What is up with AVs installing firefox extensions without my permission?

Discussion in 'other anti-virus software' started by mattdocs12345, Mar 18, 2018.

  1. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    I tried 4 AVs on my laptop. 3/4 installed a browser extension, in each case I was unable to uninstall the browser extension within firefox. I was never asked about permission to add anything into Firefox. Just straight out surprise.
     
  2. ance

    ance formerly: fmon

    Joined:
    May 5, 2013
    Posts:
    1,359
    Kaspersky? :D I hate it too.
     
  3. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    Yeah when you give admin permission to a windows installer it does whatever the hell it wants.
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yes, I don't like that also. At least they are not enabled by default, but I would still prefer not to install it at all.
     
  5. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    I am not going to mention by name in here because it will turn into A vs B thread. But I think most users here can figure it out from experience :0

    That is not excuse for supposed reputable antivirus company to install extension without my permission.

    There is another issues...1/3 of those antivirus' left a running service after using build in uninstaller. This is unprofessional.
     
  6. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,920
    welcome to the real world of antivirus snakeoil behavior. and some pay money for this crap...
    but - it does not matter which one of them. kaspersky, avira, avast, avg and more Put them all in a sack and flog it: you'll always hit the right one!
     
  7. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Don't believe Emsisoft does that kind of stuff
     
  8. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Must say this is the first time I have heard of this one.

    Many AV's inject .dlls into the browser to filter activities. As such, don't know why they would have any desire to fool around with plug-ins/add-ons/etc..
     
  9. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Pick your top performing brands and try them in virtual machine. Honestly I wouldn't mind it so much if there was a way to uninstall extension or stop certain behavior. But it seems like the only way to get rid of an extension or turn off certain activity is by completely uninstalling an antivirus. And then there are still some processes left running. It's a mess.... So now i have to get another software to uninstall an antivirus. To me this kind of behavior is equivalent to spyware and us downloading anti-spyware to get rid of spyware. See the problem here?

    Now my AV#4 (let's just call it like that to avoid promoting one over another), works just as I need it to work. No extensions in the browser, uninstalls cleanly, lets me decide what i want to run and what I don't.
     
  10. mekelek

    mekelek Registered Member

    Joined:
    May 5, 2017
    Posts:
    518
    Location:
    Hungary
    Kaspersky asks you nicely if you want it tho.
     
  11. Azure Phoenix

    Azure Phoenix Registered Member

    Joined:
    Nov 22, 2014
    Posts:
    1,560
    Can't you simply disable the extension?

    Does AV#4 scan traffic (http and/or https)?
     
  12. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Disabling is not good enough when i didn't give permission for the extension to be there in the first place.
    Yes
     
  13. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    AV's that scan SSL/TLS traffic don't need browser extensions to do so. They either use a network adapter mini-port filter driver to do so or more recently, use the Windows Filtering Platform. In other words, the traffic is being scanned before it even hits the browser.
     
  14. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Last edited: Mar 18, 2018
  15. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yes, but installs it no mater what you choose.
     
  16. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Good read. But one has to think about risks vs benefits. In other words what is the risk that malicious script will bypass my browser protection and infect me versus what is the risk that a malware will use AV to bypass browser protection and infect my computer. Throw in noscript in there or ublock origin with script blocking...
     
  17. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I think the point should be the AV's should give the user the option, and just force it in. I am just glad EAM doesn't do any of that stuff. And yes, Noscript really allows you do lock down the browser.
     
  18. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Yup. Hence, the first 3 AVs got uninstalled... even thou they have better detection rates than my AV#4.
     
  19. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I'd don't see any reason not to name them. Your not making it up so why not
     
  20. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Fair enough:
    AV #1,2,3 = Kasperky , Bitdefender
    AV #4 = ESET

    AV#3*, I counted for some reason Bitdefender twice.

    Kaspersky
    - Installed Firefox extension without letting me know
    - Turning off Web Protection did not uninstall the extension in Firefox
    - I was able to disable Firefox extension
    - I was able to completely remove Kasperky services with windows uninstaller

    Bitdefender
    - Installed Firefox extension without letting me know
    - Turning off Web Protection did not uninstall the extension in Firefox
    - I was able to disable Firefox extension
    - I was left behind with running Bitdefender service after using windows uninstaller

    Kaspersky/Bitdefender
    One of them offered HotSpot Shield as a "secure" VPN service, HotSpot shield is known to be a privacy nightmare.
    Both have lost trust with me due to the behavior as above. Any software that installs extensions, tool bars, etc without my permission in my eyes is a PUP. Even worst when it leaves running services after using its build in uninstaller. Both companies lost my trust and I won't be doing business with them. Offering hotpsot shield as secure VPN does not help their cause either.

    ESET
    - Did not install any Firefox extension
    - I did not try uninstalling ESET to see if all services are removed
     
  21. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yes, Kaspersky installs Secure connection component that gives you VPN functionality. Luckily it can be removed from Add/Remove programs, but I would prefer if it was possible to not install it at all.

    Here is also a statement from Kaspersky posted here: https://forum.kaspersky.com/index.p...ed-by-kaspersky-accused-of-snooping-on-users/
    I have no wish to use their VPN service.
     
  22. m0unds

    m0unds Registered Member

    Joined:
    Nov 12, 2015
    Posts:
    219
    It doesn't bother me one way or another because the user ultimately has control over whether or not the extension is enabled.

    I'd rather have web filtering handled by a browser extension that communicates with the product than have the product MITM HTTPS connections (even if some sites are excluded, I don't care, it's not a good practice, imo). I trust the security model of a modern browser more than the code quality of most AV products.

    I suppose it also should be mentioned that Chrome/Chromium will be blocking all third party code injection by release 72
     
    Last edited: Mar 19, 2018
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.