Jump to content

Chrome users faces 3 security issues over the past 24 hours

wall03

Summary

 

Users of Google’s Chrome browser have faced three security concerns over the past 24 hours in the form of a malicious extension with more than 2 million users, a just-fixed zero-day, and new information about how malware can abuse Chrome's sync feature to bypass firewalls

 

Quotes

Quote

First up, the Great Suspender, an extension with more than 2 million downloads from the Chrome Web Store, has been pulled from Google servers and deleted from users’ computers. The extension has been an almost essential tool for users with small amounts of RAM on their devices. Since Chrome tabs are known to consume large amounts of memory, the Great Suspender temporarily suspends tabs that haven’t been opened recently. That allows Chrome to run smoothly on systems with modest resources.

 

Google's official reason for the removal is characteristically terse. Messages displayed on devices that had the extension installed say only, “This extension contains malware” along with an indication that it has been removed. A Google spokesman declined to elaborate.

 

The longer back story is that, as reported in a GitHub thread in November, the original extension developer sold it last June, and it began showing signs of malice under the new ownership. Specifically, the thread said, a new version contained malicious code that tracked users and manipulated Web requests.

 

 

Next, Google on Thursday released a Chrome update that fixes what the company said was a zero-day vulnerability in the browser. Tracked as CVE-2021-21148, the vulnerability stems from a buffer overflow flaw in V8, Google’s open-source JavaScript engine. Google rated the severity as “high.”

 

Once again, Google provided minimal information about the vulnerability, saying only that the company “is aware of reports that an exploit for CVE-2021-21148 exists in the wild.”

In a post published Friday by security firm Tenable, however, researchers noted that the flaw was reported to Google on January 24, one day before Google’s threat analysis group dropped a bombshell report that hackers sponsored by a nation-state were using a malicious website to infect security researchers with malware. Microsoft issued its own report speculating that the attack was exploiting a Chrome zero-day.

 

 

Lastly, a security researcher reported on Thursday that hackers were using malware that abused the Chrome sync feature to bypass firewalls so the malware could connect to command and control servers. Sync allows users to share bookmarks, browser tabs, extensions, and passwords across different devices running Chrome.

 

The attackers used a malicious extension that wasn’t available in the Chrome Web Store. The above link provides a wealth of technical details.

 

A Google spokesman said that developers won’t be modifying the sync feature because physically local attacks (meaning those that involve an attacker having access to the computer) are explicitly outside of Chrome's threat model.” He included this link, which further explains the reasoning.

 

My thoughts

Welp... maybe we shouldn't all rely on Chrome 100% of the time?

 

Sources

https://arstechnica.com/information-technology/2021/02/chrome-users-have-faced-3-security-concerns-over-the-past-24-hours/

please quote me or tag me @wall03 so i can see your response

motherboard buying guide      psu buying guide      pc building guide     privacy guide

ltt meme thread

folding at home stats

 

pc:

 

RAM: 16GB DDR4-3200 CL-16

CPU: AMD Ryzen 5 3600 @ 3.6GHz

SSD: 256GB SP

GPU: Radeon RX 570 8GB OC

OS: Windows 10

Status: Main PC

Cinebench R23 score: 9097 (multi) 1236 (single)

 

don't some things look better when they are lowercase?

-wall03

 

hello dark mode users

goodbye light mode users

Link to comment
Share on other sites

Link to post
Share on other sites

Me reading this while using Google Chrome:

5e87db3b9d84ea88ce4caf4840c6929e.jpg

 

5 minutes ago, wall03 said:

The attackers used a malicious extension that wasn’t available in the Chrome Web Store. The above link provides a wealth of technical details.

On a more serious note, if the extension isn't available in the Chrome Web Store, how would people actually have it on their computer for the attackers to utilize?

I mostly speak from my own past experience from similar problems. My solution may not work for you, but I'll always try my best to help as much as I can. If you want me to see your reply, make sure to quote my comment or mention me @WaggishOhio383, and I'll get back to you as soon as possible.

 

-- My PC Build --

Ryzen 7 2700x

AsRock B450 Steel Legend

XFX RX 590 Fatboy

Crucial Ballistix Tactical Tracer RGB 16GB 3200MHz
120GB Crucial BX500 SSD + 2TB Seagate Barracuda HDD

Corsair CX650M

Phanteks Eclipse P350x

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, WaggishOhio383 said:

Me reading this while using Google Chrome:

5e87db3b9d84ea88ce4caf4840c6929e.jpg

 

On a more serious note, if the extension isn't available in the Chrome Web Store, how would people actually have it on their computer for the attackers to utilize?

Is that an iMac G5?

Yep, that's an iMac G5.
And which extension?

elephants

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, WaggishOhio383 said:

On a more serious note, if the extension isn't available in the Chrome Web Store, how would people actually have it on their computer for the attackers to utilize?

The article in the link describes how: 

Quote

In this case, however, the attackers did not use Chrome Web Store but dropped the extension locally in a folder and loaded it directly from Chrome on a compromised workstation. This is actually a legitimate function in Chrome – you can access it by going to More Tools -> Extensions and enabling Developer mode, after which you can load any extensions locally, directly from a folder by clicking on "Load unpacked":

So it sounds like the attacker would need physical access to a computer with your Chrome account logged in, if I understand it correctly.

Link to comment
Share on other sites

Link to post
Share on other sites

Good luck finding a good browser that isn't based on Chromium these days.  Let's all just switch to Netscape. 

 

On a serious note though, I see this as less of an issue with Chrome (although there was a CVE), I consider this to me more a message to everyone regardless of browser, that extensions are applications that run inside of your browser, and as browsers become more capable, these extensions can have greater capabilities in an OS-Interaction Context. 

