Spyware Disguises Itself as Firefox Extension 247
Juha-Matti Laurio writes "The antivirus specialists at McAfee have warned of a Trojan that disguises itself as a Firefox extension. The trojan installs itself as a Firefox extension, presenting itself as a legitimate existing extension called numberedlinks. It then begins intercepting passwords and credit card numbers entered into the browser, which it then sends to an external server. The most dangerous part of the issue is that it records itself directly into the Firefox configuration data, avoiding the regular installation and confirmation process."
Not a vulnerability. (Score:5, Informative)
The trojan is opened as a Windows executable from email attachments, and writes itself into the Firefox profile's configuration directory.
Re:Not a vulnerability. (Score:5, Funny)
We have to send a message to developers that we want our apps native.
KFG
Re:Not a vulnerability. (Score:5, Funny)
This is how it works:
First create an executable that will do bad things. It could even be a csh script. Then send emails to all and sundry like this and attach that file"
Dear Linuxuser,
This is a virus/trojan/worm/malware for Linux. It works on the honor system. Please forward the attachment to all addresses in your .mailrc first and then save it to disk, chmod +x and sudo it. Thank you.
Attachment: malware
make it open source (Score:5, Funny)
that way it's open source and people can improve it .
Re:Not a vulnerability. (Score:5, Funny)
Re:Not a vulnerability. (Score:3, Funny)
This is a virus created for Windows users, and it is based on the honor system.
Please forward this email and its trojan/virus written attachment to all your
Microsoft based users, and let them know how much you care!
Sincerely,
Another Linux User Friend
ATTACHMENT: firephox.extention.exe
Re:Not a vulnerability. (Score:5, Funny)
Re:Not a vulnerability. (Score:5, Funny)
A friend of mine has certifications as an MCSE and a CNE. When I tell him to run "ipconfig
Re:Not a vulnerability. (Score:5, Funny)
With friends like that, who needs users?
Re:Not a vulnerability. (Score:5, Insightful)
Re:Not a vulnerability. (Score:3)
Re:Not a vulnerability. (Score:3, Insightful)
Re:Not a vulnerability. (Score:5, Funny)
It still does: Moron Confused by Sun Equipment.
Still better than Netware, which has two certification which stand for Certainly No Experience and Can't Network Anything.
Emphasis on that. (Score:5, Informative)
This does not exploit any vulnerability in Firefox.
If your OS is not secure, no app running on it can be secured.
Re:Emphasis on that. (Score:2, Funny)
Ssh...don't tell the RIAA.
Re:Emphasis on that. (Score:5, Insightful)
This is an user-executed email attachment with a trojan. It will happily be executed from Outlook Express, IE, Eudora and Thunderbird. McAfee mentions they've seen one version trying to exploit a three year old IE vulnerability. If you haven't patched that, well then you deserve to get nailed.
This does not exploit any vulnerability in Firefox
It is a vulnerability in that FF will happily load and execute any plugins dropped into its profile directory. The only time you are warned about installing someone is at download time. FF will never check for a signature or otherwise go "oh, a new plugin I've never seen. Hmmm, maybe I should ask the user about it?". Vulnerability.
If your OS is not secure, no app running on it can be secured.
If your OS is being operated by a user that executes attachments from "WalMart" that read "helo, teh attcachements for yuo pleasures" then your OS is not secure.
BTW, this progression is interesting. When FF came out just installing it would make the world safe, because it was invulnerable and impervious. Now I also have to switch operating systems? And when someone finds another exploit in SSH
Re:Emphasis on that. (Score:2, Interesting)
There should be a way of signing the profile folder contents to detect outside changes.
Knowledge is power, and being informed about a change to your profile will either set warning bells off or put you at ease (after you manually changed it yourself).
Re:Emphasis on that. (Score:3, Interesting)
Not that they've ever entirely succeeded, but the idea has been run through its paces a few times.
Re:Emphasis on that. (Score:5, Insightful)
Okay, and then the next trojan will simply add itself to the file that Firefox checks to see if the extension is new, and you're back to square one.
Firefox isn't the problem. The fact that the thing can write to the application's directory means the computer is already compromised.
Re:Emphasis on that. (Score:3, Informative)
There is nothing about "vulnerability" that would stop the same thing happening on a Linux box. The only saving grace for Linux at this point in time is that your average Linux user is smart enough to not execute random executable files they receive from people they don't know in an email message.
Re:Emphasis on that. (Score:3, Insightful)
Although I agree with this statement, a lot of the time the really nasty ones are spread by people you *DO* know. You know the type. This is the user that actually believes clicking "Remove me from this list" will actually remove them from that spammer's list. These also tend to be those people that clog th
Re:Emphasis on that. (Score:2)
Since it involves executing an attachment while being a Windows administrator, it's more about the user than any OS security issues in this case.
Re:Emphasis on that. (Score:5, Informative)
RE: Emphasis on that. (Score:5, Informative)
Actually, if you read the article more closely (and similar articles that have appeared in no shortage of other places), the malware pretends to be the numberdlinks extension. Your post implies that the actual extension is malware, and this is untrue.
Additionally, if you read the Slashdot blurb, it's explained pretty clearly there.
Basically, if you click on e-mail attachments without knowing what they are, it's your own fault if your computer becomes infested with viruses and spyware.
Re: Emphasis on that. (Score:3, Interesting)
Re: Emphasis on that. (Score:5, Insightful)
Any extension downloaded from addons.mozilla.org has been tested, is widely used, and subject to an enormous amount of user feedback.
Now, if you download an extension from kickme.to/malware, you get what you deserve.
Re: Emphasis on that. (Score:2)
By that logic, any application (script, etc.)... and to some extent any piece of data... could be a trojan. That's hardly a novel idea.
Re:Not a vulnerability. (Score:2)
Oh sorry, I forgot, nobody actually reads the articles here...
Re:Not a vulnerability. (Score:3, Funny)
Darn, I knew this was going to happen sooner or later. Time to switch to IE. oh, wait a minute...
Re:Not a vulnerability. (Score:3, Insightful)
Re:Not a vulnerability. (Score:2)
Re:Not a vulnerability. (Score:2)
The very first page you see after installing tells you to Install Extensions [mozilla.org]. And what is only a few clicks from that page? Hundreds of untrusted extensions, with the new ones helpfully listed first.
It would be TRIVIAL to insert a trojan onto that site. You can guarantee that people would download and install it without thinking twice. With a little more effort you could even hack a popular extension's home sit
Re:Not a vulnerability. (Score:3, Insightful)
I still don't see how that differs from a trojan on, say, SourceForge--that's just how trojans are.
IMHO problem with ActiveX are the seemingly endless vulnerabilities that enable drive by installations, I don't see this with Firefox.
Re:Not a vulnerability. (Score:2, Insightful)
I think this just gives you a false sense of security. If you're OS were secure and you knew for a fact that no one else could ever write to the firefox config files or the r
Re:Not a vulnerability. (Score:5, Funny)
Re:Not a vulnerability. (Score:3, Insightful)
Signatures don't matter here (Score:4, Insightful)
The only place a singature would matter in this case is when the trojan executable was run. If you are executing attached executables from an e-mail, then no amount of signature verification is going to protect you. The reality is that no technical process can exist that will prevent this kind of attack so long as users can install their own software.
Re:Not a vulnerability. (Score:2)
This malware had read-write access to C:\Program Files\Firefox. Nothing would have stopped it from disabling any signature-checking code that might have existed.
The Firefox extension trust model is as secure as SSL and the SHA-1 hash function.
Re:Not a vulnerability. (Score:2)
Executables can end up trashing your system, even if they aren't meant to do so.
Re:Not a vulnerability. (Score:3, Informative)
Re:Not a vulnerability. (Score:5, Insightful)
While true, perhaps a related problem that actually is a vulnerability is the fact that Firefox (apparently) only checks for a valid signature on the plugin at download/install time. Maybe the Firefox configuration file, or at the very least the binaries for each extension, should be cryptographically verified at runtime.
Of course, this presupposes that Firefox hackers can manage to get their extensions signed, and if that's possible, then the malware authors could do the same. Unless...FF gets distributed with a mozilla.org CA cert, and extensions accepted and published on the mozilla site(s) get signed with that cert, then every "legitimate" extension from the mozilla sites will be verifiable at runtime. The user could opt out of that with an "allow execution [not installation] of unsigned extensions" preference setting, but the majority of users would be protected, so long as the malware doesn't also set that preference for the user.
(though even that last bit could be guarded against by creating a personal key to sign the config with, and every time you make a "security relevant configuration change" to the browser's settings, you have to re-sign the file.)
Re:Not a vulnerability. (Score:5, Insightful)
Once you're pwned, you're pwned. If you give someone free reign on your box, he can do anything to any file writeable by you.
Pwning the user, not the computer (Score:2)
Re:Not a vulnerability. (Score:5, Insightful)
Once someone's system is compromised, they can replace or alter the FireFox binary which verifies the signatures, replace libnssckbi.so, libsoftokn3.so, whatever.
You can't win at that point. If you're storing your operating system and executables on writable media, it can never be trusted to that level. The hardware would have to cryptographically verify the boot loader on disk, which would verify the kernel, which would then be able to verify everything it executes--FireFox alone can't do it.
(Say, what was that hardware-based Trusted Computing stuff supposed to do? In addition to ramming DRM down everyone's PCI bus, wasn't there system verification too?)
Re:Not a vulnerability. (Score:2)
Re:Not a vulnerability. (Score:2)
Pretty much. It may be possible for the firefox developers to block this on their end, by inserting some kludges for the windows builds, but the exploit itself is an exploit of Windows/IE, and won't affect Firefox on a sane system. (Not even on Windows, if IE is thoroughly removed and a sane email program used.)
It is a vulnerability. (Score:2, Insightful)
At least, that's how it works for other software.
Re:It is a vulnerability. (Score:2)
How does "other software" keep me from tweaking the registry?
Re:It is a vulnerability. (Score:3, Insightful)
By way of example, at my previous job I used a linux boot floppy to change the local administrator password on a Windows NT4 system, thus owning the machine at the next boot. By an extension of your standard, this represented a Windows vulnerability, because whatever measures Windows may have taken to prevent such a thing (like NTFS) were ineffective.
I think that's a clear mis-assessment of the true v
Re:It is a vulnerability. (Score:2)
I see nothing bugged in Outlook there. It seems more like just another software that's being launched by the user.
Re:Not a vulnerability. (Score:2)
I think this is a FF problem, just like with other SW that gets hacked.
Re:Not a vulnerability. (Score:2)
That's already done, but this malware bypasses that because it's executed elsewhere on the system (i.e. there's nothing Firefox could possibly do at this point).
That's either because you haven't bothered to inform yourself about the problem, or because you're trolling.
Re:Not a vulnerability. (Score:2)
I consider the entire Firefox extension mechanism one big vulnerable open door. On Windows, it's no big deal. There is no vulnerability that Firefox enables under Windows that Windows itself doesn't already provide. Under other operating systems with correct separation of programs and data, though (such as anything Unix-like), the extension mechanism is bypassing the operating system's protections.
Linux systems provide applications in root-protected director
Re:Not a vulnerability. (Score:2)
Everyone to whom I've recommended Firefox has also received the recommendation that they install Thunderbird and Popfile.
This is just McAffee trying to drum up business.
Re:Not a vulnerability. (Score:5, Informative)
KFG
Rats (Score:2)
Still, what does this say about IE, that people are now using it to infect firefox? Is IE getting that unpopular now?
Re:Rats (Score:2)
The idea is to make it so that you have to run these things yourself in order to infect yourself rather than having all of this just occur automatically or as completely unintended conseqeunce. Make it harder for things to spread and limit the damage they can do.
MozillaZine Has More (Score:5, Informative)
Personally... (Score:4, Informative)
https://addons.mozilla.org/extensions.php?app=fir
Re:Personally... (Score:2, Informative)
Re:Personally... (Score:4, Insightful)
Education must be the answer then. I learned not to open random executables from unknown sources many years ago. People apparently click them though. Teach a man to use the internet, and he'll be safe for a day. Teach a man to know the internet and he'll be safe for a lifetime.
Re:Personally... (Score:5, Funny)
http://www.youtube.com/watch?v=DClkE64nFDY [youtube.com]
Fast forward to about 2:00.
Re:Personally... (Score:2)
Hmmmm (Score:4, Interesting)
Nothing to see here, move along..
Re:Hmmmm (Score:2)
-dZ.
Break extension (Score:5, Funny)
Thankfully, I'm running IE (Score:5, Funny)
What does MS say? (Score:2)
Please contact our legal department.
How does it work? (Score:2, Insightful)
If it's #1, it's bad
If it's #2, not so bad - a simple virus
If it's #3 - hey, who install extension from non-oficial sources?
Re:How does it work? (Score:2)
If it's #1, it's bad
If it's #2, not so bad - a simple virus
If it's #3 - hey, who install extension from non-oficial sources?
Does this user not RTFA? Or is he trying to just get karma? Or where they just trying to get a first post?
If it's #1, typical slashdot reader
If it's #2, stupid karma whore
If it's #3 - god, I hope not they where way to slow
Re:How does it work? (Score:2)
The tip of the iceberg... (Score:2, Insightful)
that's it, I'm switching to Internet Explorer (Score:3, Funny)
Whether everyone likes it or not... (Score:2)
Re:that's it, I'm switching to Internet Explorer (Score:2)
Sometimes sarcasm isn't well translated via e-mail. But assuming you are serious about your statement above, all I can say is 'welcome to the 1990s'. And I hope you have a stellar antivirus program.
Crapshoot (Score:2)
Ok, so you get the virus in an email... what if you don't have Firefox? Blasphemy, I know. More importanly, if you do have Firefox, are you necessarily going to be running Outlook to catch this bug in the first place?
Re:Crapshoot (Score:2)
Spyware Disguised as an MSIE Extension (Score:5, Funny)
RTFA (Score:5, Informative)
For those of you screaming that "numberedlinks" should be removed from the mozilla site, that wouldn't fix the problem. The original extension is perfectly safe and NOT a trojan. This one is just spoofing it by installing itself with the same name.
A little more careful reading and some common sense go a long way
Comment removed (Score:4, Interesting)
Re:Firefox is horribly vulnerable; I have proof. (Score:2, Insightful)
Re:Firefox is horribly vulnerable; I have proof. (Score:2)
I don't blame her, I blame you. You're the techie. My mom runs XP as a limited user, and so does my wife, and so do I for day-to-day Windows tasks. No issues to report.
Any time I am in the home of a friend or relative that has an insecure Windows box, I set them up with automatic updates, turn on the XP firewall, install AVG Free, convert them to a limited user account, and add a separate admin account for software installation. It ususally takes 2
numbered links, different extension (Score:2)
better yet! (Score:2)
I finally came to Hit a Hint [mozilla.org], and loved it.
It's specially good cause it doesn't interfere with the page appearance, let's you access more clickable elements, and have configurable shortcuts.
A must!
Looking at the big picture! (Score:3, Insightful)
I'm a moron (Score:2)
I thought it's something that people would commen
firefox -safe-mode & (Score:2, Insightful)
i also change a few setting
Re:FUD (Score:2)
The trojan is being distributed through spam emails. It has zero to do with Internet Explorer.
Someone please mod this troll to oblivion.
Re:FUD (Score:2)
Re:FUD (Score:4, Insightful)
Re:FUD (Score:3, Insightful)
Re:FUD (Score:2)
Re:FUD (Score:2)
Re:FUD (Score:2)
I can see the next MS vs Apple add:
Mac: PCs were infected with over 1230985981723 viruses last year!
PC: Yeah, but they were all friendly.
Re:and? (Score:5, Funny)
Re:and? (Score:3)
Re:Is numberedlinks legit? (Score:3, Informative)
It is: "presenting itself as a legitimate existing extension called numberedlinks".
The McAfee characteristics page [nai.com] (2nd tab - stupid that that isn't directly linkable) also says:
Re:Why is mozdev.org still... (Score:2)
Re:Why is mozdev.org still... (Score:4, Insightful)
Re:Why is mozdev.org still... (Score:2, Insightful)
And, until this is settled, I will consider anything you develop to be suspect.
Then that makes you part of the problem, asshole. It's not the legitimate author's responsibility to police every malicious programmer and make sure that they are not using the same name as something that is legitimate. If he has the name of his extension legally registered, and the author of the malware gets identified, then the legitimate author