Security Alert: Top Chrome Extensions Expose API Keys and User Data

Published:

spot_img

Security Concerns Surrounding Popular Google Chrome Extensions

Published: June 5, 2025 | Author: Ravie Lakshmanan
Categories: Browser Security / Online Safety


Introduction to the Risks

Cybersecurity experts have raised alarms about numerous widely used Google Chrome extensions that pose significant privacy and security threats. Many of these extensions are sending data over unencrypted HTTP, which can make user information vulnerable to interception.

Unencrypted Data Transmission

Yuanjing Guo, a security researcher from Symantec’s Security Technology and Response team, emphasizes the issue: "Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP." This exposes a variety of information, such as browsing domains, machine IDs, details about the operating system, and usage analytics—all in plaintext.

The absence of encryption not only compromises user privacy but also opens the door to potential adversary-in-the-middle (AitM) attacks. These attacks can occur on public networks, allowing malicious individuals to intercept and modify this sensitive data. The consequences of these vulnerabilities could be severe and far-reaching.

Identified Vulnerable Extensions

A list of problematic extensions has been discovered, revealing the specific risks associated with each.

  • SEMRush Rank (ID: idbhoeaiokcojcgappfigpifhpkjgmab) and PI Rank (ID: ccgdboldgdlngcgfdolahmiilojmfndl): Both extensions make calls to "rank.trellian[.]com" over plain HTTP.

  • Browsec VPN (ID: omghfjlpggmjjaagoclmmobgdodcjboh): This extension uses HTTP when calling an uninstallation URL, potentially exposing user information during the removal process.

  • MSN New Tab (ID: lklfbkdigihjaaeamncibechhgalldgl) and MSN Homepage, Bing Search & News (ID: midiombanaceofjhodpdibeppmnamfcj): These transmit unique machine identifiers and other sensitive info to "g.ceipmsn[.]com" using HTTP.

  • DualSafe Password Manager & Digital Vault (ID: lgbjhdkjmpgjgcbcdlhkokkckpjmedgc): This extension makes HTTP requests carrying details about the user’s browser language and extension version.

Although it appears no credentials or passwords are leaked, Guo points out that the use of unencrypted requests significantly undermines the credibility of password managers regarding their security protocols.

Hard-Coded Secrets in Extensions

In addition to the insecure data transmissions, Symantec has identified a troubling trend where certain extensions contain hard-coded API keys and tokens within their JavaScript code. This poses an additional layer of vulnerability, as these keys could be exploited by attackers for malicious purposes.

Examples include:

  • Online Security & Privacy (ID: gomekmidlodglbbmalcneegieacbdmki) and other extensions that expose a Google Analytics 4 (GA4) API secret, potentially allowing attackers to corrupt data metrics.

  • Equatio – Math Made Digital (ID: hjngolefdpdnooamgdldlkjgmdcmcjnc): This extension embeds a Microsoft Azure API key useful for speech recognition, which malicious actors could exploit.

  • Awesome Screen Recorder & Screenshot (ID: nlipoenfbbikpbjkfpfillcgkoblgpmj): This tool exposes an Amazon Web Services (AWS) access key, risking unauthorized uploads to the developer’s account.

  • Microsoft Editor (ID: gpaiobkfhnonedkhhfjpmhdalgeoebfa): This extension shows a telemetry key that logs user data, raising further privacy concerns.

These vulnerabilities highlight just how easily a few lines of improperly protected code can threaten the integrity of an entire service.

Recommendations for Developers

Experts like Guo stress that developers must adopt best practices to safeguard user data. He recommends transitioning to HTTPS for data transmission, securely managing credentials on a backend server, and regularly updating secrets to minimize security risks.

The findings indicate that popular extensions, even those boasting hundreds of thousands of installations, can suffer from seemingly minor security oversights that place user data in jeopardy.

Conclusion: Awareness and Vigilance

Users should exercise caution regarding these extensions and consider removing them until the developers can fix the insecure HTTP calls. As many users gravitate toward familiar brands, it’s crucial to remain vigilant. High Installation numbers do not necessarily equate to robust security practices.

The overarching takeaway is clear: users must scrutinize the encryption protocols and data-sharing practices of the tools they use. Only then can they ensure their information remains secure and private.


Interested in learning more about online safety? Follow us on Twitter and LinkedIn for more insights and updates.

spot_img

Related articles

Recent articles

Top 10 Highlights You Missed This Week: UAE Student Regulations, Dubai Road Projects, Wynn Al Marjan Resort Insights, and Real Estate Trends

Weekly Highlights: Major Developments in the UAE This week brings a range of significant updates across various sectors in the UAE. From education reforms to...

Epworth HealthCare Publishes Statement: No System Breach After Global Ransomware Claims

Epworth HealthCare Addresses Ransomware Claims: No Data Breach Detected Epworth HealthCare, a prominent private hospital group based in Victoria, Australia, has responded to serious allegations...

Belkin Launches Exciting New Gaming Accessories and Powerful Charging Solutions

Belkin Enters the Gaming Arena: A New Chapter in Accessory Innovation A Legacy of Innovation Belkin, a name synonymous with consumer electronics excellence for over 40...

Dark Web Dealer Returns to Court Following Bomb Scare and Gun Arrest

Legal Troubles Mount for Jesse Korff in Florida Background: A History of Crime Jesse Korff, a 30-year-old man with a criminal record, has once again drawn...