On Wednesday, September 18, Google released two Chrome extensions to block ads. In fact, two days earlier, AdGuard discovered fake AdBlock and uBlock ad blockers. As explained by the company's technical director Andrei Meshkov, the names of the above additions are too similar to the names of other popular adblock Plus and uBlock Origin blockers, and users can confuse them.
In a letter to the registry reports, they confirmed that AdBlock and uBlock were removed from the Chrome extension store, but refused to explain why. It is also unclear why co-existence of extensions with similar, misleading names is possible in the app store.
But, as Meshkov noted, it is not just about the similarity of the name. AdBlock and uBlock contain codes for a cookie stuffing attack, which means the invisible for the user to add third-party cookies in the browser session to illegally gain profits from online stores. In addition, the extensions contain a tool that disables cookie filling if the Developer Console is opened. According to the expert, during the first 55 hours after installation, AdBlock and uBlock work as expected and only then malicious activity begins.
As Meshkov estimates, the total add-on audience is more than 1