosure.&#8221;<\/li>\n<li>&#8220;<strong>Almost a third of extensions (40k) use a JavaScript library with a known vulnerability<\/strong>.&#8221; This issue alone impacts nearly <strong>500 million extension users<\/strong>.<\/li>\n<li>&#8220;Even when developers update their extensions, they often do not update vulnerable libraries&#8221; within them. In other words, even extensions that have been updated recently should not be presumed to be safe.<\/li>\n<\/ul>\n<p>This research is rather stunning, to say the least. But even this research doesn&#8217;t tell the whole story of why extensions can be unsafe.<\/p>\n<h3>Good extensions can take a turn for the worse, too<\/h3>\n<p>A little over a year ago, we <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wwdc-new-macs-macos-sonoma-ios-ipados-17-and-vision-pro-intego-mac-podcast-episode-295\/#:~:text=Malicious%20Chrome%20browser%20extensions%20purged%20from%20the%20Chrome%20Web%20Store\">reported<\/a> on the <a href=\"https:\/\/podcast.intego.com\">Intego Mac Podcast<\/a> about nearly three dozen browser extensions in the Chrome Web Store that contained search-hijacking code. Some of the extensions had contained this unadvertised malicious functionality for nearly two years before <a href=\"https:\/\/palant.info\/2023\/05\/31\/more-malicious-extensions-in-chrome-web-store\/\" target=\"_blank\" rel=\"noopener\">Wladimir Palant blogged about the problem<\/a>, and Google finally took them down. But in the mean time, those 34 extensions had amassed 87 million users.<\/p>\n<p>I pointed out on the podcast that sometimes this sort of thing happens &#8220;when a developer stops working on an extension or app, [and] someone else comes along and offers the developer a bunch of money and says, &#8216;Here, I\u2019ll take over development.&#8217; And then they start developing it and add malicious things to it.&#8221; While it&#8217;s unclear whether that may have been the case with those 34 Chrome extensions, <strong>it has certainly happened before, and will inevitably happen again<\/strong>.<\/p>\n<p>In fact, just last August, the developer of a Chrome extension with 300,000 users spoke out about having received <strong><a href=\"https:\/\/www.theregister.com\/2023\/08\/11\/chrome_extension_developer_pressure\/\" target=\"_blank\" rel=\"noopener\">more than 130 solicitations to &#8220;monetize&#8221; his extension<\/a><\/strong>.<\/p>\n<p>That&#8217;s to say nothing of overtly malicious extensions. In March 2023, we reported on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/fakegpt-trojanized-chatgpt-chrome-extension-hijacks-facebook-accounts\/\">a fake ChatGPT extension designed to hijack Facebook accounts<\/a>.<\/p>\n<h3>Avoid installing extensions if at all possible<\/h3>\n<p>All of this speaks to the potential dangers of using any third-party browser extensions.<\/p>\n<p>My recommendation is to <strong>avoid using any extensions at all\u2014unless you&#8217;re absolutely sure you can trust the developer.<\/strong><\/p>\n<p>One of the most popular categories of extensions is advertisement and tracker blockers. The only ad-blocking extension that I both trust and personally use is <a href=\"https:\/\/github.com\/gorhill\/uBlock?tab=readme-ov-file#:~:text=uBlock%20Origin%20(uBO)\" target=\"_blank\" rel=\"noopener\">uBlock Origin<\/a> by Raymond Hill. Wladimir Palant&#8217;s <a href=\"https:\/\/adblockplus.org\/en\/download\" target=\"_blank\" rel=\"noopener\">Adblock Plus<\/a> is fine, too; both developers understand browser security well. Or you can use a browser with built-in ad blocking, such as <a href=\"https:\/\/brave.com\/\" target=\"_blank\" rel=\"noopener\">Brave<\/a>, a privacy-focused, Chromium-based browser.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security, and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you use Google Chrome or another browser, think twice before you install any extensions. They might contain malware, vulnerabilities, or privacy violations\u2014even if you get them from an official extension store.<\/p>\n","protected":false},"author":14,"featured_media":101214,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[4543,38,173,2389,181,4607],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Whether you use Google Chrome or another browser, think twice before you install any extensions. They might contain malware, vulnerabilities, or privacy violations\u2014even if you get them from an official extension store.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chrome extensions are a security nightmare; here&#039;s why you should avoid them - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Whether you use Google Chrome or another browser, think twice before you install any extensions. They might contain malware, vulnerabilities, or privacy violations\u2014even if you get them from an official extension store.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-07T07:53:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T17:20:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Creepy, potentially dangerous Google Chrome browser extensions\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/\",\"name\":\"Chrome extensions are a security nightmare; here's why you should avoid them - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#primaryimage\"},\"datePublished\":\"2024-08-07T07:53:20+00:00\",\"dateModified\":\"2025-04-25T17:20:15+00:00\",\"description\":\"Whether you use Google Chrome or another browser, think twice before you install any extensions. They might contain malware, vulnerabilities, or privacy violations\\u2014even if you get them from an official extension store.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chrome extensions are a security nightmare; here&#8217;s why you should avoid them\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Chrome extensions are a security nightmare; here&#8217;s why you should avoid them\",\"datePublished\":\"2024-08-07T07:53:20+00:00\",\"dateModified\":\"2025-04-25T17:20:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#webpage\"},\"wordCount\":884,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg\",\"keywords\":[\"Brave\",\"Chrome\",\"Chrome Browser\",\"Extensions\",\"Google Chrome\",\"Microsoft Edge\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Whether you use Google Chrome or another browser, think twice before you install any extensions. They might contain malware, vulnerabilities, or privacy violations\u2014even if you get them from an official extension store.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/","og_locale":"en_US","og_type":"article","og_title":"Chrome extensions are a security nightmare; here's why you should avoid them - The Mac Security Blog","og_description":"Whether you use Google Chrome or another browser, think twice before you install any extensions. They might contain malware, vulnerabilities, or privacy violations\u2014even if you get them from an official extension store.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-08-07T07:53:20+00:00","article_modified_time":"2025-04-25T17:20:15+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg","width":400,"height":260,"caption":"Creepy, potentially dangerous Google Chrome browser extensions"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/","name":"Chrome extensions are a security nightmare; here's why you should avoid them - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#primaryimage"},"datePublished":"2024-08-07T07:53:20+00:00","dateModified":"2025-04-25T17:20:15+00:00","description":"Whether you use Google Chrome or another browser, think twice before you install any extensions. They might contain malware, vulnerabilities, or privacy violations\u2014even if you get them from an official extension store.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Chrome extensions are a security nightmare; here&#8217;s why you should avoid them"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Chrome extensions are a security nightmare; here&#8217;s why you should avoid them","datePublished":"2024-08-07T07:53:20+00:00","dateModified":"2025-04-25T17:20:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#webpage"},"wordCount":884,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg","keywords":["Brave","Chrome","Chrome Browser","Extensions","Google Chrome","Microsoft Edge"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/creepy-potentially-dangerous-Google-Chrome-extensions-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qkG","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101226"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=101226"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101226\/revisions"}],"predecessor-version":[{"id":101450,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101226\/revisions\/101450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/101214"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=101226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=101226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=101226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}