{"id":3694,"date":"2026-03-24T09:49:23","date_gmt":"2026-03-24T07:49:23","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=3686"},"modified":"2026-03-24T09:49:23","modified_gmt":"2026-03-24T07:49:23","slug":"compromised-chrome-extension-over-1-million-users-affected","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected","title":{"rendered":"Compromised Chrome extension: over 1 million users affected"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>A new cybersecurity incident draws attention to vulnerabilities in the browser extension ecosystem. A popular Chrome extension, used for saving images in various formats, has been compromised and turned into a malicious tool, affecting over 1 million users globally.<\/p>\n\n\n\n<p>In this article, you will find out what happened, how the attack worked, what risks it involves, and how you can protect yourself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u201cSave Image as Type\u201d was a popular Chrome extension<\/h2>\n\n\n\n<p>The \u201cSave Image as Type\u201d extension was a widely used tool by Chrome users to quickly convert images from modern formats like WebP to more common formats such as JPG or PNG. Its popularity grew with the adoption of modern image formats, which are more efficient but not always compatible with all applications.<\/p>\n\n\n\n<p>However, this seemingly trivial utility caught the attention of attackers, who took advantage of its large user base and the trust built over time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How the extension was compromised<\/h2>\n\n\n\n<p>Instead of creating a malicious extension from scratch, hackers adopted a more subtle strategy: they acquired the extension from the original developer.<\/p>\n\n\n\n<p>After the takeover, they introduced malicious code in subsequent updates. Essentially, users continued to use the extension without knowing that it had become an attack tool.<\/p>\n\n\n\n<p>This technique is increasingly common in cybersecurity, as it exploits existing trust in popular applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What the malicious code introduced into the popular Chrome extension did<\/h2>\n\n\n\n<p>The main purpose of the attack was not direct theft of passwords or sensitive data, but fraudulent monetization through the manipulation of affiliate links.<\/p>\n\n\n\n<p><strong>Specifically, the extension:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>modified affiliate links on e-commerce sites like Amazon or other online stores<\/li>\n\n\n\n<li>redirected user traffic<\/li>\n\n\n\n<li>injected code into visited web pages<\/li>\n\n\n\n<li>generated illegal commissions for attackers<\/li>\n<\/ul>\n\n\n\n<p>In some cases, the extension loaded commercial sites in the background via hidden iframes to place affiliate cookies (\u201ccookie stuffing\u201d), without the user noticing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Impact on users<\/h2>\n\n\n\n<p><strong>Although the attack did not directly target sensitive personal data, the impact should not be underestimated:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>over 1 million users affected<\/li>\n\n\n\n<li>modification of browser behavior without consent<\/li>\n\n\n\n<li>potential exposure to other security risks<\/li>\n\n\n\n<li>indirect financial losses for companies and affiliates<\/li>\n<\/ul>\n\n\n\n<p>Moreover, the extension operated in this compromised form for several weeks or even months before being detected and removed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why browser extensions are an attractive target<\/h2>\n\n\n\n<p>Chrome extensions have extensive access to user activity, including visited pages and their content. This makes them extremely attractive to attackers.<\/p>\n\n\n\n<p><strong>According to specialists, hackers are increasingly preferring:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>hijacking existing extensions<\/li>\n\n\n\n<li>exploiting developer accounts<\/li>\n\n\n\n<li>introducing malicious updates<\/li>\n<\/ul>\n\n\n\n<p>This approach is effective because users tend to trust already installed applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to protect yourself from malicious extensions<\/h2>\n\n\n\n<p>To avoid such situations, it is important to adopt some good security practices:<\/p>\n\n\n\n<p><strong>1. Periodically check installed extensions<\/strong><\/p>\n\n\n\n<p>Remove any extension you no longer use.<\/p>\n\n\n\n<p><strong>2. Pay attention to permissions<\/strong><\/p>\n\n\n\n<p>If an extension requests access to all websites, analyze if it is justified.<\/p>\n\n\n\n<p><strong>3. Monitor extension behavior<\/strong><\/p>\n\n\n\n<p>Strange redirects or page modifications can be signs of compromise.<\/p>\n\n\n\n<p><strong>4. Install extensions only from secure sources<\/strong><\/p>\n\n\n\n<p>Even then, check reviews and developer history.<\/p>\n\n\n\n<p><strong>5. Immediately uninstall compromised extensions<\/strong><\/p>\n\n\n\n<p>In this case, users are advised to remove the extension and check for any effects on the browser.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Any Chrome extension can turn into a major risk<\/h2>\n\n\n\n<p>The \u201cSave Image as Type\u201d incident highlights a major risk in <a href=\"https:\/\/computershop.eu\/blog\/the-fake-ai-extensions-in-chrome-will-steal-your-data\" target=\"_blank\" rel=\"noreferrer noopener\">using browser extensions<\/a>: even trusted applications can become dangerous overnight.<\/p>\n\n\n\n<p>In an increasingly complex digital context, security no longer depends only on the software used, but also on user vigilance. Periodically checking extensions and adopting good security practices can make the difference between a secure and a compromised online experience.<\/p>\n\n\n\n<p>Sources: <a href=\"https:\/\/www.techspot.com\/news\/111737-popular-chrome-extension-save-image-type-hijacked-impacting.html\" target=\"_blank\" rel=\"noreferrer noopener\">techspot.com<\/a>, <a href=\"https:\/\/www.xda-developers.com\/google-featuring-chrome-extension-months-malicious\/\" target=\"_blank\" rel=\"noreferrer noopener\">xda-developers.com<\/a><\/p>\n\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcompromised-chrome-extension-over-1-million-users-affected&amp;t=Compromised+Chrome+extension%3A+over+1+million+users+affected+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcompromised-chrome-extension-over-1-million-users-affected&amp;text=Compromised+Chrome+extension%3A+over+1+million+users+affected+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcompromised-chrome-extension-over-1-million-users-affected&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F03%2FCopy-of-VPN-300x168.png&amp;description=A+new+cybersecurity+incident+draws+attention+to+vulnerabilities+in+the+browser+extension+ecosystem.