This document discusses threats posed by malicious Chrome extensions and proposes countermeasures. It begins by noting that extensions have been used to increase attacks in other browsers. While Chrome has security models like least privilege and isolation, experiments showed extensions can still enable attacks like email spamming, DDoS, and phishing. The document analyzes Chrome's permission and trust models, finding content scripts have too much privilege. It concludes by proposing a strengthened permission model following least privilege more strictly to improve security against malware extensions.