Written By Divya
Edited By: Divya | Published By: Divya | Published: Jul 10, 2025, 05:05 PM (IST)
Google Chrome security alert
Also Read: iQOO 15 Too Expensive? 7 Flagship Phones To Compare Before You Buy
If you use Chrome extensions for any purpose, then know your browser may have been compromised! Security researchers have discovered nearly a dozen Chrome extensions that looked harmless but were secretly tracking users’ web activity and possibly redirecting them to unsafe sites. With over 1.7 million downloads, these extensions highlight how even “verified” tools on the Chrome Web Store can turn dangerous. Also Read: Google Meet Down In India: Users Unable To Join Calls
A report by Bleeping Computer cited that cybersecurity firm Koi Security discovered the issue and promptly reported the extensions to Google. While some have since been removed from the Chrome Web Store, many are still live and available for download. The risky part? Many of these extensions were verified by Google, and they carried hundreds of positive reviews and even ranked high in the store’s search results, the report added. Also Read: Photoshop Comes To Chrome Adobe Offers 12 Months Free Photoshop Web
Here’s a list of known malicious Chrome extensions you should remove immediately:
According to the report, these extensions contain malicious code in the background, which activates every time you open a new web page. The code captures the visited URL and sends it to a remote server along with a unique tracking ID, allowing potential hijacking of the user’s online activity. Interestingly, the harmful code wasn’t part of the original versions. It was added later through updates, rolled out silently using Google’s auto-update system.
Koi Security’s report also found similar issues in Microsoft Edge extensions, bringing the total affected users across both browsers to over 2.3 million. Google has since confirmed the removal of all the flagged Chrome extensions, the report added.
If you are worrying about your security and data, then here are a few steps users should take immediately: