• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users

flyytech by flyytech
August 30, 2022
Home Security
Share on FacebookShare on Twitter


Authored by Oliver Devane and Vallabh CholeĀ 

A few months ago, we blogged about malicious extensions redirecting users to phishing sites and inserting affiliate IDs into cookies of eCommerce sites. Since that time, we have investigated several other malicious extensions and discovered 5 extensions with a total install base of over 1,400,000

The extensions offer various functions such as enabling users to watch Netflix shows together, website coupons, and taking screenshots of a website. The latter borrows several phrases from another popular extension called GoFullPageĀ 

Apart from offering the intended functionality, the extensions also track the user’s browsing activity.Ā  Every website visited is sent to servers owned by the extension creator. They do this so that they can insert code into eCommerce websites being visited. This action modifies the cookies on the site so that the extension authors receive affiliate payment for any items purchased.Ā Ā Ā Ā 

The users of the extensions are unaware of this functionality and the privacy risk of every site being visited being sent to the servers of the extension authors.Ā Ā 

The 5 extensions areĀ Ā 

NameĀ  Extension IDĀ  UsersĀ 
Netflix PartyĀ  mmnbenehknklpbendgmgngeaignppnbeĀ  800,000Ā 

Netflix Party 2Ā 

flijfnhifgdcbhglkneplegafminjnhnĀ  300,000Ā 

FlipShope – Price Tracker ExtensionĀ 

Ā 

adikhbfjdbjkhelbdnffogkobkekkkejĀ  80,000Ā 

Full Page Screenshot Capture – ScreenshottingĀ 

Ā 

pojgkmkfincpdkdgjepkmdekcahmckjpĀ  200,000Ā 
AutoBuy Flash SalesĀ  gbnahglfafmhaehbdmjedfhdmimjcbedĀ  20,000Ā 

Ā 

Technical AnalysisĀ 

This section contains the technical analysis of the malicious chrome extension ā€˜mmnbenehknklpbendgmgngeaignppnbe’. All 5 extensions perform similar behavior.Ā Ā Ā 

Manifest.jsonĀ 

Ā 

The manifest.json sets the background page as bg.html. This HTML file loads b0.js and this is responsible for sending the URL being visited and injecting code into the eCommerce sites.Ā 

B0.jsĀ 

The b0.js script contains many functions. This blog will focus on the functions which are responsible for sending the visited URLs to the server and processing the response.Ā Ā 

Chrome extensions work by subscribing to events which they then use as triggers to perform a certain activity. The extensions analyzed subscribe to events coming from chrome.tabs.onUpdated. chrome.tabs.onUpdated will trigger when a user navigates to a new URL within a tab.

Once this event triggers, the extension will set a variable called curl with the URL of the tab by using the tab.url variable. It creates several other variables which are then sent to d.langhort.com. The POST data is in the following format:

VariableĀ  DescriptionĀ 
RefĀ  Base64 encoded referral URLĀ 
CountyĀ  The county of the deviceĀ 
CityĀ  The city of the deviceĀ 
ZipĀ  The zip code of the deviceĀ 
ApisendĀ  A random ID generated for the user.Ā 
NameĀ  Base64 encoded URL being visitedĀ 
ext_nameĀ  The name of the chrome extensionsĀ 

Ā 

The random ID is created by selecting 8 random characters in a character set. The code is shown below:Ā 

The country, city, and zip are gathered using ip-api.com. The code is shown below:Ā 

Upon receiving the URL, langhort.com will check if it matches a list of websites that it has an affiliate ID for, and If it does, it will respond to the query. An example of this is shown below:Ā 

The data returned is in JSON format. The response is checked using the function below and will invoke further functions depending on what the response contains.Ā 

Two of the functions are detailed below:Ā 

Result[ā€˜c’] – passf_urlĀ 

If the result is ā€˜c’ such as the one in this blog, the extension will query the returned URL. It will then check the response and if the status is 200 or 404, it will check if the query responded with a URL. If it did, it would insert the URL that is received from the server as an Iframe on the website being visited.Ā Ā 

Result[ā€˜e’] setCookieĀ 

If the result is ā€˜e’, the extension would insert the result as a cookie. We were unable to find a response of ā€˜e’ during our analysis, but this would enable the authors to add any cookie to any website as the extensions had the correct ā€˜cookie’ permissions.Ā Ā 

Behavioral flowĀ 

The images below show the step-by-step flow of events while navigating to the BestBuy website.Ā Ā 

