chrome

The AllBlock Chromium ad blocking extension has been found to be injecting hidden affiliate links that generate commissions for the developers.

This extension is still available on Chrome's Web Store and promotes itself as an ad blocker that focuses on YouTube and Facebook to prevent pop-ups and speed up browsing.

However, according to researchers at Imperva, the extension is actually conducting a deceptive ad-injection campaign that causes legitimate URLs to redirect to affiliate links controlled by the extension's developers.

Ad injection is the process of inserting advertisements or links into a web page that doesn't normally host them, allowing the scammers to make money from advertisements or redirect people to affiliate sites to earn commissions.

Ad injection process
Ad injection process
Source: Imperva

In August 2021, Imperva’s researchers discovered a set of previously unknown malicious domains distributing an ad injection script.

This malicious script would send legitimate URLs to a remote server and receive a list of redirection domains as a response. If a user clicks on an altered link, the user is redirected to a different page, typically, an affiliate link.

The ad-injecting script even features evasion techniques such as excluding large Russian search engines, clearing the debugging console every 100 ms, and active detection of initialized Firebug variables.

By taking a deeper look at AllBlock, Imperva's team found the script they were hunting for in "bg.js," which injects code into every new tab opened on the browser.

URL alteration code in the script
URL alteration code in the script
Source: Imperva

To inject the malicious script, the extension would connect to an URL at allblock.net, which would return a base64 encoded script that would be decoded and injected into the webpage.

URL change
Malicious encoded script injected by extension

The developers of the extension have added several innocuous objects and variables into the malicious JavaScript snippet in an attempt to obfuscate the code execution.

How the extension is promoted is currently unclear, and Imperva believes that the scammers may also utilize other extensions in this campaign. 

"We do not believe we found the origin of the attack that led us to this discovery, likely because of the way the script was injected. The script we first observed was injected via a script tag pointing to a remote server where the AllBlock extension injects the malicious code directly to the active tab, Imperva explains in the report.

This leads us to believe that there is a larger campaign taking place that may utilize different delivery methods and more extensions." - Imperva.

However, some IP and domain evidence attributes this extension to the Pbot campaign, which has been active since at least 2018.

This case is yet another reminder of the importance of choosing your browser extensions wisely and installing only the necessary ones.

In this case, AllBlock has excellent user reviews because its functionality as an adblocker has been properly implemented. Nonetheless, it introduces deception risks and confuses shoppers.

Update 15/10 - A Google spokesperson has reached out to inform us that the extension has been removed from the Chrome Web Store. 

Related Articles:

Block malvertising with $60 off AdGuard ad blocker

Keep out ads and snoops with $269 off a 3-year AdGuard Bundle

Mozilla Firefox can now secure access to passwords with device credentials

YouTube tests harder-to-block server-side ad injection in videos

Ad blocker users say YouTube videos are now skipping to the end