+A+popular+Chrome+extension%2C+used+for+saving+images+in+various+formats%2C+has+been+compromised+and+turned+into+a+malicious+tool%2C+affecting+over+1+million+users+globally.+In%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcompromised-chrome-extension-over-1-million-users-affected&amp;title=Compromised+Chrome+extension%3A+over+1+million+users+affected&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=A+new+cybersecurity+incident+draws+attention+to+vulnerabilities+in+the+browser+extension+ecosystem.+A+popular+Chrome+extension%2C+used+for+saving+images+in+various+formats%2C+has+been+compromised+and+turned+into+a+malicious+tool%2C+affecting+over+1+million+users+globally.+In%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcompromised-chrome-extension-over-1-million-users-affected\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+Compromised+Chrome+extension%3A+over+1+million+users+affected&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcompromised-chrome-extension-over-1-million-users-affected\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>A new cybersecurity incident draws attention to vulnerabilities in the browser extension ecosystem. A popular Chrome extension, used for saving images in various formats, has been compromised and turned into a malicious tool, affecting over 1 million users globally. In &hellip; <a href=\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":3692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[101],"tags":[13473,13465,13469,13467,10425,13463,9895,13449,2584],"class_list":["post-3694","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-browser-security","tag-chrome-extension","tag-chrome-malware-2026","tag-dangerous-chrome-extensions","tag-extension-de-navegador-en","tag-malicious-code","tag-online-safety","tag-save-image-as-type-hack","tag-software-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compromised Chrome extension: over 1 million users affected - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"Find out how a popular Chrome extension, \u201cSave Image as Type,\u201d was compromised and turned into a malicious tool.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compromised Chrome extension: over 1 million users affected - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"Find out how a popular Chrome extension, \u201cSave Image as Type,\u201d was compromised and turned into a malicious tool.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-24T07:49:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"Compromised Chrome extension: over 1 million users affected\",\"datePublished\":\"2026-03-24T07:49:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\"},\"wordCount\":598,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"keywords\":[\"browser security\",\"Chrome extension\",\"Chrome malware 2026\",\"dangerous Chrome extensions\",\"extensi\u00f3n de navegador\",\"malicious code\",\"online safety\",\"Save Image as Type hack\",\"software\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\",\"url\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\",\"name\":\"Compromised Chrome extension: over 1 million users affected - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"datePublished\":\"2026-03-24T07:49:23+00:00\",\"description\":\"Find out how a popular Chrome extension, \u201cSave Image as Type,\u201d was compromised and turned into a malicious tool.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"width\":1600,\"height\":896,\"caption\":\"Extensie Chrome compromis\u0103: peste 1 milion de utilizatori afecta\u021bi - riscuri, impact \u0219i solu\u021bii\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compromised Chrome extension: over 1 million users affected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compromised Chrome extension: over 1 million users affected - Refurbished Computers - ComputerShop.EU","description":"Find out how a popular Chrome extension, \u201cSave Image as Type,\u201d was compromised and turned into a malicious tool.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected","og_locale":"en_US","og_type":"article","og_title":"Compromised Chrome extension: over 1 million users affected - Refurbished Computers - ComputerShop.EU","og_description":"Find out how a popular Chrome extension, \u201cSave Image as Type,\u201d was compromised and turned into a malicious tool.","og_url":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-03-24T07:49:23+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"Compromised Chrome extension: over 1 million users affected","datePublished":"2026-03-24T07:49:23+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected"},"wordCount":598,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","keywords":["browser security","Chrome extension","Chrome malware 2026","dangerous Chrome extensions","extensi\u00f3n de navegador","malicious code","online safety","Save Image as Type hack","software"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected","url":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected","name":"Compromised Chrome extension: over 1 million users affected - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","datePublished":"2026-03-24T07:49:23+00:00","description":"Find out how a popular Chrome extension, \u201cSave Image as Type,\u201d was compromised and turned into a malicious tool.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","width":1600,"height":896,"caption":"Extensie Chrome compromis\u0103: peste 1 milion de utilizatori afecta\u021bi - riscuri, impact \u0219i solu\u021bii"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/compromised-chrome-extension-over-1-million-users-affected#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Compromised Chrome extension: over 1 million users affected"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/3694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=3694"}],"version-history":[{"count":0,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/3694\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/3692"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=3694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=3694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=3694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}