back to article A MILLION Chrome users' data was sent to ONE dodgy IP address

A team of security researchers have found malware in a popular Chrome extension which may have sent the browsing data of over 1.2m users to a single IP address. ScrapeSentry credits its researchers with uncovering "a sinister side-effect to a free app [...] which potentially leaks [users'] personal information back to a single …

  1. Anonymous Coward
    Big Brother

    "Users could opt out of sharing data"

    With the NSA... I doubt it...

    The data was sent to the USA so it WILL end up in their database...

    1. Anonymous Coward
      Anonymous Coward

      Re: "Users could opt out of sharing data"

      "A team of security researchers have found malware in a popular Chrome extension which may have sent the browsing data of over 1.2m users to a single IP address."

      Chrome includes this as native functionality. No need for an extension...

      1. g e

        Re: "Users could opt out of sharing data"

        But oh no, you can't have the power to revoke permissions to apps in (unrooted) Android, which is increasingly ludicrous as time goes by, especially given the popular demand for the feature.

        That remains one of Android's hugest fails and irritates the hell out of me whenever something like this pops up, which is hardly infrequent.

        1. Anonymous Coward
          Anonymous Coward

          Re: "Users could opt out of sharing data"

          WTF does that tirade (which I agree with, as it happens) have to do with Chrome browser extensions?

        2. Anonymous Coward
          Anonymous Coward

          Re: "Users could opt out of sharing data"

          My (top of the range at the time) Samsung Note 12.2" tablet sits disconnected from the net and is pretty much unused due to Android's crap security model.

          Went back to using a laptop.

          1. Craigness
            Trollface

            Re: "Users could opt out of sharing data"

            "Went back to using a laptop."

            A Chromebook I hope!

  2. Anonymous Coward
    WTF?

    And how is this..

    ..much different to the thousands of other extensions and apps out there?

    1. Destroy All Monsters Silver badge
      Linux

      Re: And how is this..

      we just don't know

      what_are_birds.jpg

  3. This post has been deleted by its author

    1. DropBear
      Devil

      Since the only way to be sure you're not running any malicious code is to only run software written by yourself (and that includes the compiler itself in case you're wondering), it's quite clear any real-world use of computing will carry some amount of risk of running buggy and/or malicious code - so better get used to it. On the other hand, the idea that there is some magic code of "sensible behaviour" that will keep you out of trouble (as opposed to merely change the risks a little, depending on how much of an idiot you otherwise are) is ludicrous beyond belief and so is any outfit thinking they're dispensing "valuable advice" by spouting that sort of drivel. It's the IT equivalent of thinking that the advice to "drink lots of water" will keep you cancer-free...

      1. Destroy All Monsters Silver badge
        Pint

        and that includes the compiler itself in case you're wondering

        MITIGATED!

        1. DropBear
          Trollface

          "MITIGATED!"

          Only to a degree - that would still not get you demonstrably perfect security, as Schneier himself admits, only nudge the odds further into the implausible. And, of course - what if they *gasp* bugged you binary diff tool too?!? Those crafty bastards!!!

      2. Tom 38
        WTF?

        Since the only way to be sure you're not running any malicious code is to only run software written by yourself (and that includes the compiler itself in case you're wondering), it's quite clear any real-world use of computing will carry some amount of risk of running buggy and/or malicious code - so better get used to it.

        Utter sophistry - not all software is as trusted as other software. The gpg signed and verified RPMs downloaded from CentOS - trusted. The random browser plugins downloaded from google - not trusted.

        Despite not trusting all sources of software, I can still do useful things with a computer without having to have written every line of it myself. This doesn't mean that I "just get used to it" and accept software from any source..

        1. Crazy Operations Guy

          "The gpg signed and verified RPMs downloaded from CentOS - trusted."

          I wouldn't go that far. Signing of the packages just means that the payload has arrived intact, whether that payload happens to include a backdoor, or some other form of malicious code, is another matter entirely. And since Red Hat / CentOS is built in the US while trying to get cozy with the government, I wouldn't be too surprised if the NSA slipped a little something extra in there in order for the software to be approved for use.

          My trust is hard earned, and if being paranoid keeps me safe, so be it.

      3. Anonymous Coward
        Unhappy

        you forgot to mention...

