Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Google Warns Windows Users if Chrome Settings Hijacked

Google has started to prompt Chrome users if their browser settings appear to have been hijacked by malware.

Google has started to prompt Chrome users if their browser settings appear to have been hijacked by malware.

The new warning was announced by Linus Upson, Google’s vice president of engineering, as a means to compliment the ‘reset browser settings’ feature Google added in October. According to Google, the feature allows to change their browser settings back to factory defaults.

“So, you’re trying to download a free screensaver or game or something else you really want,” Upson blogged. “But later you find out that game came bundled with a malicious program that’s trying to hijack your browser settings. You’re not the only one having this problem—in fact, it’s an issue that’s continuing to grow at an alarming rate. You should always be in charge of your own Chrome settings. To help keep your browser settings under your control we added a “reset browser settings” button to Chrome’s settings page in October.”

“Despite this, settings hijacking remains our number one user complaint,” Upson continued. “To make sure the reset option reaches everyone who might need it, Chrome will be prompting Windows users whose settings appear to have been changed if they’d like to restore their browser settings back to factory default. If you’ve been affected by settings hijacking and would like to restore your settings, just click “Reset” on the prompt below when it appears.”

Clicking reset however will disable all extensions, apps and themes a user has installed. To reactive the extensions after a reset, users can turn to the Chrome menu under ‘More tools>Extensions.’

“Some hijackers are especially pernicious and have left behind processes that are meant to undermine user control of settings, so you may find that you’re hijacked again after a short period of time,” Upson blogged. “If that happens you can find additional help uninstalling such programs in the Chrome help forum—and remember even if you don’t see the prompt, you can always restore Chrome to a fresh state by clicking the reset button in your Chrome settings.”

The announcement, made Jan. 31, came roughly two weeks after Google banned two extensions from its Chrome Web store after it was discovered the extensions were being used to deliver malware to users.  

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.