Browser vendors act as the gatekeepers to the world’s data. As such, their actions or inactions can impact billions of users around the globe. As stewards of the web, browser vendors have the ability to review, audit, approve, and disapprove browser extensions. We uncovered eight extensions involved in the DataSpii’s unprecedented data collection, two of them being Hover Zoom and SpeakIt!. We dug a bit further and discovered that Hover Zoom and SpeakIt! have been in the public eye for quite some time.
We present a selection of articles and discussion threads that have reported on the controversial extensions since 2013:
- October 8, 2012: Archive.org’s first snapshot of a Chrome Web Store URL containing Hover Zoom’s extension ID (nonjdcjchghhkdoolnlbekcfllmednbl).
- January 5, 2013: Archive.org’s first snapshot of a Chrome Web Store URL containing SpeakIt!’s Chrome extension ID (pgeolalilifpodheeocdmbhehgnkkbak).
- March 5, 2013: gHacks Technology News reported on what the author described as the “evil” nature of Hover Zoom. The author cites one user who observed POST requests to a Czech media company. The author later updated the article to state that “Hover Zoom is no longer available.”
- December 17, 2013. A reddit thread titled “HoverZoom for Chrome is infected with malware!” was created. Over the next five months, 1,400 comments were posted in the thread.
- December 26, 2013: : Martin Brinkmann of gHacks Technology News wrote an article entitled “Hoverzoom’s Malware controversy, and Imagus alternative.” Brinkmann wrote, “Not only did the extension receive hundreds of 1 star ratings on the Chrome Web Store, it was also removed from it by its author.”
- January 19, 2014: Oleg Anashkin forked his own version, Hover Zoom+. A github repo which lists its owner as “Oleg Anashkin” describes Hover Zoom+ as malware-free.
- January 20, 2014: The popular tech blog lifehacker.com reported on Hover Zoom’s tracking behavior.
- November 19, 2015: Brady Dale of The Observer reported on a Detectify cybersecurity report, disclosing how several browser extensions were involved in tracking and harvesting of URLs. Two of the extensions in the Detectify 2015 report included Hover Zoom, and SpeakIt!. The referenced Detectify report cites how the collected data was being made available through online analytics services. Such services described in the report are similar to those provided by Company X. The Detectify report was later updated to state that several extensions, including Hover Zoom, were removed from the Chrome Web Store.
- November 20, 2015: Brady Dale of The Observer reported that FairShare Labs was one of the companies responsible for the data collection.
- March 31, 2016: Security researcher Michael Weissbacher reported that SpeakIt! was one of many extensions spying on eight million users.
- On November 4, 2016: The popular tech blog MakeUseOf.com listed both Hover Zoom and SpeakIt! as among the “10 Chrome Extensions You Should Uninstall Right Now.”
- April 13, 2017: The Electronic Frontier Foundation (EFF) published a report titled “Spying on Students.” EFF surveyed students and school administrators on the software and applications in use in the classroom. Survey respondent(s) reported “SpeakIt” as one of the apps, software, and services in use.
- December 4, 2017: Security researcher, Michael Weissbacher, mentioned SpeakIt! in a publication titled “Ex-ray: Detection of History-Leaking Browser Extensions.”
- March 2, 2018: PC Magazine listed Hover Zoom as one of “[t]he 100 Best Free Google Chrome Extensions.”
- July 9, 2018: In a 2018 IEEE European Symposium on Security and Privacy, security researchers, Aggarwal, et al., labeled Hover Zoom and SpeakIt! as spying extensions in a publication titled “I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions.”
- July 2, 2019: We disclosed our findings to Google. Soon after Hover Zoom and and SpeakIt! were removed from the Chrome Web Store. They were also remotely deactivated from impacted users’ browsers.
- July 18, 2019: The DataSpii report detailed how Hover Zoom and SpeakIt! employ a dilatory tactic, an effective maneuver for eluding detection.
Years of headlines, scholarly exposés, reddit posts, and numerous removals from the Chrome Web Store failed to stop Hover Zoom or SpeakIt!. Google removed the extensions from the Chrome Web Store shortly after our disclosure on July 2, 2019, but will it return again? The consequences of unscrupulous data collection practices are too dire to be dismissed or ignored by browser vendors.
Re #16, Chrome web store now provides “Hover Zoom+” (note the “plus” sign)—https://chrome.google.com/webstore/detail/hover-zoom%2B/pccckmaobkjjboncdfnnofkonhgpceea
I assume this is meant to replace the previous Hover Zoom extension they discontinued. I wonder if Hover Zoom+ is safe to use.
Hi Donna, Great question. Six years ago, Oleg Anashkin forked his own version of Hover Zoom called Hover Zoom+. A github repo which lists its owner as “Oleg Anashkin” describes Hover Zoom+ as malware-free. (See #6.)
Thanks, Sam! Can you confirm that this means that we can use Hover Zoom+ without harm or data exposure? (I need assurance as I’m not a techie, just a simple home user.)
Hi Donna, My initial review of Hover Zoom+ does not show data collection. I’ll keep an eye on it to see if they employ any dilatory tactics; however, so far, I don’t see any issues.
Leave a comment