        That you have to design and build the CPU (and the rest of the device as well)

        1. Matt Bryant Silver badge
          Happy

          Re: theodore Re: you forgot to mention...

          "That you have to design and build the CPU (and the rest of the device as well)" Hmmm, that could be a problem, working with the PSU when he's wrapped up in all that conductive foil......

        2. Captain DaFt

          Re: you forgot to mention...

          "That you have to design and build the CPU (and the rest of the device as well)"

          And for those of you that want to get started on that:

          http://www.evilmadscientist.com/2013/paperclip/

          ;)

        3. Fink-Nottle

          Re: you forgot to mention...

          > That you have to design and build the CPU (and the rest of the device as well)

          Out of the malicious software frying pan, into the malicious patent troll fire ...

  4. Vimes

    "Users could opt out of sharing data, he said."

    Opting out of unnecessary sharing ought to be made illegal (it won't be of course).

    People should have to opt *in*.

  5. Vimes

    How are people expected to opt out? If this was obvious then the fact data was being collected would have also been obvious. That it isn't points to a process that is obfuscated from view and quite probably unnecessarily convoluted.

    Am I the only one to get a Hitchhiker guide-esque mental image of the instructions on how to opt out being kept in the bottom of a locked cabinet stored in unused lavatory within an unlit cellar with the door carrying the sign 'beware of the leopard'?

    1. thomas k.

      suspicious

      That the part which sends the data to the company's address doesn't get added till a week after the initial download is suspicious in the extreme. If it's all perfectly innocent, why that delay?

  6. Anonymous Coward
    Anonymous Coward

    Urgh

    I actually use(d) this - it made sending complete page screenshots of sites in development for review really easy! I did notice a few things when it was enabled (e.g. some pages never finished loading) - what exactly do chrome extensions have access to? Do they have access to saved browser passwords?

    1. Destroy All Monsters Silver badge

      Re: Urgh

      AFAIK there is no sandboxing for extensions. Extensions like NoScript definitely could not run if there were. There should be though.

    2. Craigness

      Re: Urgh

      A Chrome extension with "No special permissions" can read the URL of the tab you're on and use AJAX to send it to a remote server. It can also inject code into the page, which makes it possible to grab a username. It can be run every time you load a page.

  7. the spectacularly refined chap

    This is the problem I have with auto-updates generally

    They always assume the provider is somehow in a privileged position.

    Rule 1 of computer security: everyone and everything is untrustworthy by default.

    Rule 1a: But you can trust us. Because we're xxxx and we'll never do you any harm. We'll never add an upgrade that soaks your Internet connectivity as if it was free and limitless (Microsoft), install payware that you neither need, want, or might interact badly with other software (Adobe/Oracle), repeatedly clobber the Kerberos setup that you entered into our own software expressly to improve security (Mozilla Foundation), or tell you to install Trusteer Rapport - presumed malware by default - "to improve security" without giving any real idea of what it actually does (any bank you care to mention).

    Yes, there comes a point where you do have to take things on trust but it should always be at the behest of the operator who is free to block anything they wish if they are not convinced it is beneficial. If you want to call that insecure go ahead: I'll simply point you to all those organisations with "secure" password policies that mean 80% of users have their password written on a piece of paper under their keyboard.

    1. Anonymous Coward
      Anonymous Coward

      Re: This is the problem I have with auto-updates generally

      Exactly... Chrome/Android apps already have a reputation for abusing auto-updates to foist adware and malware.

      The Android (and Chrome?) permission system is a complete joke, too. Updates can grab additional permissions within a group - approx location -> precise location for example - without notice to the user.

  8. Cuddles

    Popular?

    "The extension apparently allowed users to capture screenshots and save them for later editing"

    Why would an extension that does nothing other than replicate the "print screen" key be popular? When it comes down to it, security is a numbers game. As mentioned by others above, unless you only use things you've written yourself, there's always some risk that you'll end up unknowingly running some malicious software. The more useless shit you install, the more likely that becomes. The moral of the story is not to read all the entirely accurate and well thought out user reviews before you install it, but simply not to install piles of functionless shit in the first place. This malware may have been removed now, but no doubt the people who used it still have browsers crammed full of toolbars and other crap and are no more secure than they were before.

    1. Destroy All Monsters Silver badge
      Thumb Up

      Re: Popular?

      This is signed "Cuddles", a "Happy Tree Friend" with lots of morality tales about dangerous behaviour.