 

Be careful of what permissions you give extensions - if it looks like  it's using more than it needs, maybe don't install it until you've further researched it. 

 

This could've been very close to a "millions of Chrome users passwords sent to Chinese Public Cloud Servers"  Luckily though, the intentions of the malicious party was probably only advertising fraud. 

 

 

8 minutes ago, WaggishOhio383 said:

On a more serious note, if the extension isn't available in the Chrome Web Store, how would people actually have it on their computer for the attackers to utilize?

 

I think it was available in the web store, and the compromised version was in the web store which ended up losing track with it's Git Commits.   So effectively, users viewing the Git Repository for the extensions weren't aware of the malicious scripts being executed.   It was removed from the Web Store recently though. 

 

If you use this after June, then you are affected. 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, The_russian said:

The article in the link describes how: 

So it sounds like the attacker would need physical access to a computer with your Chrome account logged in, if I understand it correctly.

I could've read the reference article incorrectly, but here's a statement from it: 

 

"Using the chrome web store version 7.1.8 of this extension, without disabling tracking, executed code from an untrusted third-party on your computer, with the power to modify any and all websites that you see"

 

I personally didn't see any reference to the necessity to manually install the extension onto your workstation.  I thought that the maintainer put bad code on the Chrome Store but didn't make the same changes on GitHub. 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Akolyte said:

I could've read the reference article incorrectly, but here's a statement from it: 

 

"Using the chrome web store version 7.1.8 of this extension, without disabling tracking, executed code from an untrusted third-party on your computer, with the power to modify any and all websites that you see"

 

I personally didn't see any reference to the necessity to manually install the extension onto your workstation.  I thought that the maintainer put bad code on the Chrome Store but didn't make the same changes on GitHub. 

I see why there's confusion. The story is about 3 different security issues. You are referring to the first one, the The Great Suspender extension. I was replying to someone asking about the third security issue, how attackers used a malicious extension not found on the Chrome web store that abused Chrome's sync feature. 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, Akolyte said:

Good luck finding a good browser that isn't based on Chromium these days.  Let's all just switch to Netscape. 

 

On a serious note though, I see this as less of an issue with Chrome (although there was a CVE), I consider this to me more a message to everyone regardless of browser, that extensions are applications that run inside of your browser, and as browsers become more capable, these extensions can have greater capabilities in an OS-Interaction Context. 

 

Be careful of what permissions you give extensions - if it looks like  it's using more than it needs, maybe don't install it until you've further researched it. 

 

This could've been very close to a "millions of Chrome users passwords sent to Chinese Public Cloud Servers"  Luckily though, the intentions of the malicious party was probably only advertising fraud. 

 

 

 

I think it was available in the web store, and the compromised version was in the web store which ended up losing track with it's Git Commits.   So effectively, users viewing the Git Repository for the extensions weren't aware of the malicious scripts being executed.   It was removed from the Web Store recently though. 

 

If you use this after June, then you are affected. 

Google did do a fairly effective job forcing that one.  Same technique as microsoft used for things like C sharp.  They didn’t quite follow protocols but claimed they did.  Then they gave away free tools which would produce code that only really worked reliably with chromium browsers.

Not a pro, not even very good.  I’m just old and have time currently.  Assuming I know a lot about computers can be a mistake.

 

Life is like a bowl of chocolates: there are all these little crinkly paper cups everywhere.

Link to comment
Share on other sites

Link to post
Share on other sites

Wait, does Chrome not put inactive tabs to sleep? 

Laptop: 2019 16" MacBook Pro i7, 512GB, 5300M 4GB, 16GB DDR4 | Phone: iPhone 13 Pro Max 128GB | Wearables: Apple Watch SE | Car: 2007 Ford Taurus SE | CPU: R7 5700X | Mobo: ASRock B450M Pro4 | RAM: 32GB 3200 | GPU: ASRock RX 5700 8GB | Case: Apple PowerMac G5 | OS: Win 11 | Storage: 1TB Crucial P3 NVME SSD, 1TB PNY CS900, & 4TB WD Blue HDD | PSU: Be Quiet! Pure Power 11 600W | Display: LG 27GL83A-B 1440p @ 144Hz, Dell S2719DGF 1440p @144Hz | Cooling: Wraith Prism | Keyboard: G610 Orion Cherry MX Brown | Mouse: G305 | Audio: Audio Technica ATH-M50X & Blue Snowball | Server: 2018 Core i3 Mac mini, 128GB SSD, Intel UHD 630, 16GB DDR4 | Storage: OWC Mercury Elite Pro Quad (6TB WD Blue HDD, 12TB Seagate Barracuda, 1TB Crucial SSD, 2TB Seagate Barracuda HDD)
Link to comment
Share on other sites

Link to post
Share on other sites

9 hours ago, gabrielcarvfer said:

Netscape/Firefox? After the deranged CEO nonsense, it's not an option.

can you elaborate?

MSI GX660 + i7 920XM @ 2.8GHz + GTX 970M + Samsung SSD 830 256GB

Link to comment
Share on other sites

Link to post
Share on other sites

This just makes me more glad I switched to Firefox.

Currently focusing on my video game collection.

It doesn't matter what you play games on, just play good games you enjoy.

 

Link to comment
Share on other sites

Link to post
Share on other sites

On 2/5/2021 at 11:00 PM, Akolyte said:

Good luck finding a good browser that isn't based on Chromium these days.

Samsung internet? 

 

Although it's not as good as it used to be so maybe it's chromium based also... 

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×