Attacks/Breaches

1/18/2018
05:23 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Rogue Chrome, Firefox Extensions Hijack Browsers; Prevent Easy Removal

Malwarebytes describes malicious extensions as 'one of a kind'

Any malware that hijacks your browser to serve up ads or to redirect you to random websites can be annoying. Even more so are extensions that take control of your browser and prevent you from landing on pages that can help you get rid of them.

Security researchers at Malwarebytes recently discovered extensions for Chrome and Firefox that display precisely that behavior. According to the security vendor, the extensions are designed to hijack browsers and then block users from removing them by closing out pages with information on extensions and add-ons, or by steering users to pages where extensions aren't listed. Rogue extensions like these are often an overlooked attack vector that can leave organizations exposed to serious threats.

News of the rogue extensions follows a report from the ICEBRG Security Research team just this week about several malicious Chrome extensions in Google's Chrome store that has impacted some 500,000 users around the world, including many organizations.

"The Chrome extension is a one-of-a-kind so far," says Pieter Arntz, malware intelligence researcher at Malwarebytes. The code that forces the extension to install on a victim's browser itself looks re-used from another family of forced extensions, he says. "But the code to take users away from the extensions list in Chrome, I've never seen before."

The Firefox extension was a first as well when Malwarebytes initially spotted it, Arntz says. But researchers have already spotted a second version of it since then, he said.

The Chrome extension seems targeted at a specific demographic since it is in Spanish and promises to give users the weather in Colombia. But when installed, it opens a minimized Chrome window to the side of the screen that then accesses dozens of YouTube videos every minute, Arntz says. "So, we assume it was designed to quickly drive up the number of views for those videos." The extension has been around for several weeks and is available in the Chrome Web Store, he notes.

The Firefox extensions meanwhile are being pushed by cryptocurency faucets and similar websites that reward visitors with free content or other incentives for completing tasks like watching ads or completing captchas.

One of the ways users can be trapped into doing forced installs of malicious browsers is by landing on websites designed solely for that purpose. Users can often end up on these sites via redirects from adult, keygen, and software cracking sites, according to Malwarebytes.

"What we call a forced install is that when a website is designed to keep the user there until he decides to install the extension," Arntz says. Such websites employ javascripts, login prompts and various HTML5 tricks to essentially lock down the browser and prevent a user from browsing to another site or even closing down the tab until the extension is installed.

Chrome users have an easier time escaping such sites, by simply opening a new tab and then shutting down the offending tab, while Firefox users can only close them out via the TaskManager.

However, compared to Chrome users, Firefox users can disable the rogue extension more easily once it is actually installed simply by running the browser in Safe Mode, Arntz says. Firefox's Safe Mode allows users to see a list of all browser extensions, even when the extensions are not active, making it relatively simply to uninstall unwanted ones. Chrome in contrast, does not allow users to see any installed extensions when it is started with the extensions disabled.

"In Chrome, you will have to figure out the name of the extension folder and make some significant change there before you can access the list of extensions. Chrome not showing the extensions when you start it with the extensions disabled [has] a big handicap there," Arntz says.

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/22/2018 | 10:23:52 PM
Re: Future throughts
@REISEN: How is Opera? I remember using it years ago and finding it a bit lackluster -- serviceable but not as useful as the alternatives.

Of course, these days, I dislike those alternatives.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
1/19/2018 | 10:17:26 AM
Re: Future throughts
Clean your history, cache and ext frequently.  OPERA will shortly have a COINHIVE blocking setting.  It is only going to get worse people!!!  
sull1991
100%
0%
sull1991,
User Rank: Apprentice
1/18/2018 | 10:10:48 PM
Future throughts
I am scared on how big this is gonna be in future =/
13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.