  1. The user navigates to bestbuy.com and the extension posts this URL in a Base64 format to d.langhort.com/chrome/TrackData/Ā 
  2. Langhort.com responds with ā€œcā€ and the URL. The ā€œcā€ means the extension will invoke the function passf_url()Ā 
  3. passf_url() will perform a request against the URLĀ 
  4. the URL queried in step 3 is redirected using a 301 response to bestbuy.com with an affiliate ID associated with the Extension ownersĀ 
  5. The extension will insert the URL as an Iframe in the bestbuy.com site being visited by the userĀ 
  6. Shows the Cookie being set for the Affiliate ID associated with the Extension owners. They will now receive a commission for any purchases made on bestbuy.comĀ Ā 

Here is a video of the eventsĀ 

Time delay to avoid automated analysisĀ 

We discovered an interesting trick in a few of the extensions that would prevent malicious activity from being identified in automated analysis environments. They contained a time check before they would perform any malicious activity. This was done by checking if the current date is > 15 days from the time of installation.Ā Ā 

Conclusion  

This blog highlights the risk of installing extensions, even those that have a large install base as they can still contain malicious code.Ā Ā 

McAfee advises its customers to be cautious when installing Chrome extensions and pay attention to the permissions that they are requesting.   

The permissions will be shown by Chrome before the installation of the extension. Customers should take extra steps to verify the authenticity if the extension is requesting permissions that enable it to run on every website you visit such as the one detailed in this blog  

McAfee customers are protected against the malicious sites detailed in this blog as they are blocked with McAfee WebAdvisor as shown below.   

The Malicious code within the extension is detected as JTI/Suspect. Please perform a ā€˜Full’ scan via the product.  

TypeĀ  ValueĀ  ProductĀ  DetectedĀ 
Chrome ExtensionĀ  Netflix Party – mmnbenehknklpbendgmgngeaignppnbeĀ  Total Protection and LiveSafeĀ  JTI/SuspectĀ 
Chrome ExtensionĀ  FlipShope – Price Tracker Extension – adikhbfjdbjkhelbdnffogkobkekkkejĀ  Total Protection and LiveSafeĀ  JTI/SuspectĀ 
Chrome ExtensionĀ  Full Page Screenshot CaptureĀ 

pojgkmkfincpdkdgjepkmdekcahmckjpĀ 

Total Protection and LiveSafeĀ  JTI/SuspectĀ 
Chrome ExtensionĀ  Netflix Party 2 – flijfnhifgdcbhglkneplegafminjnhnĀ  Total Protection and LiveSafeĀ  JTI/SuspectĀ 
Chrome ExtensionĀ  AutoBuy Flash SalesĀ  gbnahglfafmhaehbdmjedfhdmimjcbedĀ  Total Protection and LiveSafeĀ  JTI/SuspectĀ 
URLĀ  www.netflixparty1.comĀ  McAfee WebAdvisorĀ  BlockedĀ 
URLĀ  netflixpartyplus.comĀ  McAfee WebAdvisorĀ  BlockedĀ 
URLĀ  flipshope.comĀ  McAfee WebAdvisorĀ  BlockedĀ 
URLĀ  goscreenshotting.comĀ  McAfee WebAdvisorĀ  BlockedĀ 
URLĀ  langhort.comĀ  McAfee WebAdvisorĀ  BlockedĀ 
URLĀ  Unscart.inĀ  McAfee WebAdvisorĀ  BlockedĀ 
URLĀ  autobuyapp.comĀ  McAfee WebAdvisorĀ  BlockedĀ 





Source_link

flyytech

flyytech

Next Post
How to publish a book on your own in 2022

How to publish a book on your own in 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Alfred Camera Error Code List

Alfred Camera Error Code List

January 7, 2023
Malware Remains a Potent Threat, 10 Years Since ‘Shamoon’

Malware Remains a Potent Threat, 10 Years Since ‘Shamoon’

November 16, 2022

Trending.

Shop now. Pay later. on the AppĀ Store

Shop now. Pay later. on the AppĀ Store

February 25, 2023
Volla Phone 22 review

Volla Phone 22 review

March 26, 2023
USIU student team qualifies for Microsoft Imagine Cup World Championship

USIU student team qualifies for Microsoft Imagine Cup World Championship

April 5, 2023
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
Google 3D animals & AR objects: Full list & gallery

Google 3D animals & AR objects: Full list & gallery

December 27, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

TSMC Is Sprinting to 2nm to Satisfy Demand From Nvidia, Apple

TSMC Is Sprinting to 2nm to Satisfy Demand From Nvidia, Apple

June 5, 2023
Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

June 5, 2023

Copyright Ā© 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright Ā© 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking ā€œAccept Allā€, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT