![]() According to the report, these extensions were being purportedly widely used in India, USA and Europe. McAfee had reported about several malicious Chrome Extensions in March which, once installed, may redirect users to phishing sites, insert Affiliate IDs and modify legitimate websites to gather personally identifiable information (PII) of users. Only, the fake version is said to track all the websites visited by the user and misuses them for malicious activities. Earlier this year, the security firm said this extension cloned the original Netflix Party extension that allows groups of people to watch Netflix shows together at the same time. ![]() Netflix Party extension, which is mentioned in the report, has been flagged by McAfee before. As per the Bangalore based start-up, the extension does not “send user data to its server without any user facing functionality,” and that “no one can find a single incidence of using set cookies for affiliate purposes,” against it. In an email sent to, FlipShope said that it was “not involved in any malicious activities,” and have said that they have sent a notice to McAfee. They have a combined install base of over 1,400,000.Įcom Shopping Solutions LLP (FlipShope) has denied the allegations against it. The five extensions that McAfee mentions in the report include Netflix Party, Netflix Party 2, FlipShope – Price Tracker, Full Page Screenshot Capture – Screenshotting and AutoBuy Flash Sales. “They do this so that they can insert code into eCommerce websites being visited,” the report says, adding “this action modifies the cookies on the site so that the extension authors receive affiliate payment for any items purchased.” EU mandate: USB-C to charge AirPods and Mac accessories by 2024
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |