Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Simple prompt or agent workflow? How not to overthink AI

    August 29, 2025

    Changing these 10 settings on my OnePlus phone gave it a big performance boost

    August 29, 2025

    EnGenius Unveils New Wi-Fi 7 Enterprise Wireless Access Point At A Consumer-Level Price

    August 29, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Simple prompt or agent workflow? How not to overthink AI
    • Changing these 10 settings on my OnePlus phone gave it a big performance boost
    • EnGenius Unveils New Wi-Fi 7 Enterprise Wireless Access Point At A Consumer-Level Price
    • Google’s still not giving us the full picture on AI energy use
    • Cybercrime increasingly moving beyond financial gains
    • Vocal Image is using AI to help people communicate better
    • Do you really need smart home display hub? I tried one, and it made a big difference
    • Why Most Entrepreneurs Are Approaching YouTube the Wrong Way
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Guides»Your browser’s tools can’t see what extensions are really doing – and hackers know it perfectly well
    Guides

    Your browser’s tools can’t see what extensions are really doing – and hackers know it perfectly well

    TechurzBy TechurzAugust 1, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Representational image of a hacker
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Labels like “Verified” give a false sense of safety but don’t reflect real extension behavior
    • Browser DevTools were never meant to track how extensions behave across tabs and over time
    • Malicious extensions often act normally until specific triggers make their hidden features come alive

    The unchecked spread of malicious browser extensions continues to expose users to spyware and other threats, largely due to deep-seated flaws in how the software handles extension security.

    New research from SquareX claims many people still rely on superficial trust markers like “Verified” or “Chrome Featured,” which have repeatedly failed to prevent widespread compromise.

    These markers, while intended to reassure users, often offer little insight into the actual behavior of an extension.


    You may like

    Labels offer little protection against dynamic threats

    A central issue lies in the limitations of Browser DevTools, which were designed in the late 2000s for web page debugging.

    These tools were never meant to inspect the far more complex behavior of modern browser extensions, which can run scripts, take screenshots, and operate across tabs, actions that existing DevTools struggle to trace or attribute.

    This creates an environment where malicious behaviors can remain hidden, even as they collect data or manipulate web content.

    The failure of these DevTools lies in their inability to provide telemetry that isolates extension behavior from standard web activity.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    For instance, when a script is injected into a web page by an extension, DevTools lack the means to distinguish it from the page’s native functions.

    The Geco Colorpick incident offers an example of how trust indicators can fail catastrophically – according to findings from Koi Research, 18 malicious extensions were able to distribute spyware to 2.3 million users, despite carrying the highly visible “Verified” label.

    To address this, SquareX has proposed a new framework involving a modified browser and what it calls Browser AI Agents.

    This combination is designed to simulate varied user behaviors and conditions, drawing out hidden or delayed responses from extensions.

    The approach is part of what SquareX terms the Extension Monitoring Sandbox, a setup that enables dynamic analysis based on real-time activity rather than just static code inspection.

    At the moment, many organizations continue to rely on free antivirus tools or built-in browser protections that cannot keep up with the evolving threat landscape.

    The gap between perceived and actual security leaves both individuals and companies vulnerable.

    The long-term impact of this initiative remains to be seen, but it reflects a growing recognition that browser-based threats demand more than superficial safeguards.

    You might also like

    Browsers extensions Hackers perfectly tools
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhy open-source AI became an American national priority
    Next Article Here’s Why Anthropic Refuses to Offer 9-Figure Pay Like Meta
    Techurz
    • Website

    Related Posts

    Security

    Need help with AI safety? Stay ahead of risks with these tools and frameworks

    August 26, 2025
    Startups

    Why you need fewer AI tools and more AI training

    August 25, 2025
    Startups

    AI-Powered Planning Tools Designed for Serious Growth

    August 23, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Our Picks

    Simple prompt or agent workflow? How not to overthink AI

    August 29, 2025

    Changing these 10 settings on my OnePlus phone gave it a big performance boost

    August 29, 2025

    EnGenius Unveils New Wi-Fi 7 Enterprise Wireless Access Point At A Consumer-Level Price

    August 29, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.