Windows malware uses PowerShell to inject malicious extension into Chrome

Home/Compromised, Internet Security, Malicious extension, Malware, Security Advisory, Tips/Windows malware uses PowerShell to inject malicious extension into Chrome

Windows malware uses PowerShell to inject malicious extension into Chrome

The malware is designed to install malicious extension(s) onto browsers. Currently, two distinct variants of ChromeLoader have been detected – one targeting Windows Operating Systems and another – Mac Operating Systems.

Chrome Loader

ChromeLoader is a browser hijacker that modifies its victims’ browser settings and redirects user traffic to advertisement websites. 

Once downloaded and executed, the .ISO file is extracted and mounted as a drive on the victim’s machine. Within this ISO is an executable used to install ChromeLoader.


An optimal disc image (ISO) is a disk image containing everything written to an optical disc. If someone copied a DVD or CD-ROM, they may end up with an ISO. With the right software, these files can be mounted and read as if the device was reading from a physical disc.

Finally , ChromeLoader makes use of a PowerShell command to load in a Chrome extension from a remote resource. PowerShell then removes the scheduled task and the victim is none the wiser that their browser has been compromised. At this point, search results cannot be trusted and bogus entries will be displayed to the user.

Using PowerShell and extensive obfuscation is uncommon for adware and browser hijackers, but it is standard for information-stealing programs, spyware, and other malware. However, it is not unlikely that ChromeLoader is still in development and will be updated with additional harmful functionalities. Regardless, ChromeLoader still poses significant threats in its current form.

As Bleeping Computer say, users of macOS are also at risk from this attack. Instead of ISO, attackers use DMG (Apple Disk Image) files, which is a more common format on that OS.

File Hash

  • b5299e2413104b4b034ea8eeca0c9c74
  • d6c317db29bb1ae07393e907d85d6fc5
  • e3419bc93be8f385714d0970f0175d17

Recommendation to avoid malicious extension

  • In Chrome, Click the More icon, then More Tools -> Extensions. From there, you can check what’s installed, what is active or disabled, along with additional information about all extensions present.
  • Keeping your security software up to date and running regular scans helps prevent this kind of attack. Always run a scan for the downloaded file.

Reference :

Follow us for more, Facebook, Twitter, LinkedIn and Instagram

By | 2022-06-01T11:34:35+05:30 June 1st, 2022|Compromised, Internet Security, Malicious extension, Malware, Security Advisory, Tips|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!