Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. Blue Shield quickly removed the unauthorized code. An investigation determined it was injected by a browser extension installed on the computer of a Blue Shield employee who’d edited the Web site in the past month.
The incident is a reminder that browser extensions — however useful or fun they may seem when you install them — typically have a great deal of power and can effectively read and/or write all data in your browsing sessions. And as we’ll see, it’s not uncommon for extension makers to sell or lease their user base to shady advertising firms, or in some cases abandon them to outright cybercriminals.
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Krebs: The Case for Limiting Your Browser Extensions
Home » Forums » AskWoody support » Questions: Browsers and desktop software » Updates for browsers, apps and add-ins » Krebs: The Case for Limiting Your Browser Extensions
- This topic has 4 replies, 4 voices, and was last updated 3 years, 3 months ago.
AuthorTopicsatrow
AskWoody MVPViewing 3 reply threadsAuthorReplies-
Lars220
AskWoody PlusThank you satrow recently there has been a lot of information about privacy and security concerning web browsers. It is good that you remind us about browser extensions also. Chris Hoffman of How-To Geek website has an older 2017 article that is still worthwhile reading:
Browser Extensions Are a Privacy Nightmare:
Stop Using So Many of Them
By Chris Hoffman August 14, 2017
Browser extensions are much more dangerous than most people realize.
https://www.howtogeek.com/188346/why-browser-extensions-can-be-dangerous-and-how-to-protect-yourself/Also, Firefox Support has some “Tips for assessing the safety of an extension” that offers some good advice:
https://support.mozilla.org/en-US/kb/tips-assessing-safety-extension5 users thanked author for this post.
-
Carl
AskWoody PlusTrue all. Personally, if I’m unsure of the extension author, I’ll download the extension and look through the source code. I never allow auto updates and I always read release notes before updating (except for one because I’m on the dev channel).
If there’s a permissions change requested during an update, I’ll cancel it and some do some research to make sure the author has documented the reason why. If not, then that may be a clue of a change of ownership and trouble ahead.
Look for reviews of extensions on the intertubes and any comments. A good source is gHacks (Martin Brinkmann). If an extension is new, check other extensions written by the author. Has he written others that are well known? Reputation can help you make an informed decision. A reputable, well-known author will usually disclose the purpose of any remote connections and what data is exchanged.
Since Mozilla now uses an automated system for extension checks before publishing, you have to be on your toes. Baddies do slip by. Ownership could change hands to bad actors.
It goes without saying, be wary of any frivolous extensions (e.g. coupons), those that have names similar to well-known ones, or ones that claim to add “features” to well established ones.
1 user thanked author for this post.
-
woody
Manager -
Carl
AskWoody PlusA large number of extension authors make their source code available on GitHub. But, is that the code you’re actually getting when you click the “Add to Firefox” button?
If you right-click the “Add to Firefox” button, you can save the installation package locally. It will have the file extension “xpi” (e.g. myextension.xpi). An xpi file can be installed off-line. It’s actually an archive.
Use 7-Zip to unpack the xpi file. Now you have the source code of the extension (css, javascript, json). You can open individual files with a simple text editor (e.g. notepad, notepad++). You do not have to be a programmer to do basic checks.
For example, the file “manifest.json” will provide useful information such as where the extension gets its updates. Example:
“update_url”: “https://clients2.google.com/service/update2/abc”
If any of the files are obfuscated (unreadable), then this against Mozilla guidelines for extensions. The rule to remember is “If you can’t read it, don’t install it.”
Look for URLs, IP addresses, and filenames in the source files. If something looks strange, use the rule “If in doubt, throw it out”.
4 users thanked author for this post.
Viewing 3 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Just a fyi – I think I’ll skip on an Apple Vision Pro hardware section
by
Susan Bradley
6 hours, 18 minutes ago -
What’s wrong with Windows 11?
by
Ascaris
4 hours, 28 minutes ago -
Streaming an iPad to a standard TV
by
MrJimPhelps
20 minutes ago -
clone to make backup laptop
by
greenbergman
10 hours, 59 minutes ago -
Problems with sound and USB ports
by
StavRoss
10 hours, 24 minutes ago -
Can you use WUShowHide on Windows 11 version 21H2?
by
southieguy
15 minutes ago -
Can we control the changes to our operating systems?
by
Susan Bradley
6 hours, 53 minutes ago -
Watch out for fake ‘Windows Defender’ scare
by
B. Livingston
6 hours, 14 minutes ago -
Diagnostics and testing? Get it all done in a flash.
by
Ben Myers
25 seconds ago -
Dip your toe into Visio Online
by
Peter Deegan
10 hours, 34 minutes ago -
Updating Win 10 Pro 21H2 to 22H2
by
bsqrd
8 hours, 35 minutes ago -
Changing mouse pointer options.
by
Artie
11 hours, 52 minutes ago -
Desktop or Laptop? What’s your choice?
by
Susan Bradley
2 hours, 35 minutes ago -
Anyone use Auslogics Bitreplica
by
WSjcgc50
1 day, 21 hours ago -
Unleashing the Gaming Revolution: CrossOver Mac’s DirectX 12 Support Update!
by
Alex5723
2 days, 10 hours ago -
Defender’s Offline Scan Fails to Run
by
E Pericoloso Sporgersi
1 day, 17 hours ago -
Mouse problem : cannot grab a window without maximizing it
by
Andy M
1 day, 23 hours ago -
End of support for Cortana in Windows
by
Alex5723
1 day, 9 hours ago -
Microsoft is really missing an advertising trick
by
Sky
2 days, 9 hours ago -
New MOVEit Transfer zero-day mass-exploited in data theft attacks
by
Alex5723
3 days, 9 hours ago -
Windows 11 Insider Preview build 25381 released to Canary
by
joep517
3 days, 9 hours ago -
Authenticating Email Address
by
IreneLinda
4 hours ago -
Confusion about password protecting a folder in W10
by
Cthru
3 days, 12 hours ago -
I broke my right arm yesterday
by
Alex5723
1 day, 12 hours ago -
Kaspersky : iOS devices targeted with previously unknown malware
by
Alex5723
3 days, 8 hours ago -
Which Updates From Each List Are Safe to Install ?
by
TheFamilyIT
1 day, 1 hour ago -
AOL changes its web based email
by
Charlie
3 days, 7 hours ago -
Windows 11 Insider Preview build 23471 released to DEV
by
joep517
4 days, 10 hours ago -
Windows 11 Insider Preview Build 22621.1830 and 22624.1830 released to BETA
by
joep517
4 days, 10 hours ago -
Spyboy Defense Evasion Tool Advertised Online
by
Alex5723
4 days, 17 hours ago
Recent blog posts
- Can we control the changes to our operating systems?
- Watch out for fake ‘Windows Defender’ scare
- Diagnostics and testing? Get it all done in a flash.
- Dip your toe into Visio Online
- Desktop or Laptop? What’s your choice?
- Beware of Google’s .ZIP domain and password-embedded URLs
- Longstanding feature requests, and their status
- Three typing tutors — no more “hunt and peck”
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2023 by AskWoody Tech LLC. All Rights Reserved.