After malicious actors started adapting their techniques, Google has decided to ban the installation of extensions for the Chrome web browser from sources other than the Chrome Web Store.
Google announced in November 2013 plans to protect Windows users against malicious extensions by requiring all extensions to be hosted on the Chrome Web Store. The company started enforcing this policy in May 2014 and the results have been positive — customer support help requests for uninstalling unwanted extensions dropped 75%.
The policy was not enforced on the Windows developer channel of Chrome to give developers more freedom when testing their applications. This might have been beneficial for developers, but cybercriminals have also used it to their advantage.
According to the search giant, malicious actors have been tricking Windows users into using the developer channel of Chrome in order to install extensions that were not hosted in the official web store.
That is why Google has decided to enforce the policy for all channels, including the OS X version, starting with July 2015. The policy has already been enforced on all Windows channels of Chrome this week, and OS X will follow soon.
“For developers, we’ll continue to support local extension installs during development as well as installs via Enterprise policy. To provide an integrated install flow from your own website, you can make use of the existing inline installation feature,” Jake Leichtling, Extensions Platform Product Manager at Google, wrote in a blog post.
“The extension platform unlocks powerful features that can help users get the most out of Chrome. However, it is crucial that our users stay safe from the reaches of malicious software developers. Extending this protection is one more step to ensure that users of Chrome can enjoy all the web has to offer without the need to worry as they browse,” Leichtling noted.
While most of the extensions hosted on the Chrome Web Store are safe, malicious applications have been known to get through Google’s verification process. Just last month, experts spotted a suspicious third-party extension that had been downloaded 1.2 million times from the web store. The extension, Webpage Screenshot, uploaded users’ browser data to a remote server.
A recent study conducted by Google and researchers at University of California, Berkeley on the ad injection economy revealed the existence of 50,000 browser extensions that took control of browsers and injected advertisements. As part of the same study, researchers discovered 192 deceptive extensions that affected 14 million users on the Chrome Web Store.
Related: Google Releases Chrome Extension to Protect Users Against Phishing Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
