The tab-synchronization capability appeared last month in the latest version of the Google Chrome browser, and allows users to synchronize their open browser tabs across devices. As a result, users can log into any version of the Google Chrome browser--on home PCs, work PCs, or mobile devices--and access their saved tabs.
Unfortunately, the same would go for malware. "Consider the following scenario: The user is signed in to Chrome on both work and home computer. ... The home computer gets infected by a malware. Now all of the work synced data (such as work-related passwords) is owned by the malware," said Rob Rachwald, director of security strategy at Imperva, in a blog post.
"We name this kind of threats BYOB for 'Bring Your Own Browser,'" he said. "While BYOD creates challenges of mixing work data and personal end points, BYOB does exactly the same--but it's more elusive as there's no physical device involved."
Furthermore, IT departments could have difficulty successfully spotting and blocking malware that infiltrates the enterprise in this manner, especially given the number of attacks that could be launched from an infected home PC. "Even if the malware gets disinfected on work computer, the malware is able to infect over and over again--as the root cause of the infection--the home computer--is outside of the reach of the IT department," Rachwald said.
Two Ways In
Google didn't immediately respond to a request for comment about the feasibility of this attack, or steps that users could take to mitigate this type of threat. To be sure, this is a theoretical attack; no such Chrome-targeting malware campaign has been seen in the wild. But malware could potentially piggyback into a corporate environment, using Chrome tabs, in two ways.
The first exploit technique would be if "the malware changes the homepage or some bookmark to point to a malware-infection site on the home computer," said Rachwald. "Settings are synced to your work environment. When you open your browser at work, you get infected with some zero-day drive-by download." In this scenario, attackers could instruct the malware to keep attacking the corporate network, and even vary the attack being used, in an attempt to evade defenses. This would be difficult for a business to stop with complete reliability.
"Even if the malware gets disinfected on work computer, the malware is able to infect over and over again, as the root cause of the infection--the home computer--is outside of the reach of the IT department," he said.
Another potential attack vector would be if the malware installed a rogue Chrome extension, and such extensions have appeared on the official Chrome Web Store in the past. As Google notes, "anyone can upload items to the Chrome Web Store, so you should only install items created by people you trust," and by reviewing the ratings and reviews for an extension to help deduce whether it's reliable. Google quickly removes any malicious Chrome extensions, once they're spotted. But until that happens, any malicious extension is able to operate with impunity.
Why are malicious Chrome extensions so dangerous? "If you have an extension installed, it has ... pretty much omnipotent control over your Chrome browser," said Lindner, speaking by phone. "Google tries to prevent the extension from accessing your extension manager, but we've found ways to do it. Google fixed them, but I'm pretty confident that there are other ways."
Preventing users from installing Chrome extensions is nearly impossible. For starters, while the IT department can issue its own Chrome build, and set it to block extensions, you can install and run your own installation of the browser on any PC for which you have permission to write to the home directory--no administrator rights required.
Attackers aren't the only concern for Chrome users, as the Google tab synchronization feature could also be used during digital forensic investigations. "Imagine there's a case against you at work, and they do forensics, and they get all of your accounts at home," said Lindner.
But the bigger picture, he said, is that users should consider the security implications of synchronizing information between Chrome tabs or even between Google services. "I'm really not sure who would want to: a) give all this information to Google, and then, b) actually sync it onto every single machine they're using," Lindner said. "So much for defense. But maybe I'm the wrong person to ask--I don't even have a Google account. Wrong religion."
Employees and their browsers might be the weak link in your security plan. The new, all-digital Endpoint Insecurity Dark Reading supplement shows how to strengthen them. (Free registration required.)