eFast Malware Hijacks Browser With Chrome Clone (malwarebytes.org) 183
An anonymous reader writes with a report at The Stack that: eFast Browser, a new malicious adware which disguises itself as Google Chrome, has hijacked internet users' systems in an apparent effort to serve its own ads and harvest user activity to sell to third-party advertisers. It is able to mirror the aesthetics of Chrome as it uses the same source code, available across the open-source project Chromium. Once installed, eFast places ads across existing web pages, linking to third-party e-commerce sites or other malicious platforms.
Mirrors the aesthetics of Chome? It's Firefox?!? (Score:3, Funny)
Hmmm, "disguises itself as Google Chrome" and "mirror[s] the aesthetics of Chrome".
Sounds like Firefox!
Windows only (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Where is the source to that software you're advertising in a way more obnoxious than flashing modal full-screen ads?
Re: (Score:2)
[incoherent gibberish]
Sorry, I can't parse your message for the most part, maybe because it is full of advertisements.
Where exactly do I find the source code to your program?
Re: (Score:2)
Unfortunately I couldn't find the source code at "Malwarebytes' folks have it".
So my question stands, where can I look at the source code?
Or, for what purpose exactly are you keeping it secret?
Why are you getting so mad over a curious mind wanting to look at it?
(Let's pretend the amount of red-headed spit-spraying anger in your replies wouldn't make the answer quite obvious).
Re: (Score:2)
So to summarize, you're heavily advertising a proprietary closed-source program that security-aware people are supposed to execute on their machines no questions asked.
You advertise this program in the name of stopping obnoxious advertising, the irony of which seems to be lost on you.
Plus, you get angry when being inquired about whether one could take a peek in.
It figures. I have no further questions.
BTW, if you want to make me look like a troll, don't use my +5 Informative comments as the base of your argu
Re: (Score:2)
If it was actually safe, you wouldn't need to go out of your way like this, trying to make everyone believe it is, in boldface no less, spamming your ads all over the place.
Re: (Score:2)
do[] Symantec\Norton, Kaspersky, AVG, McAfee/Intel, or MalwareBytes open source their code
No, they don't. Are they trustworthy? No. Are they shit? Yes.
What's your point?
P.S.=> - & again "summarize this" -> http://it.slashdot.org/comment... [slashdot.org]
You want me to summarize one of your comment? Uh oh, I can try.
"Mentally retarded crackpot is off his meds again, types random gibberish into his web browser."
OK?
Re: (Score:2)
Your hilarious show couldn't underline my point more clearly.
Re: (Score:2)
Okay, let's assume your program is actually safe.
Then you keeping the source secret can only mean one thing: Your source code is shit and you know it.
What is it, have you written it in Visual Basic?
Re: (Score:2)
Hey now... There's nothing wrong with open source. There's something wrong with stupid people. Those people will remain the same regardless of source. Also, you can't steal what is given away so if they're giving the source away then it wasn't really stolen. ;-)
Re: (Score:2)
Okay, but where do I find the source code?
Re: (Score:2)
That's nice and all, but where can I have a look at the source?
Re: (Score:2)
That doesn't explain where I can find the source.
Re: (Score:2)
How could I possibly write such a summary without being able to see "your ware"?
It can only mean you must be willing to provide your source code, so where exactly can I find it?
Re: (Score:2)
I'll gladly summarize "your ware". Where is the source code I need in order to do that?
Re: (Score:2)
Okay, where is the source?
Re: (Score:2)
I never said you're obligated. I'm questioning why you keep it a secret if there's nothing wrong with it.
I'm looking forward to see the source code.
Re: (Score:2)
The article only proves that people are stupid. It doesn't prove that it is inherently bad. You should know that. I'm also not a zealot or anything. I think closed source is just fine. However, it's not inherently evil. It's just that people can take advantage of stupid people regardless of how the source is licensed.
Re: (Score:2)
Little reality check: Were I a user, why would I want to read the source code?
gents like myself, software engineers/programmers
Thanks for the laugh
Re: (Score:2)
Yes, but where is your program's source code again?
Re: (Score:2)
Where is the source code to this marvelous software-engineering masterpiece?
Re: (Score:2)
Of course you aren't. Back to the topic: Where is the source code of your webscale enterprise application?
Re: (Score:2)
Why isn't the source code available when there's nothing wrong with the program?
Re: (Score:2)
while (!seen_the_source())
ask_for_the_source();
That said, where is your source code?
Re: (Score:2)
Your newsletter is intriguing to me and I wish to subscribe to your ideas.
I'd also like to read the source code of your program, I'm not sure if you noticed. Where can I find it?
Re: (Score:2)
I've just shown you code that's likely better than your Visual Basic program.
That said, where's the source?
Re: (Score:2)
Are you trying exponential growth here? Is that what happened to your source code, too? (Which is /where/ exactly, btw?)
