Replies: 9 comments 2 replies
-
greatsuspender#1304 has a bunch of info, specifically, |
Beta Was this translation helpful? Give feedback.
-
Not really. The best information was still the added tracker/analytic from months ago, replacing Google Analytics: greatsuspender#1263 This recent comment summarized the problem: greatsuspender#1263 (comment) While on the surface the new owner merely switched to another analytics provider, it allows arbitrary code execution from the external analytics provider. No one knows what code is being fetched from the external server, which may or may not be malicious. |
Beta Was this translation helpful? Give feedback.
-
No, and we will probably never have. The problem was including code from a remote untrusted host ( The reasons for suspicions are the new owner reportedly acting shady, and this We will probably never know if and what was done, all we can do is try to question the new owner about this domain, and try to figure out who is behind this domain. Note that the new extension owner might have just come across this analytics site and wanted to use it, he might be separate from the actors behind it and not necessarily the malicious one in this case (the analytics site might also be non-malicious, but it seems very suspicious). |
Beta Was this translation helpful? Give feedback.
-
Btw while we can't know what happened, we can look at the possibilities, by looking at the permissions the extension is granted: So it could:
While it may be stressful to imagine the possibilities, erring on the past too much won't help. What I do is assume I wasn't targeted (we may all have been, this wasn't necessarily targeted towards specific people), and if I was - so be it. I guess we'll deal with whatever comes. This shows recent work Chrome did to help prevent these cases, and this and this shows they still have a lot to do. If you also use Visual Studio Code for example, you should support microsoft/vscode#52116, it will help preventing things like this from happening there too. |
Beta Was this translation helpful? Give feedback.
-
The extension always required this permission, even prior to the buyout. In fact, that's the only way you can set idle timers as well as maintain any semblance of state, by timestamping when a tab was last active and comparing it to the current timestamp, as well as restoring the state from history. |
Beta Was this translation helpful? Give feedback.
-
@cowbert this doesn't change what I said. Any available permissions, regardless of which owner added them, could have been taken advantage of by the remote code. The cookies permission was also present before. |
Beta Was this translation helpful? Give feedback.
-
and people said that the same tracking stuff was found in other malicious extensions. |
Beta Was this translation helpful? Give feedback.
-
That was always the case? Why doesnt Chrome warn a user, when an extension updates and wants new permissions with an update? I dont think great suspender ever wanted permissions to cookies and everything else. |
Beta Was this translation helpful? Give feedback.
-
Chrome does alert users when an extension declares new permissions in an update. At least for certain permissions. The scary thing that happened with TGS is that remote code was being executed! Chrome didn't alert users when that was added. It didn't alert me that the extension was found to have malware and that it was disabled. |
Beta Was this translation helpful? Give feedback.
-
This comes like a total shock to me, just read by luck on Reddit today that the addon had malware... I used it for years on all my devices!
Any information on what happened what was stolen ect?
Beta Was this translation helpful? Give feedback.
All reactions