Google Chrome Tabs Let Malware Sneak Into Businesses

  /     /     /  
Publicated : 22/11/2024   Category : security


Google Chrome Tabs Let Malware Sneak Into Businesses


Enterprises need to watch for bring your own browser attacks. Using Google Chrome tabs, malware could piggyback into a corporate environment in two ways.



Google Drive: 10 Alternatives To See (click image for larger view and for slideshow)
Google Chrome users: Watch your sync habits. The browsers ability to synchronize tabs across different computers could be used by a malicious attacker to eavesdrop on personal or corporate communications.
The tab-synchronization capability appeared last month in the
latest version
of the Google Chrome browser, and allows users to
synchronize their open browser tabs
across devices. As a result, users can log into any version of the Google Chrome browser--on home PCs, work PCs, or mobile devices--and access their saved tabs.
Unfortunately, the same would go for malware. Consider the following scenario: The user is signed in to Chrome on both work and home computer. ... The home computer gets infected by a malware. Now all of the work synced data (such as work-related passwords) is owned by the malware, said Rob Rachwald, director of security strategy at Imperva, in a
blog post
.
We name this kind of threats BYOB for Bring Your Own Browser, he said. While BYOD creates challenges of mixing work data and personal end points, BYOB does exactly the same--but its more elusive as theres no physical device involved.
Furthermore, IT departments could have difficulty successfully spotting and blocking malware that infiltrates the enterprise in this manner, especially given the number of attacks that could be launched from an infected home PC. Even if the malware gets disinfected on work computer, the malware is able to infect over and over again--as the root cause of the infection--the home computer--is outside of the reach of the IT department, Rachwald said.
Two Ways In
Google didnt immediately respond to a request for comment about the feasibility of this attack, or steps that users could take to mitigate this type of threat. To be sure, this is a theoretical attack; no such Chrome-targeting malware campaign has been seen in the wild. But malware could potentially piggyback into a corporate environment, using Chrome tabs, in two ways.
The first exploit technique would be if the malware changes the homepage or some bookmark to point to a malware-infection site on the home computer, said Rachwald. Settings are synced to your work environment. When you open your browser at work, you get infected with some zero-day drive-by download. In this scenario, attackers could instruct the malware to
keep attacking the corporate network
, and even vary the attack being used, in an attempt to evade defenses. This would be difficult for a business to stop with complete reliability.
Even if the malware gets disinfected on work computer, the malware is able to infect over and over again, as the root cause of the infection--the home computer--is outside of the reach of the IT department, he said.
Another potential attack vector would be if the malware installed a rogue Chrome extension, and such extensions have appeared on the official
Chrome Web Store
in the past. As
Google notes
, anyone can upload items to the Chrome Web Store, so you should only install items created by people you trust, and by reviewing the ratings and reviews for an extension to help deduce whether its reliable. Google quickly removes any
malicious Chrome extensions
, once theyre spotted. But until that happens, any malicious extension is able to operate with impunity.
Chrome extensions are evil, noted Felix FX Lindner, head of Recurity Labs in Berlin. That comment came during a talk he delivered at
Black Hat Europe
earlier this year, in which he highlighted how Chrome extensions can be used by an attacker to inject JavaScript directly into the browser. Whats more, any users who sign into Chrome on a different workstation will have their extensions automatically installed on the current PC. As a result, a malicious extension installed at home could easily appear on a workplace PC, creating a vulnerability similar to the one that Rachwald highlighted.
Why are malicious Chrome extensions so dangerous? If you have an extension installed, it has ... pretty much omnipotent control over your Chrome browser, said Lindner, speaking by phone. Google tries to prevent the extension from accessing your extension manager, but weve found ways to do it. Google fixed them, but Im pretty confident that there are other ways.
Preventing users from installing Chrome extensions is nearly impossible. For starters, while the IT department can issue its own Chrome build, and set it to block extensions, you can install and run your own installation of the browser on any PC for which you have permission to write to the home directory--no administrator rights required.
Security defenses also wont spot malicious extensions. This all being JavaScript and HTML, the corporate antivirus is not going to catch it--on top of the fact that youre downloading the extension via SSL from Googles Web store, said Lindner. Unless corporate [IT] breaks SSL for you, theyre not going to see it anyway.
Since the browsers preferences are handled with JavaScript, a malicious extension could automatically--and without a user being aware--install and run arbitrary code in the browser. For example, the extension might unleash a Trojan application that recorded everything the user did, or open a malicious website in the browser. Furthermore, if this extension was first installed at home, it would automatically get pushed to work when the user logged in there.
Attackers arent the only concern for Chrome users, as the Google tab synchronization feature could also be used during
digital forensic investigations
. Imagine theres a case against you at work, and they do forensics, and they get all of your accounts at home, said Lindner.
But the bigger picture, he said, is that users should consider the security implications of synchronizing information between Chrome tabs or even
between Google services
. Im really not sure who would want to: a) give all this information to Google, and then, b) actually sync it onto every single machine theyre using, Lindner said. So much for defense. But maybe Im the wrong person to ask--I dont even have a Google account. Wrong religion.
Employees and their browsers might be the weak link in your security plan. The new, all-digital
Endpoint Insecurity
Dark Reading supplement shows how to strengthen them. (Free registration required.)

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Google Chrome Tabs Let Malware Sneak Into Businesses