http://www.imaging-resource.com/news/2013/12/18/popular-chrome-image-viewing-plugin-hoverzoom-infected-with-malware

"The HoverZoom extension appears to be injecting malware scripts into every page you visit. On a brief look over the scripts they appear to be storing information regarding the websites you visit along with data from specific fields on the page. The scripts query the malware site and download any required targeted scripts for the website you are viewing."

It's up to you if you continue using this... If not, look at changing your passwords for sites you've visited in the last few days. The malware code appeared in version 4.27 which released on the 17th of December.

1 decade ago*

Comment has been collapsed.

I don't use chrome so I wonder what's the process of getting your addon/extension on the chrome store?
Shouldn't there be a guy looking over the stuff you put together and confirm whether the code is clean or not?

1 decade ago
Permalink

Comment has been collapsed.

I guess there is an automated system, but it must fail to catch some things.

Apparently Hoverzoom had a problem a few months back where any Amazon links you clicked were turned into affiliate links for the developer or something...

1 decade ago
Permalink

Comment has been collapsed.

Closed 1 decade ago by PhantomLord.