Security Alert: Top Chrome Extensions Expose API Keys and User Data

Published:

spot_img

Security Concerns Surrounding Popular Google Chrome Extensions

Published: June 5, 2025 | Author: Ravie Lakshmanan
Categories: Browser Security / Online Safety


Introduction to the Risks

Cybersecurity experts have raised alarms about numerous widely used Google Chrome extensions that pose significant privacy and security threats. Many of these extensions are sending data over unencrypted HTTP, which can make user information vulnerable to interception.

Unencrypted Data Transmission

Yuanjing Guo, a security researcher from Symantec’s Security Technology and Response team, emphasizes the issue: "Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP." This exposes a variety of information, such as browsing domains, machine IDs, details about the operating system, and usage analytics—all in plaintext.

The absence of encryption not only compromises user privacy but also opens the door to potential adversary-in-the-middle (AitM) attacks. These attacks can occur on public networks, allowing malicious individuals to intercept and modify this sensitive data. The consequences of these vulnerabilities could be severe and far-reaching.

Identified Vulnerable Extensions

A list of problematic extensions has been discovered, revealing the specific risks associated with each.

  • SEMRush Rank (ID: idbhoeaiokcojcgappfigpifhpkjgmab) and PI Rank (ID: ccgdboldgdlngcgfdolahmiilojmfndl): Both extensions make calls to "rank.trellian[.]com" over plain HTTP.

  • Browsec VPN (ID: omghfjlpggmjjaagoclmmobgdodcjboh): This extension uses HTTP when calling an uninstallation URL, potentially exposing user information during the removal process.

  • MSN New Tab (ID: lklfbkdigihjaaeamncibechhgalldgl) and MSN Homepage, Bing Search & News (ID: midiombanaceofjhodpdibeppmnamfcj): These transmit unique machine identifiers and other sensitive info to "g.ceipmsn[.]com" using HTTP.

  • DualSafe Password Manager & Digital Vault (ID: lgbjhdkjmpgjgcbcdlhkokkckpjmedgc): This extension makes HTTP requests carrying details about the user’s browser language and extension version.

Although it appears no credentials or passwords are leaked, Guo points out that the use of unencrypted requests significantly undermines the credibility of password managers regarding their security protocols.

Hard-Coded Secrets in Extensions

In addition to the insecure data transmissions, Symantec has identified a troubling trend where certain extensions contain hard-coded API keys and tokens within their JavaScript code. This poses an additional layer of vulnerability, as these keys could be exploited by attackers for malicious purposes.

Examples include:

  • Online Security & Privacy (ID: gomekmidlodglbbmalcneegieacbdmki) and other extensions that expose a Google Analytics 4 (GA4) API secret, potentially allowing attackers to corrupt data metrics.

  • Equatio – Math Made Digital (ID: hjngolefdpdnooamgdldlkjgmdcmcjnc): This extension embeds a Microsoft Azure API key useful for speech recognition, which malicious actors could exploit.

  • Awesome Screen Recorder & Screenshot (ID: nlipoenfbbikpbjkfpfillcgkoblgpmj): This tool exposes an Amazon Web Services (AWS) access key, risking unauthorized uploads to the developer’s account.

  • Microsoft Editor (ID: gpaiobkfhnonedkhhfjpmhdalgeoebfa): This extension shows a telemetry key that logs user data, raising further privacy concerns.

These vulnerabilities highlight just how easily a few lines of improperly protected code can threaten the integrity of an entire service.

Recommendations for Developers

Experts like Guo stress that developers must adopt best practices to safeguard user data. He recommends transitioning to HTTPS for data transmission, securely managing credentials on a backend server, and regularly updating secrets to minimize security risks.

The findings indicate that popular extensions, even those boasting hundreds of thousands of installations, can suffer from seemingly minor security oversights that place user data in jeopardy.

Conclusion: Awareness and Vigilance

Users should exercise caution regarding these extensions and consider removing them until the developers can fix the insecure HTTP calls. As many users gravitate toward familiar brands, it’s crucial to remain vigilant. High Installation numbers do not necessarily equate to robust security practices.

The overarching takeaway is clear: users must scrutinize the encryption protocols and data-sharing practices of the tools they use. Only then can they ensure their information remains secure and private.


Interested in learning more about online safety? Follow us on Twitter and LinkedIn for more insights and updates.

spot_img

Related articles

Recent articles

Climate Disruption and Digitalization Force Evolution in Industrial Cybersecurity for Critical Infrastructure

Climate Disruption and Digitalization Force Evolution in Industrial Cybersecurity for Critical Infrastructure The industrial threat landscape is increasingly shaped by extreme weather events, which are...

Gulf Bank Strengthens Shareholder Value with 9% Cash Dividends and 5% Bonus Shares Approval

Gulf Bank Strengthens Shareholder Value with 9% Cash Dividends and 5% Bonus Shares Approval Gulf Bank convened its Ordinary General Assembly on Saturday, achieving a...

Boursa Kuwait Strengthens ESG Reporting with Updated 2026 Disclosure Guide for Listed Companies

Boursa Kuwait Strengthens ESG Reporting with Updated 2026 Disclosure Guide for Listed Companies Kuwait City: Boursa Kuwait has unveiled an updated version of its Environmental,...

Fitch Affirms Qatar’s ‘AA’ Rating, Strengthens Outlook Amid LNG Production Surge

Fitch Affirms Qatar's 'AA' Rating, Strengthens Outlook Amid LNG Production Surge Fitch Ratings has reaffirmed Qatar's Long-Term Foreign-Currency (LTFC) Issuer Default Rating (IDR) at 'AA'...