Re: (Score:2)
I don't disagree with that. I disagree with the premise that the problem is open source and not stupid people. No, my friend, the problem is stupid people. I'm not sure how we'll work around that. You'll get stupid people doing stupid things no matter what the source licensing is. Look at all the idiots who argue that a hosts file isn't any good for anything. See? Stupid people. They'll be stupid people even if the source is locked away.
Re: (Score:2)
Sorry, I can't see the source there. Where is it?
Re: (Score:1)
Re: (Score:2)
I'm not sure whether this comment contains the information i'm looking for.
A reminder: I'm looking for the source code.
Re: (Score:2)
No, but where is your program's source code again?
Re: (Score:2)
Perhaps. But I *still* don't know where I can find the source code of your low-time-to-market streamlined business automation solution.
Re: (Score:2)
Your ideas are intriguing to me and I wish to subscribe to your source code.
Re: (Score:2)
TL;DR. Where's the source?
Re: (Score:2)
Interesting. Where can I read the source, though?
Re: (Score:2)
My *what*? Hosts file engine? I guess if I wasn't able to configure a firewall and a DNS resolver, *and* dumb enough to think abusing the hosts file was reliable I might have written som-- oh, wait, no. Not even in that case. Nevermind.
That said, where can I find the source code of your program?
Re: (Score:2)
I'm not sure what makes you feel qualified to judge that.
I'm starting to believe that you don't have the source code yourself. You're probably distributing someone else's program and they aren't giving you access to the source code, maybe for the reasons you're projecting on me.
Re: (Score:2)
Your source code is intriguing to me and i wish to subscribe to your source code.
Re: (Score:2)
Okay, but where do I find the source?
Re: (Score:2)
Please email me the source.
Re: (Score:2)
What makes you believe I can't code? Where is the source code to your program?
Re: (Score:2)
But why isn't the source code available when there's nothing wrong with the program?
Re: (Score:2)
To clarify, I host [APKs] software on my on one of my personal servers (not Malwarebytes owned or related) and have it listed on the hpHosts site, but this is not an endorsement by Malwarebytes - only me personally.
I think I'll just leave this here.
That said, where's the source code?
Re: (Score:2)
Still it means that your claim that malwarebytes recommends your sh^Hoftware is nothing but a lie. So with that gone, there's one more reason to want to look at the source code, before not using your program anyway.
How can I obtain said source code?
Re: (Score:2)
I'm having a little trouble finding the source of your program.
Re: (Score:2)
Yes. Wait, no. Wait, yes. Wait, whatever.
Back to the topic: Where's the source?
Re: (Score:2)
tl;dr. Where is your source code?
Re: (Score:2)
I don't understand. Where is the source again?
Re: (Score:2)
Why are you spamming dozens of the same comment, and where is the source code to your program?
Re: (Score:2)
Maybe. Where is your program's source code?
LOL, w00t? (Score:5, Insightful)
LOL, WTF??? So, malware which rips out your browser, puts itself in its place, and then serves you ads and whatever the hell else it does ... and they're asking if it adheres to a damned privacy policy?
Anything which installs itself like that can safely be assumed to not give a flying crap about your damned privacy.
Why the hell they even ponder if something like this follows a privacy policy? It's malware. No, it isn't going to have a privacy policy.
Re: (Score:2)
what does privacy policy even do? The privacy policy could consist of solely "fuck you we'll do what we want" and still be a policy.
Re: (Score:2)
And yes, I know exactly what I did there, and it was intentional, so before you complain, think about it. If you still don't get it, don't bother, you probably never will.
I wonder (Score:2)
is it hosted at sourceforge?
Re: (Score:2)
Re: (Score:1)
Re: (Score:3)
There's more information than there should be, that's for sure.
http://sourceforge.net/project... [sourceforge.net] - check that out. Odds are we can find this person VERY EASILY.
Also possibly involved accounts (from checking other contributors to other projects listed from the originally-linked account):
http://sourceforge.net/u/rosha... [sourceforge.net]
http://sourceforge.net/u/dllth... [sourceforge.net]
no indication efast == Efast Browser malware (Score:3)
It should be noted that all we know is that someone thought about publishing something called efast. We don't know that this person is involved with the Efast Browser malware.
eFast Bad - Google Good?!? (Score:3, Interesting)
Wait, eFast is using the open source Chromium code to build a browser to serve ads and collect user PII, and that is wrong, but when Google uses the same open source code base to build a browser to serve ads and collect user PII that's great?!?
WTF?!?
Re: (Score:2)
You better believe that's a paddlin'
Re: (Score:3)
There's just the minor side issue of fraud, asshole. If they want to provide a browser (yes, and even base it off of Chromium) and use some unique feature of it to convince people to let them serve you ads, I suppose that would be marginally okay - except the bit about hijacking websites and siphoning off their revenue streams, which seems at best unethical.
