https://medium.com/@paritoshblogs/how-attackers-use-browser-extentions-for-malicious-purpose-6799bca4f6f5