Attacks/Breaches

1/18/2018
05:23 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Rogue Chrome, Firefox Extensions Hijack Browsers; Prevent Easy Removal

Malwarebytes describes malicious extensions as 'one of a kind'

Any malware that hijacks your browser to serve up ads or to redirect you to random websites can be annoying. Even more so are extensions that take control of your browser and prevent you from landing on pages that can help you get rid of them.

Security researchers at Malwarebytes recently discovered extensions for Chrome and Firefox that display precisely that behavior. According to the security vendor, the extensions are designed to hijack browsers and then block users from removing them by closing out pages with information on extensions and add-ons, or by steering users to pages where extensions aren't listed. Rogue extensions like these are often an overlooked attack vector that can leave organizations exposed to serious threats.

News of the rogue extensions follows a report from the ICEBRG Security Research team just this week about several malicious Chrome extensions in Google's Chrome store that has impacted some 500,000 users around the world, including many organizations.

"The Chrome extension is a one-of-a-kind so far," says Pieter Arntz, malware intelligence researcher at Malwarebytes. The code that forces the extension to install on a victim's browser itself looks re-used from another family of forced extensions, he says. "But the code to take users away from the extensions list in Chrome, I've never seen before."

The Firefox extension was a first as well when Malwarebytes initially spotted it, Arntz says. But researchers have already spotted a second version of it since then, he said.

The Chrome extension seems targeted at a specific demographic since it is in Spanish and promises to give users the weather in Colombia. But when installed, it opens a minimized Chrome window to the side of the screen that then accesses dozens of YouTube videos every minute, Arntz says. "So, we assume it was designed to quickly drive up the number of views for those videos." The extension has been around for several weeks and is available in the Chrome Web Store, he notes.

The Firefox extensions meanwhile are being pushed by cryptocurency faucets and similar websites that reward visitors with free content or other incentives for completing tasks like watching ads or completing captchas.

One of the ways users can be trapped into doing forced installs of malicious browsers is by landing on websites designed solely for that purpose. Users can often end up on these sites via redirects from adult, keygen, and software cracking sites, according to Malwarebytes.

"What we call a forced install is that when a website is designed to keep the user there until he decides to install the extension," Arntz says. Such websites employ javascripts, login prompts and various HTML5 tricks to essentially lock down the browser and prevent a user from browsing to another site or even closing down the tab until the extension is installed.

Chrome users have an easier time escaping such sites, by simply opening a new tab and then shutting down the offending tab, while Firefox users can only close them out via the TaskManager.

However, compared to Chrome users, Firefox users can disable the rogue extension more easily once it is actually installed simply by running the browser in Safe Mode, Arntz says. Firefox's Safe Mode allows users to see a list of all browser extensions, even when the extensions are not active, making it relatively simply to uninstall unwanted ones. Chrome in contrast, does not allow users to see any installed extensions when it is started with the extensions disabled.

"In Chrome, you will have to figure out the name of the extension folder and make some significant change there before you can access the list of extensions. Chrome not showing the extensions when you start it with the extensions disabled [has] a big handicap there," Arntz says.

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/22/2018 | 10:23:52 PM
Re: Future throughts
@REISEN: How is Opera? I remember using it years ago and finding it a bit lackluster -- serviceable but not as useful as the alternatives.

Of course, these days, I dislike those alternatives.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
1/19/2018 | 10:17:26 AM
Re: Future throughts
Clean your history, cache and ext frequently.  OPERA will shortly have a COINHIVE blocking setting.  It is only going to get worse people!!!  
sull1991
100%
0%
sull1991,
User Rank: Apprentice
1/18/2018 | 10:10:48 PM
Future throughts
I am scared on how big this is gonna be in future =/
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12294
PUBLISHED: 2018-06-19
WebCore/platform/graphics/texmap/TextureMapperLayer.cpp in WebKit, as used in WebKitGTK+ prior to version 2.20.2, is vulnerable to a use after free for a WebCore::TextureMapperLayer object.
CVE-2018-12519
PUBLISHED: 2018-06-19
An issue was discovered in ShopNx through 2017-11-17. The vulnerability allows a remote attacker to upload any malicious file to a Node.js application. An attacker can upload a malicious HTML file that contains a JavaScript payload to steal a user's credentials.
CVE-2018-12588
PUBLISHED: 2018-06-19
Cross-site scripting (XSS) vulnerability in templates/frontend/pages/searchResults.tpl in Public Knowledge Project (PKP) Open Monograph Press (OMP) v1.2.0 through 3.1.1-1 before 3.1.1-2 allows remote attackers to inject arbitrary web script or HTML via the catalog.noTitlesSearch parameter (aka the S...
CVE-2018-10811
PUBLISHED: 2018-06-19
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-10945
PUBLISHED: 2018-06-19
The mg_handle_cgi function in mongoose.c in Mongoose 6.11 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash, or NULL pointer dereference) via an HTTP request, related to the mbuf_insert function.