Is "AdGuard AdBlocker" on Firefox Add-ons Safe to Install?

Adguard Software Ltd · firefox · v5.1.139

AdGuard ad blocker effectively blocks all types of ads on all web pages, even on Facebook, YouTube, and others! What AdGuard ad blocker does: Blocks all ads: video ads (including YouTube video ads), rich media advertising, unwanted pop-ups, banners and text ads (including Facebook advertisements); Speeds up page loading and saves bandwidth, thanks to the missing ads and pop up windows; Blocks many spyware, adware, and dialer installers; Protects your privacy by blocking common third-party tracking systems; Protects you from malware and phishing. How can AdGuard ad blocker protect your privacy? Just enable Tracking Protection filter in AdGuard settings. It completely removes all forms of tracking from the Internet. AdGuard has one of the largest tracker filters containing more than 5,000 rules. How to remove social media with AdGuard? Tired of all the «Like» buttons and similar widgets infesting all of your frequented web pages? Just enable AdGuard "Social media filter" and forget about them. How can AdGuard ad blocker protect you from online threats? At the moment we’ve got more than 2,000,000 harmful websites on record. AdGuard can block domains known to spread malware, protecting your computer against viruses, Trojan horses, worms, spyware, and adware. AdGuard really lowers the risk of virus infections and prohibits access to harmful websites to prevent potential attacks. Why does AdGuard require permissions? Access your data for all websites and Access browser tabs : both permissions are necessary for AdGuard to apply all kinds of cosmetic processing to the pages content. Naive ad blocking would simply block ad servers, and leave broken elements and first-party ads on the pages. AdGuard applies special cosmetic rules to make pages look clean and tidy. Access browser activity during navigation : this permission is necessary to keep track of navigation events in order to apply rules when the time is right. Release notes: https://github.com/AdguardTeam/AdguardBrowserExtension/releases Free and Open Source: https://github.com/AdguardTeam/AdguardBrowserExtension Found a bug? Have a problem and need help? Please report it: https://github.com/AdguardTeam/AdguardBrowserExtension/issues

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Firefox extension requesting 14 permissions

No Threats Detected

This extension passed all security checks

About This Extension

AdGuard ad blocker effectively blocks all types of ads on all web pages, even on Facebook, YouTube, and others! <strong>What AdGuard ad blocker does:</strong> <ol><li>Blocks all ads: video ads (including YouTube video ads), rich media advertising, unwanted pop-ups, banners and text ads (including Facebook advertisements);</li><li>Speeds up page loading and saves bandwidth, thanks to the missing ads and pop up windows;</li><li>Blocks many spyware, adware, and dialer installers;</li><li>Protects your privacy by blocking common third-party tracking systems;</li><li>Protects you from malware and phishing.</li></ol> <strong>How can AdGuard ad blocker protect your privacy?</strong> Just enable <em>Tracking Protection filter</em> in AdGuard settings. It completely removes all forms of tracking from the Internet. AdGuard has one of the largest tracker filters containing more than 5,000 rules. <strong>How to remove social media with AdGuard?</strong> Tired of all the «Like» buttons and similar widgets infesting all of your frequented web pages? Just enable AdGuard "Social media filter" and forget about them. <strong>How can AdGuard ad blocker protect you from online threats?</strong> At the moment we’ve got more than 2,000,000 harmful websites on record. AdGuard can block domains known to spread malware, protecting your computer against viruses, Trojan horses, worms, spyware, and adware. AdGuard really lowers the risk of virus infections and prohibits access to harmful websites to prevent potential attacks. <strong>Why does AdGuard require permissions?</strong> <ul><li><em>Access your data for all websites</em> and <em>Access browser tabs</em>: both permissions are necessary for AdGuard to apply all kinds of cosmetic processing to the pages content. Naive ad blocking would simply block ad servers, and leave broken elements and first-party ads on the pages. AdGuard applies special cosmetic rules to make pages look clean and tidy.</li><li><em>Access browser activity during navigation</em>: this permission is necessary to keep track of navigation events in order to apply rules when the time is right.</li></ul> Release notes: <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/0e9d0cb454a432c58c1509cca20541837db6f6574fec2a415d840667be59a586/https%3A//github.com/AdguardTeam/AdguardBrowserExtension/releases" rel="nofollow">https://github.com/AdguardTeam/AdguardBrowserExtension/releases</a> Free and Open Source: <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/321a826b3004d658cfff11765067682f1ead906a6376e367496beae7160fea5f/https%3A//github.com/AdguardTeam/AdguardBrowserExtension" rel="nofollow">https://github.com/AdguardTeam/AdguardBrowserExtension</a> Found a bug? Have a problem and need help? Please report it: <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/6a2a666429fd047db419641e790f84574b2b397d5acde64b0551bbad91e1a757/https%3A//github.com/AdguardTeam/AdguardBrowserExtension/issues" rel="nofollow">https://github.com/AdguardTeam/AdguardBrowserExtension/issues</a>

No Findings

All security checks passed

AI Security Report

AI Security Analysis: AdGuard AdBlocker

Analysis generated: 2025-12-11T17:08:15+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 46107017-8b17-5cce-9a2e-2cd5e2b21a98
Type firefox
Version
Users 1529376
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

This analysis identifies the analyzed extension, "AdGuard AdBlocker," as a CRITICAL security risk. Despite using the name of a reputable ad-blocking vendor, the "Unverified Publisher" status combined with high-severity malware signatures suggests this is likely a malicious clone or a compromised version rather than the legitimate software. The analysis detected signatures associated with credential theft (specifically targeting Steam and Skype) and system persistence mechanisms. Immediate removal is recommended.

