{"id":3696,"date":"2026-03-24T09:49:23","date_gmt":"2026-03-24T07:49:23","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=3686"},"modified":"2026-03-24T09:59:52","modified_gmt":"2026-03-24T07:59:52","slug":"extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes","title":{"rendered":"Extension Chrome compromise: plus de 1 million d&#8217;utilisateurs affect\u00e9s"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>Un nouvel incident de s\u00e9curit\u00e9 informatique attire l&#8217;attention sur les vuln\u00e9rabilit\u00e9s de l&#8217;\u00e9cosyst\u00e8me des extensions de navigateur. Une extension Chrome populaire, utilis\u00e9e pour sauvegarder des images dans diff\u00e9rents formats, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant, affectant plus d&#8217;un million d&#8217;utilisateurs \u00e0 l&#8217;\u00e9chelle mondiale.<\/p>\n\n\n\n<p>Dans cet article, vous d\u00e9couvrirez ce qui s&#8217;est pass\u00e9, comment l&#8217;attaque a fonctionn\u00e9, quels risques elle implique et comment vous pouvez vous prot\u00e9ger.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u00abSave Image as Type\u00bb \u00e9tait une extension Chrome populaire<\/h2>\n\n\n\n<p>L&#8217;extension \u00ab Save Image as Type \u00bb \u00e9tait un outil tr\u00e8s utilis\u00e9 par les utilisateurs de Chrome pour convertir rapidement des images de formats modernes comme WebP en formats plus courants, tels que JPG ou PNG. Sa popularit\u00e9 a augment\u00e9 avec l&#8217;adoption des formats modernes d&#8217;image, qui sont plus efficaces, mais pas toujours compatibles avec toutes les applications.<\/p>\n\n\n\n<p>Cet utilitaire apparemment banal a cependant attir\u00e9 l&#8217;attention des attaquants, qui ont profit\u00e9 de la grande base d&#8217;utilisateurs et de la confiance construite au fil du temps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment l&#8217;extension a \u00e9t\u00e9 compromise<\/h2>\n\n\n\n<p>Au lieu de cr\u00e9er une extension malveillante de z\u00e9ro, les hackers ont adopt\u00e9 une strat\u00e9gie plus subtile : ils ont achet\u00e9 l&#8217;extension au d\u00e9veloppeur original.<\/p>\n\n\n\n<p>Apr\u00e8s la reprise, ils ont introduit du code malveillant dans les mises \u00e0 jour ult\u00e9rieures. En pratique, les utilisateurs ont continu\u00e9 \u00e0 utiliser l&#8217;extension sans savoir qu&#8217;elle \u00e9tait devenue un outil d&#8217;attaque.<\/p>\n\n\n\n<p>Cette technique est de plus en plus courante en s\u00e9curit\u00e9 informatique, car elle exploite la confiance d\u00e9j\u00e0 existante dans les applications populaires.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ce que faisait le code malveillant introduit dans l&#8217;extension Chrome populaire<\/h2>\n\n\n\n<p>Le but principal de l&#8217;attaque n&#8217;\u00e9tait pas le vol direct de mots de passe ou de donn\u00e9es sensibles, mais la mon\u00e9tisation frauduleuse par la manipulation des liens d&#8217;affiliation.<\/p>\n\n\n\n<p><strong>Plus pr\u00e9cis\u00e9ment, l&#8217;extension:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>modifiait les liens d&#8217;affiliation sur des sites de commerce \u00e9lectronique comme Amazon ou d&#8217;autres magasins en ligne<\/li>\n\n\n\n<li>redirigeait le trafic des utilisateurs<\/li>\n\n\n\n<li>injectait du code dans les pages web visit\u00e9es<\/li>\n\n\n\n<li>g\u00e9n\u00e9rait des commissions ill\u00e9gales pour les attaquants<\/li>\n<\/ul>\n\n\n\n<p>Dans certains cas, l&#8217;extension chargeait en arri\u00e8re-plan des sites commerciaux par des iframes cach\u00e9es pour placer des cookies d&#8217;affiliation (\u00ab cookie stuffing \u00bb), sans que l&#8217;utilisateur ne s&#8217;en aper\u00e7oive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Impact sur les utilisateurs<\/h2>\n\n\n\n<p><strong>Bien que l&#8217;attaque n&#8217;ait pas vis\u00e9 directement des donn\u00e9es personnelles sensibles, l&#8217;impact ne doit pas \u00eatre sous-estim\u00e9:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>plus d&#8217;un million d&#8217;utilisateurs affect\u00e9s<\/li>\n\n\n\n<li>modification du comportement du navigateur sans consentement<\/li>\n\n\n\n<li>exposition potentielle \u00e0 d&#8217;autres risques de s\u00e9curit\u00e9<\/li>\n\n\n\n<li>pertes financi\u00e8res indirectes pour les entreprises et les affili\u00e9s<\/li>\n<\/ul>\n\n\n\n<p>De plus, l&#8217;extension a fonctionn\u00e9 sous cette forme compromise pendant plusieurs semaines, voire des mois, avant d&#8217;\u00eatre d\u00e9tect\u00e9e et supprim\u00e9e.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pourquoi les extensions de navigateur sont une cible attrayante<\/h2>\n\n\n\n<p>Les extensions Chrome ont un acc\u00e8s \u00e9tendu \u00e0 l&#8217;activit\u00e9 des utilisateurs, y compris aux pages visit\u00e9es et \u00e0 leur contenu. Cela les rend extr\u00eamement attrayantes pour les attaquants.<\/p>\n\n\n\n<p><strong>Selon les sp\u00e9cialistes, les hackers pr\u00e9f\u00e8rent de plus en plus:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>d\u00e9tourner des extensions existantes<\/li>\n\n\n\n<li>exploiter les comptes des d\u00e9veloppeurs<\/li>\n\n\n\n<li>introduire des mises \u00e0 jour malveillantes<\/li>\n<\/ul>\n\n\n\n<p>Cette approche est efficace car les utilisateurs ont tendance \u00e0 faire confiance aux applications d\u00e9j\u00e0 install\u00e9es.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment vous prot\u00e9ger des extensions malveillantes<\/h2>\n\n\n\n<p>Pour \u00e9viter de telles situations, il est important d&#8217;adopter quelques bonnes pratiques de s\u00e9curit\u00e9 :<\/p>\n\n\n\n<p><strong>1. V\u00e9rifiez r\u00e9guli\u00e8rement les extensions install\u00e9es<\/strong><\/p>\n\n\n\n<p>Supprimez toute extension que vous n&#8217;utilisez plus.<\/p>\n\n\n\n<p><strong>2. Faites attention aux autorisations<\/strong><\/p>\n\n\n\n<p>Si une extension demande acc\u00e8s \u00e0 tous les sites, analysez si cela est justifi\u00e9.<\/p>\n\n\n\n<p><strong>3. Surveillez le comportement des extensions<\/strong><\/p>\n\n\n\n<p>Des redirections \u00e9tranges ou des modifications de pages peuvent \u00eatre des signes de compromission.<\/p>\n\n\n\n<p><strong>4. Installez des extensions uniquement \u00e0 partir de sources s\u00fbres<\/strong><\/p>\n\n\n\n<p>M\u00eame alors, v\u00e9rifiez les avis et l&#8217;historique du d\u00e9veloppeur.<\/p>\n\n\n\n<p><strong>5. D\u00e9sinstallez imm\u00e9diatement les extensions compromises<\/strong><\/p>\n\n\n\n<p>Dans ce cas, les utilisateurs sont conseill\u00e9s de supprimer l&#8217;extension et de v\u00e9rifier les \u00e9ventuels effets sur le navigateur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Toute extension Chrome peut devenir un risque majeur <\/h2>\n\n\n\n<p>L&#8217;incident \u00ab Save Image as Type \u00bb met en \u00e9vidence un risque majeur dans <a href=\"https:\/\/computershop.eu\/blog\/fr\/les-fausses-extensions-ai-de-chrome-qui-peuvent-voler-vos-donnees\" target=\"_blank\" rel=\"noreferrer noopener\">l&#8217;utilisation des extensions de navigateur<\/a> : m\u00eame les applications de confiance peuvent devenir dangereuses du jour au lendemain.<\/p>\n\n\n\n<p>Dans un contexte num\u00e9rique de plus en plus complexe, la s\u00e9curit\u00e9 ne d\u00e9pend plus seulement des logiciels utilis\u00e9s, mais aussi de la vigilance de l&#8217;utilisateur. La v\u00e9rification r\u00e9guli\u00e8re des extensions et l&#8217;adoption de bonnes pratiques de s\u00e9curit\u00e9 peuvent faire la diff\u00e9rence entre une exp\u00e9rience en ligne s\u00e9curis\u00e9e et une exp\u00e9rience compromise.<\/p>\n\n\n\n<p>Sources : <a href=\"https:\/\/www.techspot.com\/news\/111737-popular-chrome-extension-save-image-type-hijacked-impacting.html\" target=\"_blank\" rel=\"noreferrer noopener\">techspot.com<\/a>, <a href=\"https:\/\/www.xda-developers.com\/google-featuring-chrome-extension-months-malicious\/\" target=\"_blank\" rel=\"noreferrer noopener\">xda-developers.com<\/a><\/p>\n\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fextension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes&amp;t=Extension+Chrome+compromise%3A+plus+de+1+million+d%26%238217%3Butilisateurs+affect%C3%A9s+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fextension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes&amp;text=Extension+Chrome+compromise%3A+plus+de+1+million+d%26%238217%3Butilisateurs+affect%C3%A9s+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fextension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F03%2FCopy-of-VPN-300x168.png&amp;description=Un+nouvel+incident+de+s%C3%A9curit%C3%A9+informatique+attire+l%27attention+sur+les+vuln%C3%A9rabilit%C3%A9s+de+l%27%C3%A9cosyst%C3%A8me+des+extensions+de+navigateur.+Une+extension+Chrome+populaire%2C+utilis%C3%A9e+pour+sauvegarder+des+images+dans+diff%C3%A9rents+formats%2C+a+%C3%A9t%C3%A9+compromise+et+transform%C3%A9e+en+un+outil+malveillant%2C+affectant+plus%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fextension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes&amp;title=Extension+Chrome+compromise%3A+plus+de+1+million+d%26%238217%3Butilisateurs+affect%C3%A9s&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=Un+nouvel+incident+de+s%C3%A9curit%C3%A9+informatique+attire+l%27attention+sur+les+vuln%C3%A9rabilit%C3%A9s+de+l%27%C3%A9cosyst%C3%A8me+des+extensions+de+navigateur.+Une+extension+Chrome+populaire%2C+utilis%C3%A9e+pour+sauvegarder+des+images+dans+diff%C3%A9rents+formats%2C+a+%C3%A9t%C3%A9+compromise+et+transform%C3%A9e+en+un+outil+malveillant%2C+affectant+plus%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fextension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+Extension+Chrome+compromise%3A+plus+de+1+million+d%26%238217%3Butilisateurs+affect%C3%A9s&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fextension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Un nouvel incident de s\u00e9curit\u00e9 informatique attire l&#8217;attention sur les vuln\u00e9rabilit\u00e9s de l&#8217;\u00e9cosyst\u00e8me des extensions de navigateur. Une extension Chrome populaire, utilis\u00e9e pour sauvegarder des images dans diff\u00e9rents formats, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant, affectant plus &hellip; <a href=\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":3692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[103],"tags":[13493,13496,10448,13499,2588,13562,13565,13505,9028],"class_list":["post-3696","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouvelles","tag-code-malveillant","tag-extension-chrome","tag-extension-de-navigateur","tag-extensions-chrome-dangereuses","tag-logiciel","tag-malware-chrome-2026-fr","tag-save-image-as-type-hack-fr","tag-securite-du-navigateur","tag-securite-en-ligne"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Extension Chrome compromise: plus de 1 million d&#039;utilisateurs affect\u00e9s - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment une extension Chrome populaire, \u00ab Save Image as Type \u00bb, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extension Chrome compromise: plus de 1 million d&#039;utilisateurs affect\u00e9s - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment une extension Chrome populaire, \u00ab Save Image as Type \u00bb, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-24T07:49:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T07:59:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"Extension Chrome compromise: plus de 1 million d&#8217;utilisateurs affect\u00e9s\",\"datePublished\":\"2026-03-24T07:49:23+00:00\",\"dateModified\":\"2026-03-24T07:59:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\"},\"wordCount\":822,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"keywords\":[\"code malveillant\",\"extension Chrome\",\"extension de navigateur\",\"extensions Chrome dangereuses\",\"logiciel\",\"malware Chrome 2026\",\"Save Image as Type