Google announced today five new rules for the Chrome Web Store, the portal where users go to download Chrome extensions. The new rules are primarily meant to prevent malicious extensions from reaching the Web Store, but also to reduce the amount of damage they do client-side.
More security news
No more extensions with obfuscated code
The first new rule that Google announced today is in regards to code readability. According to Google, starting today, the Chrome Web Store will no longer allow extensions with obfuscated code.
Obfuscation is the deliberate act of creating source code that is difficult for humans to understand.
This should not be confused with minified (compressed) code. Minification or compression refers to the practice of removing whitespace, newlines, or shortening variables for the sake of performance. Minified code can be easily de-minified, while deobfuscating obfuscated code takes a lot of time
According to Google, around 70 percent of all the malicious Chrome extensions the company blocks use code obfuscation.
Since code obfuscation also adds a performance hit, Google argues there are no advantages in using code obfuscation at all, hence the reason to ban such extensions altogether. Developers have until January 1st, 2019 to remove any obfuscated code from their extension.
New extensions review process
The second rule Google put into place today is a new review process for all extensions submitted to be listed on the Chrome Web Store.
Google says that all extensions that request access to powerful browser permissions will be subjected to something that Google called an “additional compliance review.”
Preferably, Google would prefer if extensions were “narrowly-scoped” –asked for only the permissions they need to do their job, without requesting access to extra permissions as a backup for future features.
Furthermore, Google also said that an additional compliance review will also be triggered if extensions use remotely hosted code, a sign that developers want the ability to change the code they deliver to users at runtime, possibly to deploy malicious code after the review has taken place. Google said such extensions would be subjected to “ongoing monitoring.”
The third new rule will be supported by a new feature that will land in Chrome 70, set to be released this month.
With Chrome 70, Google says users will have the ability to restrict extensions to certain sites only, preventing potentially dangerous extensions from executing on sensitive pages, such as e-banking portals, web cryptocurrency wallets, or email inboxes.
Furthermore, Chrome 70 will also be able to restrict extensions to a user click, meaning the extension won’t execute on a page until the user clicks a button or option in Chrome’s menu.
Required 2-step verification
The fourth new rule is not for extensions per-se, but for extension developers. Due to a large number of phishing campaigns that have taken place over the past year, starting with 2019, Google will require all extension developers to use one of the two-step verification (2SV) mechanism that Google provides for its accounts (SMS, authenticator app, or security key).
With 2SV enabled for accounts, Google hopes to prevent cases where hackers take over developer accounts and push malicious code to legitimate Chrome extensions, damaging both the extension and Chrome’s credibility.
Just today ZDNet reported on one of these latest phishing campaigns that have targeted developers of Chrome extensions.
New Manifest v3
The fifth and final list is a new guideline for the creation of manifest.json files. These files are used to hold instructions for how Chrome should treat and interact with the extension.
Version 3 of this new Manifest guideline will be introduced in 2019, and Google wants extension developers to be ready in advance of the rollout.
The changes to Manifest v3 are related to the new features added in Chrome 70, and more precisely to the new mechanisms granted to users for controlling the extension permissions.
Google’s new Web Store rules come to bolster the security measures that the browser maker has taken to secure Chrome in recent years, such as prohibiting the installation of extensions hosted on remote sites, or the use of out-of-process iframes for isolating some of the extension code from the page the extension runs on.
- Alphabet launches VirusTotal Enterprise
- Google open-sources internal tool for finding font-related security bugs
- French cyber-security agency open-sources CLIP OS, a security hardened OS
- Cloudflare ends CAPTCHA challenges for Tor users
- UK watchdog has not issued any GDPR data breach-related fines yet
- Hackers using fake ‘Flash Player’ Google Chrome extension to steal credit card data
- Currys offer £59 Google Home Mini bundle when you use this code
- Hamas uses TV coded messages for attacks, Israel alleges
- US Students Share Mock ‘Passes' Allowing Them to Use Racial Slur (PHOTO)
- Why you are no longer allowed to report lost property to the police
- Google Password Checkup tool reveals if YOUR login has been stolen by hackers
- Google launches new password and account protection tools for Safer Internet Day
- Google moved USD 23 bn to tax haven Bermuda in 2017
- Google's AI will be so good it knows what you need before you ask
- Google Chrome users risk being HACKED by sneaky scam that quietly ‘infects’ your gadgets