ChromeWebStore Chrome Extension
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 5,971 |
Threat Level: | 80 % (High) |
Infected Computers: | 1,560 |
First Seen: | October 30, 2017 |
Last Seen: | September 19, 2023 |
OS(es) Affected: | Windows |
The ChromeWebStore Chrome Extension is not an official product by Google Inc. that you can find on Chrome.google.com/webstore. Cybersecurity experts alert that the ChromeWebStore Chrome Extension is a program that can perform shady operations on your PC. A careful analysis unveiled that the ChromeWebStore Chrome Extension is using the same ID as the LastPass extension from LogMeIn, Inc. potentially in an attempt to circumvent detection by AV tools. The ChromeWebStore Chrome Extension is recorded to arrive on computers via free software packages and updates to Adobe Flash and Java that included bloatware and adware. The containers used to distribute the ChromeWebStore Chrome Extension are not deemed as official releases by Adobe Systems Inc. and Oracle Corp. The practice of bundling legitimate code with unverified and potentially unsafe apps is not a new thing on the Internet.
Once, the ChromeWebStore Chrome Extension is installed on the computer, it loads a code in the Google Chrome Browser and connects to a publicly available Google document. The document in question contains a base64-encoded list of URLs, which lead to a set of instructions interpreted by the ChromeWebStore Chrome Extension as commands from its creator. Lab tests have shown that the ChromeWebStore Chrome Extension disables third-party extensions in the browser and can integrate new modules as updates. Given the way how the extension is propagated, the lack of an official page an usage of a fake ID it is safe to say you should remove the ChromeWebStore Chrome Extension sooner rather than later. The ChromeWebStore Chrome Extension may be used the same way as the Quick Searcher Chrome Extension, which featured a mining script from Coin-hive.com. There are security experts who have reported seeing the ChromeWebStore Chrome Extension loading ads in a background process and generating ad revenue for unknown entities. AV companies and independent security researchers are likely to classify the ChromeWebStore Chrome Extension as riskware and a Trojan. More observation is required to give a final judgment on the ChromeWebStore Chrome Extension activity, but regular PC users may want to refrain from installing the app.