    2. Test Man

      Re: Popular?

      It doesn't replicate the Print Screen feature. It took a picture of the whole web page, including the bits that aren't visible in the browser (that needs scrolling to see).

      1. Dan 55 Silver badge
        Facepalm

        Re: Popular?

        So it's print to PDF but the text goes pixilated if you zoom into the bitmap. I'll have to download that one right now, it sounds so useful.

        1. caffeine addict

          Re: Popular?

          Because a PDF is the perfect way to embed an image into a Word document or turn into a psd...

          1. Dan 55 Silver badge

            Re: Popular?

            If you must embed an image from a web page into something else you right click and copy to clipboard or save.

            If you want to turn a webpage into a PSD it's better to generate it from a PDF as you can adjust the document to any size you like without pixelating the text.

    3. Anonymous Coward
      Anonymous Coward

      Re: Popular?

      Same people who don't know the difference between Print Screen and Alt + Print Screen. ;) Or that Windows has a snippet tool (for those who can't manage key commands or who just want to copy a specific selection)

      As tech savvy as these newer generations are, there is a plethora of the populous (Young and Old) who still barely understand the actual technology.

      I don't use Chrome except on mobile (never did like the platform tbh), but I use a handful of extensions with other browsers. Mostly ad & cookie tracking blocking, but also Google translate, tinyURL, etc... I will rejoice when I can completely dump Adobe and Java, but I keep them on manual for now.

  9. Anonymous Coward
    Facepalm

    Took long enough

    This issue was well known in WordPress ... WordPress!!! ... forums a few months back. Of course, a bunch of those people stuck their heads in the sand. And they hold the keys to a bazillion websites.

    If the Chocolate Factory actually produced poisoned chocolate, billions would've died by now. But it's only privacy at stake...

    Sit back and enjoy the trainwreck :D

  10. Anonymous Coward
    WTF?

    What amazes me...

    ...is that you can ALREADY take a screen shot by pressing the 'print screen' key on your keyboard; you don't NEED a plug-in, add-on, or anything else, aside from some form of image editor to paste it into, in order to manipulate it, or do whatever it is you want to do to it.

    A million-plus users data? Ouch.

    1. Test Man
      Thumb Down

      Re: What amazes me...

      Actually, it took a picture of the whole web page, including the bits that aren't visible in the browser (that needs scrolling to see).

      1. Anonymous Coward
        Anonymous Coward

        Re: What amazes me...

        And that's why you use an image editor to crop the image. Oh, I can see the attraction in a one-stop cure-all for screencaps, but wtf, use common sense, and don't use something for which there's already a solution present, even if it takes a little bit more time and effort!

        1. Tom 38

          Re: What amazes me...

          No, you still don't understand. Pressing "Print Screen" captures a subset of the contents of the screen. This tool captures the browser pane, some of which may be off screen - it doesn't capture the screen at all, it renders the browser pane.

        2. Anonymous Coward
          Anonymous Coward

          Re: What amazes me...

          > And that's why [blah, blah, blah, blah, blah, ...]

          Roger, for most people it is customary to stop digging when in a hole.

          You made assumptions, in the absence of actual knowledge, which turned out to be wrong--just admit that you said something stupid as we all do from time to time, make a mental note to be more careful next time, and move on. Instead of plowing onwards like that and looking pretty silly.

          1. Anonymous Coward
            Mushroom

            Re: What amazes me...

            Really? At the risk of feeding the trolls, you're dead wrong. On every windoze machine I've used, hitting print screen captures what's on the screen as a bitmap rendering to the clipboard. Using, for example, paint shop pro, in the past I have successfully produced a new image (ctrl+v) showing that very rendering. All I had to do then was crop the resulting bitmap image to my satisfaction, and presto, one screencap. I encourage you to try it for yourself.

            Your slice of humble pie is on the shelf by the door.

            1. Jamie Jones Silver badge
              Facepalm

              Re: What amazes me...

              Roger! You've already been advised to stop digging any further, yet full steam ahead, you continue regardless!

              Reread the comments you are replying too. They explain it clearly (Hint: off screen)

              "Really? At the risk of feeding the trolls, you're dead wrong. On every windoze machine I've used, hitting print screen captures what's on the screen as a bitmap rendering to the clipboard. Using, for example, paint shop pro, in the past I have successfully produced a new image (ctrl+v) showing that very rendering. All I had to do then was crop the resulting bitmap image to my satisfaction, and presto, one screencap. I encourage you to try it for yourself."

