When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

With the extensions above though, this wasnt the case at all.

The way in which the hackers gained control over these extensions is also a bit different.

A hacker typing quickly on a keyboard

So what was the purpose behind gaining control of these extensions in the first place?

Whether its extensions or apps, hackers and other cybercriminals arent going to stop spreading malicious software anytime soon.

A woman looking at a smartphone while using a laptop

Chrome browser on laptop

Green skull on smartphone screen.

Galaxy S25 Plus held in the hand.

iPhone 16 Pro shown held in hand

A woman�s hands holding a smartphone with a lock symbol on it, in front of a laptop that also has a lock symbol on it.

Reddit

Switch 2 and Mario

Switch 2 console and accessories

iPhone 17 Pro case renders

NYTimes Connections