But let's not miss out on yet another opportunity to bash Google for the business model that provides you with search, email, youtube and the Chromium
lesson learned? (Score:4, Informative)
windows and macosx users, listen up. GNU/Linux Distributions have a digitally-signed audit trail that goes all the way back to multiply personally-verified GPG key signatures. *NO* malware gets through that process - absolutely none. and the reason why is very simple: anyone who dares to install malware would, by virtue of the GPG-signed audit chain, be tracked back and their reputation so publicly destroyed - forever - that they would never work in the software industry ever again.
not even microsoft or apple, no matter how they try, can replicate this audit trail, because their software installation is (a) not transparent (i.e. not trustworthy) and (b) as those corporations set themselves up as the "single choke-point" they simply don't have the time, the resources or the financial incentive to support *YOU*, the user, when *YOU* want to install some random piece of third party software.
in short, i am sorry to have to inform you that if you run the windows or the macosx operating systems, *despite* the fact that you are perfectly entitled to install 3rd party software [for now, anyway: it's getting harder to do], despite the fact that if you choose not to install 3rd party software your computer would be completely useless - despite all these things being true and perfectly valid, i am sorry to have to inform you that *if* you choose to install 3rd party software, you get everything that you deserve.
people who install GNU/Linux OSes don't do it "because it's fun" or "because they want a challenge of running command-line tools", they do it because they *know* and trust the digital audit trail based on the publicly-verifiable reputation of the 1000+ developers behind each distribution, and, because that trail exists, they can feel that they're safe from malware and spyware when they follow the install procedures that come with their OS.
of course, there are those people - GNU/Linux users - who bypass that process, and perform manual installation of random unverified online packages. such people it has to be said _also_ get what they deserve.
now, we can indeed track the MD5 checksums, and manually check the digital signatures, or even manually build the software ourselves (regardless of the OS), but the inconvenience and complexity of doing so is beyond most people - often myself included: i just cannot be bothered to compile software from source these days unless it's absolutely essential. ... but why put yourself through that?? why are you risking yourself to exposure to privacy violations and data violatinos? i genuinely don't understand why you would do that to yourself. perhaps someone could explain it to me.
Comment removed (Score:5, Informative)
Re: (Score:2)
And, obviously, if someone can install software from Google via downloads, they can install other software via downloads, including malware.
The difference is that on a GNU/Linux distro, one can choose to go without installing software via untrusted binary downloads, and this choice still produces a useful operating environment. For example, one can choose to download not actual Chrome, but Chromium.
Re: (Score:3)
There is another way to go about it. If you trust Google's Linux software repository, you can install the repo's GPG key first: https://www.google.com/linuxre... [google.com]
After that, all downloads from Google, e.g. apt-get install google-chrome-stable, gets the same GPG verification as anything from Debian/Ubuntu. Downloads are still over HTTP, just like Debian/Ubuntu, because the GPG verification is there to actually verify the downloads.
Re: (Score:2)
Re: (Score:2)
Last time I installed Chrome (not Chromium, but actual Chrome) on Ubuntu I still had to download it from Google trusting Google's process rather than Canonical's. So no, it didn't go through some encryption protected carefully managed central repo. And, obviously, if someone can install software from Google via downloads, they can install other software via downloads, including malware.
... and you end up being tracked, and have advertising pushed at you, and your privacy is invaded through data sharing - yes, we know. that's why the Debian GNU/Linux team took the (libre-licensed) source code for the chrome browser, did a full source code audit, *REMOVED* all of the spy-tracking, *REMOVED* all of the privacy-violating code, compiled that and released it through the standard Debian packaging system [which includes the audit trail]
if the ubuntu team are actually bothering to properly follow
Comment removed (Score:5, Interesting)
Re: (Score:2)
Red herring. Efast didn't arrive to people's computers via official channels. Linux is just as vulnerable to malware when stuff is being installed via unofficial channels.
... which means that you didn't read the full contents of what i wrote before posting. in paragraph (5) i made this exact point. so you not only didn't read what i wrote, but you then detracted from the *actual* point being made, by criticising what was written without proper thought and consideration on your part.
you then go on to conclude that i must be on a "high horse", but at the point at which you clearly didn't read each and every paragraph, i lost interest in reading further because you clearly de
Re:lesson learned? (Score:4, Interesting)
That may be true but the software could be full of security holes. Millions of people compiled OpenSSL while never once reading it. Turned out to be swiss cheese.
Re: (Score:2, Insightful)
printf("\v"); [cmu.edu] This was published in August 1984, and credits other work prior to that, including a security critique of an "early version of Multics". It's a 40 year old attack. Your "full trust" argument is bullshit. There are mitigations for this specific trust attack, but they're not practiced widely. And other similar trust attacks aren't mitigated at all.