              This thing grabs the webpage, not the screen. This doesn't just save cropping - it means that if a webpage is so big as to require scrolling, you don't need to take screenshot, scroll down, take next screenshot, scroll down, take next screenshot etc.etc. and then finally crop and merge the whole collection of images.

              "Your slice of humble pie is on the shelf by the door."

              *cough*

              1. Anonymous Coward
                Anonymous Coward

                Re: What amazes me...

                Jamie, clearly you haven't even tried. This is one of the reasons I got out of IT support - people not actually doing what they were recommended to do. It just got too repetitive.

                Enough already.

                1. Anonymous Coward
                  Anonymous Coward

                  Re: What amazes me...

                  No offence meant but...

                  > This is one of the reasons I got out of IT support

                  ...one other reason presumably being that you were thicker than the users you were meant to support?

                2. Tom 38
                  FAIL

                  Re: What amazes me...

                  This is one of the reasons I got out of IT support - people not actually doing what they were recommended to do. It just got too repetitive.

                  Jesus wept, the reason you "got out of IT support" is that you don't seem to understand IT, English or logic. Keep digging.

                  If you take a render of the webpage, you get the entire content of the page. When you "print screen", you get the contents of the screen, which contains (at most) the browser's viewport, a sub-set of the webpage.

                3. Jamie Jones Silver badge
                  Happy

                  Re: What amazes me...

                  Roger, ..........seriously?

                  Glad you left tech support - nothing more infuriating than calling when a server is down, and being told the solution is to reboot my computer, but it sounds like you'd have been at home in that environment!

      2. This post has been deleted by its author

        1. Anonymous Coward
          Anonymous Coward

          Re: What amazes me...

          > An alternative way to do this on UNIX like systems, which doesn't require a browser plug-in, is to run a dummy X server

          Nah, if you're going to be awkward might as well use a framebuffer.

  11. pauly

    I'd been using that for ages, though iirc it came back and wanted more permissions, like it wanted to access to everything. Looked really sus so i removed it and found something else. Not sure it was too late though as it must have been fairly dodgy from the start.

  12. Stevie

    Bah!

    Title says it all.

  13. adnim
    Unhappy

    Unfortunately

    most people are not going to run their internet connection through Wireshark or Snort and log/parse the resulting data. I expect everything I run to want to send data to the software provider and yet I don't do this. I would also have to be an accomplished cryptographer to be sure I understood what was being sent much of the time.

    There was a time when I had a Honeywall between my LAN and the Internet, the logs made interesting reading, not so much the outgoing but the incoming connections. I expect the outgoing logs would be far more interesting now.

    A web browser has to access the Internet a local application doesn't, therefore I have a software firewall that detects egress and I just block every application that seeks to connect to the Internet.

    With a web browser it cannot determine a plugin from the parent application, although it does list the IP addresses an allowed application connects to.

    It is tedious doing lookups on these addresses though. It might be time to look at Honeywall Roo again and build on what is already there. Would the average consumer care though if presented with a warning telling them that their privates are being exposed? They might just think the benefit of the free application is worth the cost.

    Commercial entities are legion for they are many. If you cant read the source code it cannot be trusted to connect to the Internet. It really is that simple.

  14. Crazy Operations Guy

    "who the extension's users were and where they were located to help drive development of the code."

    That doesn't parse... Everyone gets the same internet, so why do they need to know that stuff? And if there is anything that needs to be changed to support specific users / locations, well, that is what feedback systems are for. At most, I could see them wanting the language code so that they know what translations to focus on.

    But what would make sense is that they are out of cash and are selling this information to advertisers without the users' permission.

  15. streaky

    Discovered

    This extension's don't give a shit attitude to privacy and malware has been known about for well over a year. Interesting they claimed they'd discovered it :p

  16. JCitizen
    Alert

    Like WOW! man!...

    Hasn't everybody got tired of Google Chrome's spy shit??!! I certainly have, and don't use it anymore!!!! Doh!! I block Chrome cookies religiously on all my browsers - I'm sure a competitor will exceed their wayward ways, but then, I'm sure I can find an alternative by then too!

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like