Threat Assessment

The security posture of this extension is highly alarming due to a discrepancy between its claimed function and its internal behavior.

  • Impersonation Risk: The developer is listed as "Adguard Software Ltd," but the Verified Publisher: false status is a significant red flag. Legitimate extensions from major vendors like AdGuard are almost exclusively verified on the Firefox Add-ons store. This strongly suggests this is a counterfeit extension designed to deceive users.
  • Malware Capabilities: The analysis detected 799 malware signatures. While some network activity is expected in an ad blocker, the presence of credential_steam_data, credential_skype_data, and postinstall_persistence_mechanism indicates capabilities far beyond ad blocking. These signatures suggest the extension may attempt to steal user credentials and establish a permanent foothold on the host system.
  • System Integrity: Findings related to postinstall_system_command and file_manipulation imply that the extension attempts to execute commands outside the browser sandbox or manipulate local files, posing a direct threat to the underlying operating system.
  • Volume of Indicators: The massive number of IOCs (312,049) likely represents the ad-blocking filter lists (domains/IPs to be blocked). However, attackers often hide malicious code within large data blobs or legitimate-looking lists to evade detection.

Risk Justification

Risk Score: 100.0/100 (CRITICAL)

This score is fully justified and accurate based on the findings:

  1. Malicious Intent: The presence of specific signatures for stealing Steam and Skype credentials indicates active malicious intent, not just poor coding practices.
  2. High Severity Count: 804 HIGH severity findings is an exceptionally high number, even for complex software.
  3. Supply Chain/Impersonation: The unverified status for a major brand indicates a likely supply chain attack or social engineering attempt targeting the 1.5 million users.

Key Findings

  • Credential Harvesting Signatures (High Severity): YARA rules matched credential_steam_data and credential_skype_data. This indicates code designed to locate and exfiltrate sensitive login data for these specific platforms.
  • Persistence Mechanisms (High Severity): The postinstall_persistence_mechanism finding suggests the extension attempts to ensure it remains active even after browser restarts or attempts to reinstall itself.
  • System Command Execution (High Severity): Multiple matches for postinstall_system_command indicate attempts to run shell commands on the user's machine, a behavior strictly unnecessary for a standard ad blocker.
  • Unverified Publisher: The developer is not verified by the store, contradicting the profile of the legitimate AdGuard company.
  • Massive IOC Count: Over 312,000 Indicators of Compromise were found. While likely primarily consisting of the ad-blocking blacklists, this volume makes manual auditing nearly impossible and provides cover for malicious domains to be mixed in.

Recommendations

  1. Immediate Removal: Uninstall this extension from all Firefox instances immediately.
  2. Credential Rotation: Change passwords for any services logged in while this extension was active, with specific priority given to Steam, Skype, and any accounts where passwords were saved in the browser.
  3. Malware Scan: Perform a full antivirus/antimalware scan of the host operating system. The system_command and persistence findings suggest the extension may have dropped payloads outside the browser environment.
  4. Install Legitimate Version: If an ad blocker is required, navigate directly to the official vendor website (adguard.com) and follow their links to the official store page to ensure you are installing the verified version.
  5. Session Cleanup: Log out of all active web sessions to invalidate potentially stolen session cookies.

Mitigation Strategies

There are no safe mitigation strategies for this specific artifact.

Due to the presence of credential-stealing signatures and the high likelihood of this being a malicious clone, "limiting permissions" or "monitoring network traffic" is insufficient. The risk of data exfiltration exists as long as the extension is installed and enabled. The only valid mitigation is uninstallation.

Confidence Assessment

Confidence Level: 80%

  • Supporting Factors: The combination of "Unverified Publisher" and specific, targeted malware signatures (Steam/Skype) creates a very strong profile of a malicious fake. The risk score of 100 is consistent with these findings.
  • Uncertainty Factors: The location of the findings is listed as unknown_file. This prevents pinpointing exactly which script contains the malicious logic. Additionally, there is a slight possibility that the "IOCs" are simply the legitimate blocklists triggering alerts, but the behavioral signatures (credential theft) cannot be explained away by blocklists. The high user count (1.5M) is concerning; it implies either a very successful fake or a legitimate version that has been flagged due to a recent, heavily obfuscated update that resembles malware. However, given the "Unverified" status, the "Fake" hypothesis remains the primary conclusion.

Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions