Sign up for our weekly newsletter!
REGISTER NOW |
||
|
||
Trend Micro Finds 89 Malicious Chrome Extensions Dispensing 'Malvertising'![]() Larry Loeb, Author, 2/5/2018
Most browser users have no idea what a "session replay" is, or that it is routinely used by a website's owner to analyze user behavior on their site. Even though Princeton University researchers sounded the alarm about these techniques in November, there has been no real outcry about them that has emerged. This may be because they do have legitimate uses. Analytics firms such as FullStory, Hotjar, Yandex and Smartlook provide scripts for the site owners to use and then summarize the findings on their analytics consoles. The use is widespread. In fact, 482 of the Alexa top 50,000 sites are recording their users' every moves, keystrokes and mouse movements with these tools. This includes Yandex, Microsoft, Adobe, GoDaddy, Spotify, WordPress, Reuters, Comcast, TMZ and many others.
![]() (Source: PixelCreatures via Pixabay)
However, it has been found that several malicious Chrome extensions have started embedding a JavaScript library provided by web analytics provider Yandex Metrica that has this session replay ability. While the Metrica script does not record the text that is entered into password fields, it still can still log various sorts of details, such as names, credit card numbers, CVV numbers, email addresses and phone numbers. Trend Micro Inc. 's TrendLabs issued a report on the problem, finding that there were 89 of the malware extensions on the Chrome webstore with an installed base of 420,000 users. In the report, Trend Micro researchers believe that all of these malware extensions were created by the same threat actor, named Droidclub. This is the domain name of the command and control server used to control the extensions. The Droidclub group relies on "malvertising" to force a landing on a controlled page where social engineering tricks come into play to have the extension get permission to be installed. The extensions will also try to inject ads on everything an infected users sees, which will generate profits for them. Trend Micro was not able to definitively state how the Yandex script was being used by the attackers, only that they could demonstrate it had the potential to be used to capture personal information. Droidclub also messes with users trying to uninstall or report the extensions. It will check if the user is visiting a URL where reporting is done -- matching the regular expression https://chrome.google.com/webstore/report/([a-z]+) -- the user is instead redirected to the introduction page of their extension. If the user tries to remove the extension via Chrome's extension management page -- located at chrome://extensions/ -- the extension will again redirect the user to a fake page, leading the user to believe that the extension has been uninstalled. It hasn't been, and it's still there. Droidclub's extensions are a nasty piece of work, when one considers how it functions and how it tries to hang on. Fortunately, Trend Micro says Cloudflare Inc. has removed the C&C servers from its service. Related posts:
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. |
Be alert, be aware, and be careful about what you reveal of your company's internal processes on social media.
The Microsoft Defender ATP Research Team has begun to discuss a polymorphic threat, Dexphot, that it has been tracking for over a year.
'Improper Restriction of Operations within the Bounds of a Memory Buffer' tops this year's list.
A security vulnerability affecting the Linux enterprise search tool Apache Solr has been reclassified by Tenable as 'high severity status.'
Researchers from Boston University have shown how really small amounts of disinformation can taint the learning process used by many AI programs.
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security. ![]() like us on facebook
|
|
![]() |
||
![]() |
Security Now
About Us
Contact Us
Help
Register
Events
Supporting Partners
Twitter
Facebook
RSS
Copyright © 2019 Light Reading, part of Informa Tech, a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use in partnership with
|