SlideShare a Scribd company logo
Hack Firefox to steal  web-secrets Sunil Arora
How many of you use Firefox ?
Firefox and extensions Firefox  Claimed to be  most secure  and  most efficient  web browser Firefox extensions A way to extend Firefox to customize or add more functionality to it Most of the popular websites (Google, Stumbleupon, Facebook etc.) provide their toolbar in form of extension Popular functionalities like FTP, CHMReader, Flashblock, Adblock etc are available in form extensions
Agenda Malware overview Malware – How it works A look at existing vulnerabilities How malware can find its way on to victim’s Firefox  Live demo
Lets meet john Uses internet for social networking. For example Facebook, orkut, myspace etc. Uses Email for professional as well as personal communication. For ex. Gmail, Yahoo or Corporate webemail Uses internet for his credit card transactions. For ex. Citibank, ICICI bank, HSBC etc Uses internet banking for managing his day to day finance activity Blogs on internet for professional as well as personal purpose.
John’s online world Problem Statement How to retrieve values of elements like username, password, credit card number, IPIN etc for a particular web resource   (Gmail /Yahoo/Banking website etc)
Malware -Architecture Our Malware is nothing but a malicious Firefox extension Target List Secret List Secret Collector Engine Communicator Module
Intercept http requests being made by the browser Malware - Secret Collector -I Normal http request  process Parse http request And Retrieve user typed Web secrets
Malware - Secret Collector - II Different Components within the Firefox can register to send/receive notifications. Some standard notifications -- quit-application  memory-pressure Domwindowopened / domwindowclosed http-on-modify-request / http-on-examine-response  How to intercept  http request “ Notifications” mechanism in Firefox ???
Malware -Target List Set of websites we want to steal secrets for URL:   https://www.google.com/Auth Number of attributes:  2 Attribute Names:  Email, Passwd
Malware - Secret List Set of collected secrets URL:   https://www.google.com/Auth Number of attributes:  2 Name:  Email, Value:john@gmail.com Name: Passwd  Value :helloworld
Communicator Module Target List Secret List Internet
How it can find its way to john’s Firefox - I Installing malicious extension Command line silent install (firefox.exe –install –silent …XXX) Using Firefox’s extension installation wizard Copy malicious extension’s file in extension directory of Firefox
Exploit FireFox’s vulnerability (For ex. Extension upgrade vulnerability, quicktime RSTP vulnerability) to push the extension Installing the malicious extension exploiting vulnerability in some other existing application Bundle  it  in some other popular extension and redistribute Host malicious extension on a webserver and craft a webpage to drive user to install the hosted extension How it can find its way to john’s FireFox - II
Firefox extension upgrade vulnerability Firefox upgrade mechanism enabling the extensions to poll an Internet server for updates If an update is available, the extension will typically ask the user if they wish to upgrade, and then will download and install the new code. Extensions fetching update from a  http ://www.xxx.com  (non-SSL webserver) instead of  https: //www.xxx.com  (SSL enabled webserver) are vulnerable to DNS based man in the middle attack.
Facebook Extension Facebook is a very popular social network site. It provides a FF toolbar as an FF extension. Any FF with facebook toolbar (v 1.1) is vulnerable to update vulnerability. Package our malicious extension in existing facebook toolbar (v1.6) and will push it through the update vulnerability Once malicious extension is installed in FF. The victim’s FF is compromised.
Attack Flow Facebook extension update Server Attacker’s update Server Hosting malicious extension John’s FF running Facebook extension Hacker running Master Server X Y Untrusted public network What is IP of update server Update server is at Y Fetches Target Lists Sends collected Secrets
Advisory Do not use public computer for important information exchange Up-to-date Software Install Firefox extensions from authentic sources (https://addons.mozilla.org) only Regularly check list of installed extensions Observe Firefox’s performance. Anomaly in performance may be due to an unwanted extension Do not ignore extension install warning
Thank U [email_address]

More Related Content

PPTX
Wordpress security 101 202
PPT
Security presentation
PPTX
Vulnerability assessment of PHP Frameworks
PDF
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
PDF
Wannacry Virus
PDF
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
PPT
Today's malware aint what you think
PPTX
The trojan horse virus
Wordpress security 101 202
Security presentation
Vulnerability assessment of PHP Frameworks
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
Wannacry Virus
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
Today's malware aint what you think
The trojan horse virus

What's hot (8)

PPTX
Web server security challenges
PDF
Techno Savvy Course Presentation
PPTX
Introduction to Malwares
PDF
Ransomware Trends 2017 & Mitigation Techniques
PPTX
MALWARE AND ITS TYPES
PPT
Ne Course Part One
PDF
Scaling Web 2.0 Malware Infection
ODT
Symptoms of aol and remove
Web server security challenges
Techno Savvy Course Presentation
Introduction to Malwares
Ransomware Trends 2017 & Mitigation Techniques
MALWARE AND ITS TYPES
Ne Course Part One
Scaling Web 2.0 Malware Infection
Symptoms of aol and remove

Similar to Hack Firefox to steal websecrets (20)

