Researcher to demonstrate feature-rich malware that works as a browser extension

The code for the proof-of-concept rogue browser extension will be released on GitHub

Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages, downloading and executing files, hijacking accounts, bypassing two-factor authentication security features enforced by some websites, and much more.

Balazs, who works as an IT security consultant for professional services firm Deloitte in Hungary, created the proof-of-concept malware in order to raise awareness about the security risks associated with browser extensions and as a call to the antivirus industry to take this type of threat more seriously.

The researcher plans to release the malware's source code on GitHub during a presentation at the Hacker Halted security conference in Miami next Tuesday, after having shared the code in advance with antivirus vendors.

There are known cases of cybercriminals using malicious browser extensions. For example, in May, the Wikimedia Foundation issued an alert about a Google Chrome extension that was inserting rogue ads into Wikipedia pages.

So far, cybercriminals have primarily used malicious browser extensions to perform click fraud by inserting rogue advertisements into websites or hijacking search queries. However, Balazs' project demonstrates that this type of malware could be used to launch far more serious attacks.

The researcher created versions of his proof-of-concept extension for Firefox, Chrome and Safari. A version for Internet Explorer might also be developed in the future, Balazs said on Wednesday.

The extension can be used to steal session cookies and even circumvent two-factor authentication systems like the one implemented by Google, the researcher said. This would allow attackers to hijack accounts on different websites.

The Firefox version can also: steal passwords from the browser's built-in password manager; download and execute files (only on Windows); modify the content of Web pages in the same way that banking Trojans modify online banking websites to hide rogue transaction records; take screen shots through the computer's webcam by accessing a Flash application hosted on a Web page; act as an HTTP proxy that allows an attacker to communicate with a server on the victim's internal network, and more.

The extension also works in Firefox for Android, where it loses some functionality because of the operating system's restrictions but gains some other capabilities like the ability to determine a device's geographical coordinates, Balazs said.

The Chrome version of the extension cannot be used to download, upload or execute files at the moment. "There are ways to do this, but I didn't have time to implement them yet," Balazs said.

However, Chrome's support for Native Client (NaCl), a sandboxing technology that allows Web applications to run C or C++ code inside the browser, can be leveraged by the Chrome extension to efficiently crack password hashes.

"One of my colleagues wrote a distributed password hash cracker module for Chrome's Native Client, so this means that we can send the hashes to the victim's browser and we can use the computer's CPUs to crack them," Balazs said.

The Safari version was easy to create because Chrome extensions can be easily converted to Safari extensions, Balazs said.

A browser infected with the extension can be controlled in the same way as a botnet client, because the extension can receive instructions from a website and can send information back to the attackers. Because this looks like normal HTTP traffic initiated by the browser, it's hard for local or network-level firewalls to block it.

The difficulty of distributing malicious browser extensions differs from browser to browser.

In Firefox, the easiest method is social engineering -- tricking users into installing the extensions, Balazs said. This is possible because Firefox allows the installation of extensions from third-party websites and many users are used to installing extensions in this way.

However, unlike Firefox, Chrome only allows users to install extensions from the official Chrome Web Store, Balazs said. So, unless the attacker manages to upload the malicious extension on the Chrome Web Store, social engineering is not an option.

The offline installation of extensions from unverified sources by copying the extension files in the right places and making the necessary modifications to the browser files is possible in both browsers if the attacker already has code execution access on the system, Balazs said.

Firefox normally notifies users during the browser start-up sequence about extensions that have been installed offline and asks for confirmation before enabling them. However, Balazs claims that he can bypass this feature in order to perform completely silent installations.

The researcher didn't manage to achieve silent extension installs in Chrome yet. However, he is aware of other malware samples that are able to do this, so he believes that it is possible.

Browser vendors like Mozilla and Apple should restrict the online installation of extensions only to their official repositories, like Google does in Chrome, Balazs said. That will really help in the long run, he said.

In addition, antivirus vendors should pay more attention to malicious browser extensions and improve their detection for this type of malware, the researcher said.

VirusTotal scans for publicly available samples of known malicious browser extensions showed that antivirus detection for them is almost non-existent, Balazs said Wednesday.

The researcher claims that even after some antivirus vendors added detection signatures for his proof-of-concept extension, he was able to evade detection again by making simple modifications to the code.

Join the Good Gear Guide newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags applicationsonline safetysecurityDesktop securitybrowserssoftwaremalwaremozillaDeloitteAppleGoogle

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Armand Abogado

HP OfficeJet 250 Mobile Printer

Wireless printing from my iPhone was also a handy feature, the whole experience was quick and seamless with no setup requirements - accessed through the default iOS printing menu options.

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?