Is "Brightery Mega Marketing" on Chrome Web Store Safe to Install?

[email protected] · chrome · v2.2.32.0

Brightery Mega Marketing is a complete tool to manage your digital marketing, managing paid ads, Email newsletters 7 days trial version is available, create an account at brightery.com and just login using your account credentials.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

8094 security findings detected across all analyzers

Chrome extension requesting 7 permissions

Severity Breakdown

0
Critical
4713
High
3381
Medium
0
Low
0
Info

Finding Categories

550
Malware Signatures
450
Obfuscation

YARA Rules Matched

16 rules(550 hits)
postinstall file download postinstall network communication postinstall file manipulation postinstall crypto operations postinstall obfuscation postinstall system command postinstall persistence mechanism postinstall registry modification DebuggerStatementsShouldNotBeUsed NoUseWeakRandom LocalStorageShouldNotBeUsed SQLInjection NoUseEval postinstall environment access credential env files OriginsNotVerified

Requested Permissions

7 permissions
http://*/*
Dangerous
https://*/*
Dangerous
cookies

Read and modify cookies on all sites

High
activeTab
Medium
background
Low
https://*/
Low
https://www.facebook.com/
Low

About This Extension

Brightery Mega Marketing is a complete tool to manage your digital marketing, managing paid ads, Email newsletters 7 days trial version is available, create an account at brightery.com and just login using your account credentials.

Detailed Findings

1000 total

YARA Rule Matches

16 rules

AI Security Report

AI Security Analysis: Brightery Mega Marketing

Analysis generated: 2025-12-12T16:58:22+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 3b9e2d46-88ce-520c-8726-a9ad17c09b38
Type chrome
Version
Users 195
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "Brightery Mega Marketing" extension represents a CRITICAL security risk and should be immediately blocked or removed from all corporate environments. The extension exhibits an extraordinarily high volume of obfuscated code (over 4,000 instances) and contains malware signatures, resulting in a maximum risk score of 100/100. The unverified publisher status, combined with the presence of heavy obfuscation in localization files—a common technique for hiding malicious payloads—strongly suggests this extension is either malicious or severely compromised.

Threat Assessment

1. Excessive Obfuscation (Primary Threat)

The most alarming characteristic of this extension is the sheer volume of "unicode_heavy" obfuscation findings (4,132 instances).

  • Location: The findings are concentrated in Angular localization files (e.g., js/angular/i18n/angular-locale_ckb-iq.js).
  • Context: Legitimate localization files typically contain standard strings (dates, currency formats) and do not require heavy Unicode obfuscation.
  • Threat: Attackers often hide malicious JavaScript payloads inside localization or image files (steganography or encoding) to evade static analysis scanners. The "unicode_heavy" pattern suggests the code is trying to mask its true intent by using non-standard character encoding.

2. Malware Indicators

The analysis flagged 591 malware-signature matches. While specific signature names aren't listed in the top 30, the sheer quantity indicates that the code shares significant structural or behavioral similarities with known malware families. This is not a case of a single false positive; it is a systemic issue with the codebase.

3. Publisher Trust

  • Unverified Publisher: The developer is unverified and unnamed.
  • Low User Count: With only 195 users, there is no "safety in numbers" or community vetting.
  • Generic Description: "Brightery Marketing tools" is vague, which is often a trait of malicious extensions designed to look like utility software.

4. Network Activity

There are 23 network findings. While low in number compared to obfuscation, in the context of the other findings, these likely represent Command and Control (C2) beacons or exfiltration paths hidden within the obfuscated logic.

Risk Justification

The 100/100 Risk Score is fully justified and accurate.

  • Severity of Findings: The presence of nearly 600 malware signatures and over 4,000 obfuscation points makes this extension indistinguishable from active malware.
  • Anomalous Behavior: The specific location of the obfuscation (Angular locale files) is highly irregular for legitimate software development. It indicates a deliberate attempt to hide code in files that developers and scanners usually ignore.
  • Lack of Accountability: The absence of a verified publisher means there is no entity to hold accountable for security practices.

Key Findings

  • Massive Code Obfuscation: 4,132 instances of obfuscation, specifically "unicode_heavy," concentrated in js/angular/i18n/ files. This is a strong indicator of a hidden payload.
  • High Volume of Malware Signatures: 591 matches for known malware patterns, suggesting the codebase is either malicious or heavily infected.
  • Suspicious File Modification: The modification of standard library files (Angular i18n locales) to include heavy obfuscation is a classic supply chain attack or evasion technique.
  • Zero Trust Score: The combination of an unverified publisher, low user count, and critical findings results in a 0/100 trust score.

Recommendations

  1. IMMEDIATE REMOVAL: Uninstall this extension from all devices immediately.
  2. BLOCKLIST: Add the Extension UUID (3b9e2d46-88ce-520c-8726-a9ad17c09b38) to the organization's browser blocklist (e.g., via Google Workspace or Group Policy).
  3. INCIDENT RESPONSE: If this extension was found on a device with access to sensitive data (PII, financial data, credentials), initiate incident response procedures to check for data exfiltration.
  4. CREDENTIAL ROTATION: As a precaution, rotate session tokens and passwords for users who had this extension installed, as the obfuscated code may contain keylogging or cookie-stealing capabilities.

Mitigation Strategies

There is no safe way to use this extension.

The risk level is too high to mitigate while keeping the software installed. The obfuscation is so pervasive that it renders the code un-auditable, and the malware signatures suggest active malicious intent. Users requiring marketing tools should seek alternatives from verified publishers with established reputations on the Chrome Web Store.

Confidence Assessment

Confidence Level: 80% (High)

  • Supporting Evidence: The volume and specific type of obfuscation (Unicode heavy in locale files) is a very high-fidelity indicator of malicious intent. Legitimate developers do not obfuscate locale files in this manner.
  • Caveats: The remaining 20% uncertainty lies in the lack of dynamic analysis data (runtime behavior) in the provided report. However, the static analysis findings alone are sufficient to classify this as a critical threat. The "malware-signature" count is high enough that even if 50% were false positives, the remaining matches would still constitute a critical risk.

Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions