Malware

Social engineering campaign leads to malicious Chrome extension

Security experts have discovered social engineering ruse that leads to a malicious Google Chrome extension that lures victims in a click fraud campaign.

Researchers at TrendMicro believe the malware is spreading through malicious shortened Twitter links. Those lead victims to a site that automatically downloads the malicious browser extension (TROJ_DLOADE.DND), according to a recent blog post.

Posing as a Flash Player extension in order to evade detection, the malware circumvents Google's security policy – which only allows extension installations hosted in the Chrome Web Store – by creating a folder in the browser's directory where it drops “browser extension components.”

Once installed, if a user visits Facebook or Twitter, the extension prompts a specific site in the background that is written in Turkish, which researchers believe is part of a click fraud or redirection scheme.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

Related Terms

Adware

You can skip this ad in 5 seconds