hack\",\"s\u00e9curit\u00e9 du navigateur\",\"s\u00e9curit\u00e9 en ligne\"],\"articleSection\":[\"Nouvelles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\",\"url\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\",\"name\":\"Extension Chrome compromise: plus de 1 million d'utilisateurs affect\u00e9s - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"datePublished\":\"2026-03-24T07:49:23+00:00\",\"dateModified\":\"2026-03-24T07:59:52+00:00\",\"description\":\"D\u00e9couvrez comment une extension Chrome populaire, \u00ab Save Image as Type \u00bb, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png\",\"width\":1600,\"height\":896,\"caption\":\"Extensie Chrome compromis\u0103: peste 1 milion de utilizatori afecta\u021bi - riscuri, impact \u0219i solu\u021bii\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extension Chrome compromise: plus de 1 million d&#8217;utilisateurs affect\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Extension Chrome compromise: plus de 1 million d'utilisateurs affect\u00e9s - Refurbished Computers - ComputerShop.EU","description":"D\u00e9couvrez comment une extension Chrome populaire, \u00ab Save Image as Type \u00bb, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes","og_locale":"en_US","og_type":"article","og_title":"Extension Chrome compromise: plus de 1 million d'utilisateurs affect\u00e9s - Refurbished Computers - ComputerShop.EU","og_description":"D\u00e9couvrez comment une extension Chrome populaire, \u00ab Save Image as Type \u00bb, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant.","og_url":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-03-24T07:49:23+00:00","article_modified_time":"2026-03-24T07:59:52+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"Extension Chrome compromise: plus de 1 million d&#8217;utilisateurs affect\u00e9s","datePublished":"2026-03-24T07:49:23+00:00","dateModified":"2026-03-24T07:59:52+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes"},"wordCount":822,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","keywords":["code malveillant","extension Chrome","extension de navigateur","extensions Chrome dangereuses","logiciel","malware Chrome 2026","Save Image as Type hack","s\u00e9curit\u00e9 du navigateur","s\u00e9curit\u00e9 en ligne"],"articleSection":["Nouvelles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes","url":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes","name":"Extension Chrome compromise: plus de 1 million d'utilisateurs affect\u00e9s - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","datePublished":"2026-03-24T07:49:23+00:00","dateModified":"2026-03-24T07:59:52+00:00","description":"D\u00e9couvrez comment une extension Chrome populaire, \u00ab Save Image as Type \u00bb, a \u00e9t\u00e9 compromise et transform\u00e9e en un outil malveillant.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","width":1600,"height":896,"caption":"Extensie Chrome compromis\u0103: peste 1 milion de utilizatori afecta\u021bi - riscuri, impact \u0219i solu\u021bii"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/fr\/extension-chrome-compromise-plus-de-1-million-dutilisateurs-affectes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Extension Chrome compromise: plus de 1 million d&#8217;utilisateurs affect\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/03\/Copy-of-VPN.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/3696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=3696"}],"version-history":[{"count":1,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/3696\/revisions"}],"predecessor-version":[{"id":3703,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/3696\/revisions\/3703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/3692"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=3696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=3696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=3696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}