Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 3 July, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Google Chrome Extentions Can Be Fingerprinted to Track Users Digitally

Web developer z0ccc shared a new fingerprinting site called 'Extension Fingerprints'.

by Guru Writer
June 21, 2022
in Cyber Bites
New Linux Malware Dubbed “Almost Impossible” To Detect Found
Share on FacebookShare on Twitter

A researcher has created a website that uses your installed Google Chrome extensions to generate a fingerprint (or tracking hash) of your device that can be used to track you digitally.

Digital fingerprints can be used based on various characteristics of a device connecting to a website, including GPU performance, installed Windows applications, hardware configuration, a device’s screen resolution, and installed fonts. It is then possible to track a device across websites using the same method.

Over the weekend, web developer ‘z0ccc’ shared a new fingerprinting site called ‘Extension Fingerprints’ that generates a tracking hash based on a browser’s installed Google Chrome extensions.

It is possible to declare certain assets as ‘web accessible resources’ that other extensions or web pages can access, when creating a Chrome browser extension.

These resources are typically image files, which are declared using the ‘web_accessible_resources’ property in a browser extension’s manifest file.

Disclosed in 2019, it is possible to use web-accessible resources to check for installed extensions and then generate a fingerprint of a visitor’s browser based on the combination of extensions found.

Z0ccc says, in order to prevent detection, that some extensions use a secret token that is required to access a web resource. The researcher has discovered a ‘Resource timing comparison’ method that can be used to detect if the extension is installed.

Z0ccc explained on the project’s GitHub page that, “resources of protected extensions will take longer to fetch than resources of extensions that are not installed. By comparing the timing differences you can accurately determine if the protected extensions are installed.”

To illustrate the method, z0ccc created an Extension Fingerprints website that will check a visitor’s browser for the existence of web-accessible resources in over 1000 popular extensions available on the Google Chrome Web Store. Some of the extensions identified by the site include uBlock, LastPass and Rakuten.

Based on the combination of installed extensions, the website will generate a hacking hash that can be used to track that particular browser.

Adding other characteristics to the fingerprinting model can further refine the fingerprint, making the hashes unique per user.

The Extensions Fingerprints site only works with Chromium browsers installing extensions from the Chrome Web Store. This method will work with Microsoft Edge, however it would need to be modified to use extension IDs from Microsoft’s extension store.

The method does not work with Mozilla Firefox add-ons as Firefox extension IDs are unique for ever browser instance.

Z0ccc’s tests showed that uBlock is the most common extension fingerprint installed.

Z0ccc said, “by far the most popular is having no extensions installed. As previously said I do not collect specific extension data but in my own testing it seems that having only uBlock installed is a common extension fingerprint.”

“Having 3+ detectable extensions installed seems to always make your fingerprint very unique.”

Extension Fingerprints has been released as an open-source React project on GitHub, allowing anyone to see how to query for the presence of installed extensions.

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Lookout Discovers Android Spyware Deployed in Kazakhstan

Next Post

Cato SASE Cloud Updated to Allow for Network-based Security

Recent News

A Vulnerability Management Program is Nothing Without Identity Risk Protection

A Vulnerability Management Program is Nothing Without Identity Risk Protection

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

A Research of Threat Actor Activity & Myths Busted by Cato Networks

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

July 1, 2022
Over a Decade in Software Security: What Have We learned?

Over a Decade in Software Security: What Have We learned?

July 1, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information