Browser extensions are the hidden attack surface that most people never think about. They run inside your browser with access to everything you do there — every page you visit, every form you fill out, every password you type. When an extension goes rogue, whether by design or after being acquired by a bad actor, it can harvest credentials, inject ads into every website you visit, hijack your search engine, or silently forward your browsing history to third parties.
The alarming part is that this happens through extensions that most people knowingly installed — they just didn't realize the extension was bought by a company with different intentions, or that the developer pushed a malicious update months after the original version earned five-star reviews.
How Legitimate Extensions Become Malicious
The most common path isn't a fake extension — it's a real extension that goes bad. Popular Chrome extensions with thousands of users are regularly acquired by marketing companies or adware distributors. The original developer sells to a new owner, who pushes an update that adds tracking, ad injection, or data collection. Users who installed the original trusted version automatically receive the malicious update. No warning, no prompt, no indication that ownership changed.
This happened with The Great Suspender (a popular tab manager), Nano Adblocker, and dozens of other historically trustworthy extensions. There's no complete protection — but knowing the pattern and auditing your extensions periodically significantly reduces your exposure.
Warning Signs of a Rogue Extension
- Ads appearing on websites that normally don't have them, or more ads than usual — especially pop-unders or injected banner ads
- Browser redirects — clicking a link sends you somewhere different first before arriving at the intended page
- Your default search engine changed without your input
- The browser is noticeably slower than it was, especially page loads
- New toolbar items or browser action buttons appeared that you didn't add
- Websites you visit "know" things about you that you didn't consciously share
- Unexpected password prompts for accounts you weren't logging into
How to Audit Your Extensions
Chrome/Edge: Open chrome://extensions (or
edge://extensions). You'll see every installed extension with its name,
description, and an icon. Review each one and ask: Do I remember installing this? Do I actively
use it? If either answer is no, it should be removed.
Firefox: Open about:addons and navigate to Extensions. Same
principle — review every entry.
Pay special attention to extensions you haven't touched in months. Inactive extensions still run in the background, consume resources, and if they've been acquired by a new owner in the meantime, may now be doing things you never agreed to.
Understanding Dangerous Permissions
Each extension requests specific permissions when installed — but most people click through these without reading them. The most powerful and potentially dangerous permission is:
"Read and change all your data on the websites you visit" — This is full access to everything in your browser. The extension can see passwords as you type them, read form submissions including credit card numbers, modify page content, and interject into any communication between you and any website. Some legitimate extensions need this (ad blockers, for example), but many don't. If an extension like a color picker, screenshot tool, or grammar checker requests this permission, ask why.
Also watch for:
- "Manage your downloads" — can trigger downloads of files to your computer
- "Access your location" — shares your location with the extension
- "Access clipboard" — can read everything you copy
- "Access browser history" — can see every site you've visited
In Chrome, go to the extension settings and click "Details" to see an extension's current permissions. You can revoke "site access" for extensions that request it but don't need it for their core function.
How to Remove a Suspicious Extension
In Chrome/Edge: click the extension's icon in the toolbar → Manage extension → Remove extension. Or in the extensions page, click the Remove button. In Firefox: Manage → click the three dots next to the extension → Remove.
After removing a suspicious extension, also:
- Check Settings → Search Engine — restore it to your preferred search engine if it was changed
- Check Settings → On Startup — remove any URLs you didn't set
- Clear your browser cache and cookies from the time period the extension was active
- If you entered passwords while the extension was installed, change those passwords
When Extensions Won't Uninstall
Some malicious extensions modify the browser's policies to prevent removal — the Remove button is grayed out and a message says "Installed by administrator." This happens when malware installs an extension through enterprise policy manipulation. Fix it:
Open chrome://policy in your browser. If you see policies you didn't set, they need
to be removed from the Windows registry. Press Win + R, type regedit. Navigate to:
Look for ExtensionInstallForcelist or other extension-related keys and delete them. Restart the browser — the extension should now be removable. Run a malware scan (Malwarebytes) after doing this, as forced extension policies indicate malware modified your system.
Building Safe Extension Habits
Practice these habits to minimize ongoing risk:
- Only install extensions from the official browser store — never from third-party websites
- Research an extension before installing: check the developer's reputation, read negative reviews, look at what permissions it requests
- Fewer extensions is better — each one is a potential attack surface
- Periodically review your extensions list: set a calendar reminder every few months
- Watch for update notifications — if an extension suddenly requests significantly more permissions after an update, that's a serious red flag. Click "Keep current settings" and investigate before accepting.
The safest browser is a browser with as few extensions as possible. Core recommendations that are genuinely trustworthy: uBlock Origin (ad blocking), Bitwarden (password manager if you use it), and perhaps one or two tools specific to your work. Everything beyond that carries risk. When in doubt, don't install it.
Extension security is one of those topics that doesn't get enough attention given how much access extensions have. A single rogue extension can silently compromise every login you make through your browser. Taking 10 minutes to audit what's installed, and being deliberate about what you add in the future, closes a significant security gap that most people leave wide open.