PDF
Zombie browsers spiced with rootkit extensions - DefCamp 2012
PDF
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
PDF
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
PDF
Hacktivityonly 121013141039-phpapp02
PDF
Elsevier NESE - Spying on the Browser
PPTX
Firefox security (prasanna)
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons
PDF
The Evil Friend in Your Browser
PPTX
Firefox (in)Security
PPTX
Chrome Extensions: Masking risks in entertainment
PDF
Ce hv6 module 53 hacking web browsers
PPTX
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
PDF
Web Security - Introduction v.1.3
PDF
Web Security - Introduction
PPTX
News bytes Sept-2011
PDF
Disclosing Vulnerabilities for Fun and Profit
DOCX
Cisco WebEx vulnerability: it’s a kind of magic
PDF
About Firefox
PDF
Slide
PPT
Security 101
Zombie browsers spiced with rootkit extensions - DefCamp 2012
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Hacktivityonly 121013141039-phpapp02
Elsevier NESE - Spying on the Browser
Firefox security (prasanna)
Abusing, Exploiting and Pwning with Firefox Add-ons
The Evil Friend in Your Browser
Firefox (in)Security
Chrome Extensions: Masking risks in entertainment
Ce hv6 module 53 hacking web browsers
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
Web Security - Introduction v.1.3
Web Security - Introduction
News bytes Sept-2011
Disclosing Vulnerabilities for Fun and Profit
Cisco WebEx vulnerability: it’s a kind of magic
About Firefox
Slide
Security 101

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Hack Firefox to steal websecrets

  • 1. Hack Firefox to steal web-secrets Sunil Arora
  • 2. How many of you use Firefox ?
  • 3. Firefox and extensions Firefox Claimed to be most secure and most efficient web browser Firefox extensions A way to extend Firefox to customize or add more functionality to it Most of the popular websites (Google, Stumbleupon, Facebook etc.) provide their toolbar in form of extension Popular functionalities like FTP, CHMReader, Flashblock, Adblock etc are available in form extensions
  • 4. Agenda Malware overview Malware – How it works A look at existing vulnerabilities How malware can find its way on to victim’s Firefox Live demo
  • 5. Lets meet john Uses internet for social networking. For example Facebook, orkut, myspace etc. Uses Email for professional as well as personal communication. For ex. Gmail, Yahoo or Corporate webemail Uses internet for his credit card transactions. For ex. Citibank, ICICI bank, HSBC etc Uses internet banking for managing his day to day finance activity Blogs on internet for professional as well as personal purpose.
  • 6. John’s online world Problem Statement How to retrieve values of elements like username, password, credit card number, IPIN etc for a particular web resource (Gmail /Yahoo/Banking website etc)
  • 7. Malware -Architecture Our Malware is nothing but a malicious Firefox extension Target List Secret List Secret Collector Engine Communicator Module
  • 8. Intercept http requests being made by the browser Malware - Secret Collector -I Normal http request process Parse http request And Retrieve user typed Web secrets
  • 9. Malware - Secret Collector - II Different Components within the Firefox can register to send/receive notifications. Some standard notifications -- quit-application memory-pressure Domwindowopened / domwindowclosed http-on-modify-request / http-on-examine-response How to intercept http request “ Notifications” mechanism in Firefox ???
  • 10. Malware -Target List Set of websites we want to steal secrets for URL: https://www.google.com/Auth Number of attributes: 2 Attribute Names: Email, Passwd
  • 11. Malware - Secret List Set of collected secrets URL: https://www.google.com/Auth Number of attributes: 2 Name: Email, Value:john@gmail.com Name: Passwd Value :helloworld
  • 12. Communicator Module Target List Secret List Internet
  • 13. How it can find its way to john’s Firefox - I Installing malicious extension Command line silent install (firefox.exe –install –silent …XXX) Using Firefox’s extension installation wizard Copy malicious extension’s file in extension directory of Firefox
  • 14. Exploit FireFox’s vulnerability (For ex. Extension upgrade vulnerability, quicktime RSTP vulnerability) to push the extension Installing the malicious extension exploiting vulnerability in some other existing application Bundle it in some other popular extension and redistribute Host malicious extension on a webserver and craft a webpage to drive user to install the hosted extension How it can find its way to john’s FireFox - II
  • 15. Firefox extension upgrade vulnerability Firefox upgrade mechanism enabling the extensions to poll an Internet server for updates If an update is available, the extension will typically ask the user if they wish to upgrade, and then will download and install the new code. Extensions fetching update from a http ://www.xxx.com (non-SSL webserver) instead of https: //www.xxx.com (SSL enabled webserver) are vulnerable to DNS based man in the middle attack.
  • 16. Facebook Extension Facebook is a very popular social network site. It provides a FF toolbar as an FF extension. Any FF with facebook toolbar (v 1.1) is vulnerable to update vulnerability. Package our malicious extension in existing facebook toolbar (v1.6) and will push it through the update vulnerability Once malicious extension is installed in FF. The victim’s FF is compromised.
  • 17. Attack Flow Facebook extension update Server Attacker’s update Server Hosting malicious extension John’s FF running Facebook extension Hacker running Master Server X Y Untrusted public network What is IP of update server Update server is at Y Fetches Target Lists Sends collected Secrets
  • 18. Advisory Do not use public computer for important information exchange Up-to-date Software Install Firefox extensions from authentic sources (https://addons.mozilla.org) only Regularly check list of installed extensions Observe Firefox’s performance. Anomaly in performance may be due to an unwanted extension Do not ignore extension install warning