


By infecting millions of users, the developers could rake in a tidy amount of profit. The extensions were redirecting users’ Google searches to third-party search engines, likely in return for a small affiliate fee. In addition to finding more affected extensions, Palant was able to confirm what the malicious code was doing (or at least had done in the past).

These were only the ones that Palant found in a sample of approximately 1,000 extensions. These include Autoskip for Youtube, Crystal Ad block, Brisk VPN, Clipboard Helper, Maxi Refresher, Quick Translation, Easyview Reader view, Zoom Plus, Base Image Downloader, Clickish fun cursors, Maximum Color Changer for Youtube, Readl Reader mode, Image download center, Font Customizer, Easy Undo Closed Tabs, OneCleaner, and Repeat button, though it is likely that there are other infected extensions. However yesterday, he disclosed 17 more browser extensions that use the same trick to download and run a JavaScript file. Palant had no way of confirming what the malicious code in PDF Toolbox did when he first discovered it. 5.13K subscribers Subscribe 12K views 2 years ago About Windows 10 In this video I explain how to download, install and use PDF Creator and start creating PDF files.
