February 23, 2017 By Douglas Bonderud 2 min read

Chrome dominates the desktop web browser market, with more than 40 percent of users opting for Google’s internet environment. But big numbers create a big target — malicious actors are always looking for new ways to add malware, redirect requests or install malicious apps.

As noted by Malwarebytes, cybercriminals have developed a malvertising Google Chrome extension that bullies its way onto victim machines to serve incessant ad offers, fraudulent get-rich-quick schemes and tech support scams. Here’s a look at the newest rogue extension rollout.

Malvertising Mania

It all starts with profiling. When users visit a compromised website, they are evaluated based on their displayed user-agent string. Next, they’re redirected to a bogus site that attempts to install a new Google Chrome extension. The site opens multiple windows along with a dialog box that provides only one choice: “Add extension to leave.”

Once installed, the new software hides itself in a 1×1 pixel image and hooks chrome://extensions and chrome://settings to chrome://apps, meaning any attempt by users to discover what extensions they’re running or to change browser settings is instead redirected to the Chrome apps page. In addition, the rogue installation communicates with a command-and-control (C&C) server to both receive instructions and relay user information.

Obfuscated Java files, meanwhile, contain more specific directions for the new extension: If users attempt to access spam- or malware-detection sites, they’re sent to a YouTube video and then a series of potentially unwanted programs in the get-rich-right-now or act-fast-for-a-great-deal vein. Additionally, if users attempt to open a new tab or type in specific keywords, they’re given a fake Microsoft warning and taken to a fraudulent tech support page.

Google has already pulled the malicious extension from its store, according to the Malwarebytes report. Users who are already infected but can’t remove the software manually should run an up-to-date malware scan.

Schemes Go Beyond a Google Chrome Extension

This rogue Google Chrome extension isn’t the only high-profile attack currently in the wild. According to Forbes, there’s a new social engineering attack trying to convince users that they’re missing a critical Chrome component. Specifically, it wants users to install the HoeflerText font package.

After visiting a compromised site, a pop-up warns users that HoeflerText wasn’t found and displays supposed version numbers showing that Chrome is out of date. If users agree to the download, they don’t get a new font but do get a fresh install of the Spora ransomware.

Most malware detection programs won’t catch this one since Hoefler is actually a real font and appears in Chromium source code. The Chrome browser itself will warn users that this package is “not commonly downloaded” and provide a convenient “discard” button, according to a NeoSmart Technologies blog.

The bottom line is that Chrome’s popularity provides security strength — Google has massive amounts of data to help improve browser defense — but also makes it a prime target for cybercriminals. Right now, the biggest user threats come in two forms: ransomware via fake fonts and malvertising through bully-based extensions. Both cover their tracks and attempt to fully compromise user machines. However, with preventative malware scans and information directly from Google, users can minimize the risk for their browsers on a daily basis.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today