![]() ![]() Simply copy the executable file (ChromeCacheView.exe) to any folder you like, and run it.Īfter you run it, the main window displays the list of files currently stored in the cache of the default Google Chrome user. This utility works on any version of Windows, starting from Windows 2000, and up to Windows /10/11.ĬhromeCacheView doesn't require any installation process or additional DLL files.The cache folder of Google Chrome is located under \Local Settings\Application Data\Google\Chrome\User Data\Default\Cache You can easily select one or more items from the cache list, and then extract the files to another folder, or MZCookiesView - Cookies Manager For Firefox Web BrowsersĬhromeCacheView is a small utility that reads the cache folder of Google Chrome Web browser,Īnd displays the list of all files currently stored in the cache.įor each cache file, the following information is displayed: URL, Content type, File size, Last accessed time,Įxpiration time, Server name, Server response, and more.IECacheView - Internet Explorer Cache Viewer.ChromeCookiesView - View / delete cookies of Chrome Web browser on Windows. ![]() MZCacheView - Cache Viewer for Firefox Web browser.Anyone who still has the extensions installed should deactivate or uninstall them. Google said that the reported extensions have now been removed from the Chrome Store. It basis this theory on the suspiciously low number of reviews on the Chrome Web Store and the fact that the number of people who encountered the malicious activity didn't align with the number of installs.Īvast confirmed that the extensions' final payload appears to be adware that spams people with unwanted ads, along with a search results hijacker that displays sponsored links, paid search results, and potentially malicious links. The cybersecurity giant discovered other similar extensions, taking the total to 32 and the number of installs to 75 million.Īvast did add the caveat that while that number is alarmingly high, the install counts may have been artificially inflated. They had a combined user count of 55 million and included Autoskip for YouTube (9 million active users), Soundboost (6.9 million), and Crystal Ad block (6.8 million).Īvast reported the extensions to Google after it confirmed they contained malicious code. He explained the code was designed to activate 24 hours after the extension was installed, with its likely intention being the injection of ads.Ī couple of weeks after discovering the code in the PDF Toolbox extension, Palant wrote in a follow-up article that he had found 18 malicious browser extensions using similar code. Palant wrote that the code allows the "serasearchtopcom" website to inject arbitrary JavaScript code into all websites that users of the extension visit. The company has just removed 32 malicious extensions from the Chrome Web Store that appear to have been installed a combined 75 million times.Īs is often the way in these cases, the extensions were able to hide their hidden code from users by performing their intended functions, reports BleepingComputer.Ĭybersecurity researcher Wladimir Palant previously wrote that he had discovered obfuscated code in the PDF Toolbox extension for Google Chrome, which had a Chrome Web Store rating of 4.2 and more than 2 million users. In brief: It's not just the Play Store where Google has to deal with malicious software sneaking past its safeguards. ![]()
0 Comments
Leave a Reply. |