Malware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees

Users' distrust of corporate security teams is exposing businesses to unnecessary vulnerabilities.

In early January, Colin McMillen, the lead developer at SemiColin Games, tweeted a warning about a popular Google Chrome extension, The Great Suspender. The utility came under fire after McMillen learned the developer sold it to a third party that silently released a version that could spy on a user's browsing habits, inject ads into websites, or even download sensitive data.

After a community outcry, the new owner removed the offending code. Now aware of the change of ownership and breach of trust, many savvy users removed the extension.

Even so, The Great Suspender remained available in the Chrome Web Store until Feb. 3, when Google finally pulled the plug. Many of the extension's 2 million users found out when they received a warning that simply stated, "This extension may be dangerous. The Great Suspender has been disabled because it contains malware."

Related Content:

Is $50,000 for a Vulnerability Too Much?

Special Report: How IT Security Organizations are Attacking the Cybersecurity Problem

New From The Edge: What's the Difference Between 'Observability' and 'Visibility' in Security?

While Google eventually set things right, it took too long. McMillen's tweet shone a bright light on this in January, but comments on the extension's issue tracker indicate users reported the problem to Google as early as October 2020. This left Chrome users in a potentially vulnerable position for over three months.

How Personal Computers Put Work Devices at Risk
Sometimes, Google Chrome extensions installed on personal computers are automatically installed and synchronized to work devices. This brings their problems into the security team's purview, which then must make difficult decisions because:

  1. The risks associated with running suspicious extensions like The Great Suspender usually impact the employee, not the company, more.
  2. Before the extension was banned in February, end users had no official indication the extension was potentially malicious.
  3. Despite the risks associated with the extension, users intentionally installed it and, presumably, were happily using it.

Security teams are accustomed to wielding impressive tools that can block, contain, and remediate clear threats. They work best in a world of absolutes, where software is either good or bad, and systems are either secure or vulnerable. In the case of The Great Suspender, a situation with many shades of gray, your average security team cannot take immediate action without backlash from users. Instead, these teams must carefully reach out to the impacted employee individually and guide them toward making prudent decisions on their own. It's a muscle rarely exercised, and an activity ill-suited to the tools at hand.

Individual Intervention Opens Questions About Surveillance
Teams that are willing to brave this task manually will find a high mountain to climb. Approaching an employee about this forces all sorts of uncomfortable topics front and center. Inquisitive users may now be curious about the scope and veracity of the company's monitoring. Now that they are working from home and surrounded by family, they wonder where is the line drawn with collecting personal data, and is there an audit log for the surveillance? For many teams, the benefits of helping end users are not worth the risk of toppling over the already wobbly apple cart. So extensions like The Great Suspender linger, waiting for the right moment to siphon data, redirect users to malicious websites, or worse.

This seems like a significant weakness in how IT and security teams operate. Because too few security teams have solid relationships built on trust with end users, malware authors can exploit this reticence, become entrenched, and do some real damage.

How to Solve These Problems
Forward-looking teams are rolling up their sleeves and developing tools to solve this. Dan Jacobson, who leads corporate IT at Datadog, told me about a tool his team built to handle this type of conundrum. They created a Slack app that private messages end users about risky Chrome extensions discovered by management software, with step-by-step instructions on removing them. "Transparency has been a core tenant of what we do here, so providing this service to our employees was a no-brainer," Jacobson says.

Netflix is also doing its part in this space. Not only did its security team provide crucial feedback for my Honest Security guide, but it's also made some of its user-focused tools open source. This includes Stethoscope, which Netflix uses internally to bridge communications gaps between the security team and end users.


Source: Kolide

In an interview, Jesse Kriss, a key member of Netflix's user-focused security engineering team, said, "Netflix has a culture of transparency and values freedom and responsibility. These principles don't align very well with the typical systems-management approach. Invisible software with admin rights pushing out centrally managed policies works against that ideal, in addition to having fairly significant security risks if the admin controls are compromised. ... Given all of these things, we prefer to have a model where we can check machine configuration at access time, give people clear guidance on how to make simple changes themselves, and not rely on strict inventory or a trusted bootstrapping process. Stethoscope gives us that ability."

No Time to Wait
Despite heroic efforts of forward-looking teams, Google cannot be let off the hook. Its reaction to The Great Suspender was too slow and opaque, and it left users without answers to basic questions anyone would ask when told they are running a malicious extension.

While we can hope for vendors like Google to do better, security teams cannot wait for the next incident to establish relationships to tackle problems posed by suspect extensions. They need to start investing in relationships with end users and methods to communicate with them at scale. This means doing the hard work of defining rules of engagement that respect users' privacy but also protect the company's interests. It also means rolling back surveillance tools that damage the trust underlying any positive relationship. The time investment may be steep but, given that the next threat might be near, the dividends are invaluable.

Editors' Choice
Evan Schuman, Contributing Writer, Dark Reading
Tara Seals, Managing Editor, News, Dark Reading
Jeffrey Schwartz, Contributing Writer, Dark Reading