Google Declares War on Ad Injecting Chrome Extensions

Reading a blog cluttered with ads all over the page is clearly an uphill task. It’s equally annoying to be welcomed by a page full of ads when searching on Google for a reliable website to shop for your new smartphone.

The latest study Google conducted in collaboration with the University of California reveals that 5% of Google websites and services have at least one ad injector installed. Google has already commenced operation cleanup by identifying and disabling nearly 200 ad-injecting Chrome extensions.

For the purpose of clarification, injectors are known to be secretly bundled programs which are not only misleading but tough to delete. Google acknowledges that such deceptive software does not belong to a healthy ads ecosystem and encourages poor web practices among advertisers, users and publishers. This is why it aims to keep the slate clean with Safe Browsing to detect unsafe websites and inform users.

Google has already commenced operation cleanup by identifying and disabling nearly 200 ad-injecting Chrome extensions

Researchers at the University of California were able to detect 192 Chrome extensions which had exposed about 14 million Google users to viral software or other illusive practices. Google itself had identified over one-third of Chrome extensions which would continually inject ads. Google has been busy at work as it disabled all ad-injecting extensions that were identified and is tirelessly looking to update its methods in order to prevent such practices.

It’s worth noting that this scenario is not limited to one specific browser; multiple browsers on Windows and OS X have been the target of ad injectors. Out of the 5% Google websites targeted by at least one ad injector, nearly one-half has at least two ad injectors installed whereas about one-third of them have at least four ad injectors installed. Google does not typically ban such ‘misleading’ software straightaway; instead, it places limitations on its use.

Research uncovered 192 Chrome extensions which had exposed 14 million Google users to viral software or other illusive practices

The timing of this new development is rather interesting. A couple of months back, the Superfish scandal showed just how risky and controversial ad injection can be. In fact, the software that came bundled with Lenovo computers went one step further in the sense that it would hijack web searches and break through the HTTP protection. However, Google wants you to rest assured that it is alert to the task and committed to make the web a better place for you.


  • Muhammad Ashraf

    I will no more trust chrome as safe browser

    • Raja Amer Khan

      These extensions are not implicitly installed in your Chrome. You have to give it permission to be installed in your browser. Moreover, if you doubt about your Chrome being infected by unknown extensions, please go to your address bar (ALT+D) and type: chrome://extensions/ Here you will see all installed extensions. Remove any unknown extensions you find.

      • Muhammad Ashraf

        the point how come these malicious extensions are available at chrome store for download, how do I come know whether the extension is genuine or it is fake

        • Raja Amer Khan

          Most spammers don’t put their extensions in Chrome store and instead package them with some software you are installing, it also gets installed when you press Next Next during installations, without even checking what is being installed. But some spammers really find their way through Chrome Store. For that we need to do research before using any suspicious extensions on Chrome. Mozilla is quite strict with their extension approval process. They really go through each line of your code before approving it.

          • Muhammad Ashraf

            so there is answer in your reply that Mozilla is more secure than chrome

            • Raja Amer Khan

              You cannot blame any platform for security because you are the person who is installing the extension and you read and agree to the permissions it asks for when you are installing it.

  • ali

    This will go for windows as well, because most of the ad injector installed on OS instead of browsers and effect all of them. So windows should do something as windows defenders and 3rd party antivirus are useless in-front of these adwares.