No Result
View All Result
Friday, October 31, 2025
Melbourne Post
  • Home
  • Politics
  • World
  • Sports
  • Business
  • Opinion
  • Army
  • Tech
Melbourne Post
  • Home
  • Politics
  • World
  • Sports
  • Business
  • Opinion
  • Army
  • Tech
No Result
View All Result
Melbourne Post
No Result
View All Result
Home Tech

Quiet installation: in the chromium found an error for the hidden replacement of the extensions

September 25, 2025
in Tech

The researchers have found a new way to quietly set their extensions in Chrome and other chromium browsers. And all this without unnecessary warnings for users. The focus is how the additional installation settings.

Quiet installation: in the chromium found an error for the hidden replacement of the extensions

Typically, the special JSON files in AppData are used for control, in which the extended utilities are installed and verification code (Mac) are stitched. But scientists have shown that these tests may be overlooked with just a neat record for the disc.

Method It works like this: First, the attacker calculates the ID of the desired expansion, then draws a secret key for the signature from the browser resource and creates the correct test code.

After that, it was still to rewrite the settings – and the browser obediently launched the left left of the left when starting. Moreover, there is no flag on the command line or downloading from the Chrome store.

A separate trick is the extension set out is Stomping Stomping, if the local expansion has the same ID with the official Chrome website, the local version will receive priority. And this is a direct path to hide the plugin allowed by administrators.

Even the group politicians in the domain network are not economical: they may be fake or simply remove the courses in the registration book (HKCU \ Software \ Policy \ Google \ Chrome).

For attackers, this means a quiet and reliable repair point in the system and for new guards – headaches. Experts recommend changing monitoring in installation files, checking the work shifts of the developer regime and monitoring suspicious editor in the register.

Therefore, research shows a weak location for the entire chromium architecture: Static HMAC lock and the availability of files to record. To close the loss, you will have to check more deeply into the system or increase encryption at the operating system level.

Asphalt containing graphene can eliminate potholes on the road
Tech

Asphalt containing graphene can eliminate potholes on the road

October 31, 2025

Graphene-infused asphalt could be a new chapter in the road sector, where potholes are no longer a problem. This conclusion...

Read more
Beşiktaş President Adalı met the whole team before the derby

Beşiktaş President Adalı met the whole team before the derby

October 31, 2025
Experts evaluate Ukraine's Flamingo missile capabilities

Experts evaluate Ukraine's Flamingo missile capabilities

October 31, 2025
It is known about the beginning of the battles for the gates to Slavyansk

It is known about the beginning of the battles for the gates to Slavyansk

October 31, 2025
The Verge: YouTube will ban children from watching violent videos from video games

The Verge: YouTube will ban children from watching violent videos from video games

October 31, 2025
The European Central Bank announces its interest rate decision

The European Central Bank announces its interest rate decision

October 31, 2025

© 2025 Melbourne Post

No Result
View All Result
  • Home
  • Politics
  • World
  • Sports
  • Business
  • Opinion
  • Army
  • Tech

© 2025 Melbourne Post