If you're like most people, no matter how careful you are when you surf the web, you seldom think to review the permissions browser extensions ask for when you install them.  It's just one of those things that's easy to lose sight of, and unfortunately, hackers are aware of this.

That's why vulnerable extensions have become a newly emergent threat in the ever-evolving threat matrix.

Browser extensions can do things that simple websites can't. Enterprising researcher, Doliere Francis Some took a deep dive into the murky world of extensions and find out if it was possible that they could bypass SOP (Same Origin Policy), which keeps websites from different domains from sharing data.

Over the course of her research, she analyzed more than 75,000 Opera, Firefox, and Chrome extensions.  Although her research revealed that it was uncommon, she was able to confirm that in 197 cases, the answer was yes.

171 of the 197 instances she discovered were Chrome extensions.  That fact should not be seen as an indication that Chrome is inherently less secure than the other browsers, but is reflective of the fact that Chrome has vastly more extensions than the other two browsers included in her survey.

Based on Some's research, while this is a troubling discovery to be sure, it's not something you're likely to encounter or need to devote significant resources to guard against.  In fact, the simplest way to protect yourself is to prevent extensions from communicating with web pages at-will. Although be aware of the fact that this may cause some legitimate extension functions to stop working.

Of course, in a perfect world, browser vendors would do a far better job at analyzing extension behavior before making them available to the general public, but this is extremely unlikely to occur.  Again, it just isn't a common enough problem to throw a lot of resources at.

In any case though, it's something to be aware of, and it's certainly worth checking the permissions of the extensions you're using.  Better safe than sorry.

 

Used with permission from Article Aggregator