If someone writes malware for Linux, there will be malware for Linux. (And it has already happened.) The only thing keeping malware on Linux from be
Which attacks need to be mitigated? (Score:2)
There are mitigations for this specific trust attack, but they're not practiced widely.
I assume you're referring to David A. Wheeler's "diverse double-compiling" mitigation for the Ken Thompson attack. How are you sure that the major GNU/Linux distributors don't do this on their compile farms?
And other similar trust attacks aren't mitigated at all.
To which "similar trust attacks" do you refer, so that we can put them on the wishlist for mitigation?
Cost of attending key-signing parties (Score:2)
GNU/Linux Distributions have a digitally-signed audit trail that goes all the way back to multiply personally-verified GPG key signatures. *NO* malware gets through that process - absolutely none.
By "multiply personally-verified GPG key signatures", I assume you're referring to the requirement to attend a key-signing party in person [debian.org] with a Debian Developer. For upstream maintainers who live outside cycling distance of a Debian Developer willing to act as a sponsor for the upstream maintainer's package, this could end up throwing out the baby (a useful application that happens to have been developed by an upstream maintainer living far from the nearest Debian Developer) with the bathwater (malware).
i just cannot be bothered to compile software from source these days unless it's absolutely essential. ... but why put yourself through that??
B
To be fair... (Score:2)
Well...
Re: (Score:2)
not even microsoft or apple, no matter how they try, can replicate this audit trail,
Yes, it can. My OS X understands signed installs just like my Debian does. Both will not let me install an unsigned package without me explicitly saying "ok, do it".
Which is exactly what this and any other malware will do. It will not be signed, it will need a user to click an ok button, and most users will do it, because 10+ years of useless windows popup-windows with pointless "are you sure?" cover-your-ass messages have trained them to hit the green "ok, whatever" button.
Re: (Score:1)
Yes, it can. My OS X understands signed installs just like my Debian does. Both will not let me install an unsigned package without me explicitly saying "ok, do it".
I don't think you understand what the word trail means.
Re: (Score:3)
Really? Let me check, certificate-based systems are entirely designed around a chain of signatures. GPG signatures are... uh... well, if it's in your keychain, it will be accepted. The workaround is to sign the package that contains the public keys.
Don't get me wrong, I like the Debian approach, it's practical and it works. But I think you are being a little too ideological.
Re: (Score:2)
I am not sure how this post got moderated "Informative".
Sorry, but you are seriously ignorant about how Linux package repositories work. There is not GPG signature "audit trail". Only the packages uploaded to the repositories are signed. The distros only package the code - do you really believe (and trust) that the person who has compiled and signed the package has actually verified that it is malware free? Or that everyone who posts whatever code to Github or wherever else where the distro gets their softw
Re: lesson learned? (Score:2)
gnu is a small and shrinking past of most distros. L
Re: (Score:2)
people who install GNU/Linux OSes don't do it "because it's fun" or "because they want a challenge of running command-line tools", they do it because they *know* and trust the digital audit trail based on the publicly-verifiable reputation of the 1000+ developers behind each distribution, and, because that trail exists, they can feel that they're safe from malware and spyware when they follow the install procedures that come with their OS.
I install Linux because it's fun and I enjoy running command line tools.
I did so back in the days when your only option for installing software was to download the source code and compile it.
I have been doing so since before GPG existed (PGP was around, but people didn't sign packages with it).
I have been doing so since before Debian started signing their repositories.
I've watched Red Hat users install RPMs downloaded from third party sites because they had no recourse - Red Hat did not have the comprehensi
Follow the money (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
Yeah well.. (Score:2, Flamebait)
Possible eFast Suspect (Score:4, Informative)
Going through the SF repository for eFast, I have a name of one Mr. Isarith Mahappu K, of No: 15, Chapel Terrace, Stafford, ST163AH.
Last time I can see that property for sale on the market was 14 Dec, 2007. Odds are it is still owned, probably by this same person.
Burning Question... (Score:5, Funny)
Can I install the Ask toolbar on it?
Badly named (Score:2)
They should have called this thing Cymothoa Exigua [google.ca] instead.
what's different (Score:2)
How is that different than Chrome itself? Isn't that the point of Google's browser; to serve 3rd party ads to me and track my usage?
eFast Browser malicious adware .. (Score:2)
Great Firewall (Score:3)
Why would people go to download Chrome from a site that isn't the official Google page?
One possibility is that someone lives in a country where all ISPs block downloads from Google.
Re: (Score:2)
One possibility is that someone lives in a country where google blocks all access.
FTFY
FWIW I live in one so it's real, I assure you that one.
Re: (Score:2)
It can happen more easily than you think. Google "download chrome" and see what you get. The 4th choice was some scum-bag site which may actually provide eFast.