Ublock Origin Edge Chromium

Adblocking extensions with more than 300,000 active users have been surreptitiously uploading user browsing data and tampering with users’ social media accounts thanks to malware its new owner introduced a few weeks ago, according to technical analyses and posts on Github.

Hugo Xu, developer of the Nano Adblocker and Nano Defender extensions, said 17 days ago that he no longer had the time to maintain the project and had sold the rights to the versions available in Google’s Chrome Web Store. Xu told me that Nano Adblocker and Nano Defender, which often are installed together, have about 300,000 installations total.

Four days ago, Raymond Hill, maker of the uBlock Origin extension upon which Nano Adblocker is based, revealed that the new developers had rolled out updates that added malicious code.

The first thing Hill noticed the new extension doing was checking if the user had opened the developer console. If it was opened, the extension sent a file titled 'report' to a server at https://def.dev-nano.com/. “In simple words, the extension remotely checks whether you are using the extension dev tools—which is what you would do if you wanted to find out what the extension is doing,” he wrote.

The most obvious change end users noticed was that infected browsers were automatically issuing likes for large numbers of Instagram posts, with no input from users. Cyril Gorlla, an artificial intelligence and machine learning researcher at the University of California in San Diego, told me that his browser liked more than 200 images from an Instagram account that didn’t follow anyone. The screenshot to the right shows some of the photos involved.

Apr 06, 2020 uBlock Origin is now maintained in the core repository As the new Microsoft Edge is based on Chromium, development of uBlock Origin for Microsoft is done entirely in the core repository, as Microsoft Edge's extension platform is the same as Chromium's. Nano Defender can only protect either Nano Adblocker or uBlock Origin, and will prioritize Nano Adblocker. Get Nano Defender Pro for Edge. Get Nano Defender for Chrome or Chromium This listing is no longer under my control. If you are using uBlock Origin, there are a few extra installation steps to follow. Built atop uBlock Origin, AdNauseam quietly clicks on every blocked ad, registering a visit on ad networks' databases. As the collected data gathered shows an omnivorous click-stream, user tracking, targeting and surveillance become futile. Make Microsoft Edge your own with extensions that help you personalize the browser and be more productive. The one in the Microsoft Store is the fork by nikrolls which is a very old build (latest stable is v1.15.24 compiled in April, 2018) and is forked to be compatible with Microsoft Edge (EdgeHTML) engine so I'm not sure if it's supposed to even work with the new Edge Dev and Canary builds which are based on Chromium/Blink and not Edge/EdgeHTML?

Nano Adblocker and Nano Defender aren’t the only extensions that have been reported to tamper with Instagram accounts. User Agent Switcher, an extension that had more than 100,000 active users until Google removed it earlier this month is reported to have done the same thing.

Many Nano extension users in this forum reported that their infected browsers were also accessing user accounts that weren’t already open in their browsers. This has led to speculation that the updated extensions are accessing authentication cookies and using them to gain access to the user accounts. Hill said he reviewed some of the added code and found that it was uploading data.

“Since the added code was able to collect request headers in real-time (through websocket connection I guess), this means sensitive information such as session cookies could be leaked,” he wrote in a message. “I am not a malware expert so I can't come up with *all* that is possible when having real-time access to request headers, but I do get that it's really bad.”

Other users reported that sites other than Instagram were also being accessed and tampered with, in some cases, even when the user hadn’t accessed the site, but these claims couldn’t immediately be verified.

Alexei, an Electronic Frontier Foundation senior staff technologist who works on the Privacy Badger extension, has been following the discussions and provided me with the following synopsis:

The gist is that the Nano extensions were updated to surreptitiously upload your browsing data in a remotely configurable way. Remotely configurable means that there was no need to update the extensions to modify the list of websites whose data would be stolen. In fact, the list of websites is unknown at this time as it was remotely configured. There are many reports of users' Instagram accounts being affected, however.

Evidence collected to date shows that the extensions are covertly uploading user data and gaining unauthorized access to at least one website, in violation of Google terms of service and quite possibly applicable laws. Google has already removed the extensions from the Chrome Web Store and issued a warning that they aren’t safe. Anyone who had either of these extensions installed should remove them from their machines immediately.


Nano Adblocker and Nano Defender are available in the extension stores hosted by both Firefox and Microsoft Edge. Xu and others say that neither of the extensions available in these other locations are affected. The caveat is that Edge can install extensions from the Chrome Web Store. Any Edge users who used this source are infected and should remove the extensions.

The possibility that the extensions may have uploaded session cookies means that anyone who was infected should at a minimum fully log out of all sites. In most cases this should invalidate the session cookies and prevent anyone from using them to gain unauthorized access. Truly paranoid users will want to change passwords just to be on the safe side.

The incident is the latest example of someone acquiring an established browser extension or Android app and using it to infect the large user base that already has it installed. It’s hard to provide actionable advice for preventing this kind of abuse. The Nano extensions weren’t some fly-by-night operation. Users had every reason to believe they were safe until, of course, that was no longer the case. The best advice is to routinely review the extensions that are installed. Any that are no longer of use should be removed.

Block Ads, Pop Ups, and Trackers. Browse faster.

Ublock Origin Edge Chromium Browser

Your web experience has never been this fast and efficient.

Ublock Origin Edge Chromium Not Working

no ads
no sneaky tracking
no overhead
Get ublock for edge
Add uBlock
How to Block Ads
Introduction to Adware
The Threat of a Cyber Attack

uBlock is the ideal ad blocker for stopping unwanted ads and speeding up your browsing experience. uBlock will block annoying ads, obnoxious video ads, and intrusive trackers. It also functions as a pop up blocker and helps protect against some forms of malware. If you’re looking for an ad blocker to remove ads from your Internet experience and help improve your overall online security, then uBlock is the tool for you. Read More


One of the original ad blockers and one of the most popular tools for blocking ads, uBlock can be found for Chrome, Firefox, Safari and for your Mac computer. We stay up-to-date with the latest online advertising ad formats and techniques to ensure that we continue to block ads and stay a step ahead of sites that use trackers and adware to follow your around online. The uBlock ad blocker is constantly working to make your browsing experience as painless and safe as possible.

If you’re looking for a simple, effective advertisement blocker, look no further. uBlock is easy to install and even easier to use. So even if you’re not very tech-savvy you can get it set up in no time. Just follow our easy-to-understand uBlock Guide and start browsing adfree in minutes. The best uBlock feature is the fact that it’s completely free. Just install, configure, and go.