SlideShare a Scribd company logo
Introduction


Zoltán Balázs
ITSEC consultant
Deloitte Hungary
Instructor @NetAkademia.hu
OSCP, CISSP, C|HFI, CPTS, MCP
http://www.slideshare.net/bz98


Cyberlympics finals 2012 - 2nd runner up
   Member of the gula.sh team
I love Hacking
I love Zombie movies
I love LOLcats
Zombies + Hacking + LOLcats
 = I R ZOMBIE BROWSER
Zombie browsers,
        spiced with rootkit extensions

                                   Hacker Halted 2012

•   Legal disclaimer:
•   Every point of views and thoughts are mine.
•   The next presentation’s contents do not have any connection with my employers opinion, whether past, present or future.
•   What you will hear can be only used in test labs, and only for the good.
About:presentation

•   History of malicious extensions (add-on, plug-in,
    extension, BHO)

•   Focus on Firefox, Chrome, Safari

•   Advantages – disadvantages

•   Browser extension rootkits

•   Live demo – home made extension
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
History of malicious
     Firefox extensions
•   90% of malicious extensions were created for Facebook
    spamming

•   2004-2010: 5

•   2011: 5

•   Jan 01, 2012 – Oct 23, 2012: 49*



                                          *Data from mozilla.org
More examples on
          Facecrook




Text




              ©f-secure
My zombie extension
• Command and Control
• Stealing cookies, passwords
• Uploading/downloading files (Firefox,
  Chrome NPAPI on todo list)
• Binary execution (Firefox - Windows,
  Chrome NPAPI on todo list)
• Geolocation
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Safari demo
Installing the
     extension
        Physical access
      Social Engineering
Remote code execution – without
        user interaction
Firefox rootkit 1
• Hook into other extension (even signed ones)
Firefox rootkit 2
• visible = false
Firefox rootkit 3
• seen in the wild
Quick Quiz - for Hacker
       Pschorr
Quick Quiz

• Which company
  developed the first
  Netscape plugin?

• *****
Quick Quiz

• Which company
  developed the first
  Netscape plugin?

• A***e
Quick Quiz

• Which company
  developed the first
  Netscape plugin?

• Adobe in 1995
Risks of a Zombie Browser



• Eats your brain while you are asleep
Risks of a Zombie Browser
Risks of a Zombie Browser


• Firewall/proxy 
• Local firewall 
• Application whitelisting 
• Web-filtering 
Risks of a Zombie Browser
•   Cross-platform 
•   Cross-domain Universal XSS 
•   Every secret is available 
    •   Password input method does not matter (password safe, virtual
        keyboard, etc.)
    •   Before SSL (+JS obfuscation)
•   Malicious source codes are available 
•   Advantage against meterpreter 
    •   exe/dll is not needed for persistence
    •   Writing into registry is not needed
Risks of a zombie browser

• Low AV signature based detection rate 
• Sample from January 2011. – October 2012.

             0/40




• Extension vs. behavioral based detection 
Risks of a zombie browser

• Low AV signature based detection rate 
• Sample from January 2011. – October 2012.

            0/40



• Extension vs. behavioral based detection 
Friendly message to AV
  developers: try harder…
Code snippets from undetected malicious browser extension
var
_0x39fe=["x73x63x72x69x70x74","x63x72x65x61x74x65
x45x6Cx65x6Dx65x6E
x74","x74x79x70x65","x74x65x78x74…
_0xaed4=[_0x39fe[0],_0x39fe[1],_0x39fe[2],_0x39fe[3],_0x39fe[4],_0x39f
e[5],_0x39fe[6],_0x39fe[7],_0x39fe[8],_0x39fe[9]];

keylogger_namespace.keylogger…

for(var x in mothership){if (mothership[x].command == "eval")
{eval(mothership[x].data);
Profit ...
Firefox
Disadvantages (for the Hacker)

•   Not a real rootkit

•   Browser limitations (eg. portscan)

•   Platform limitations (eg. Execute binary code only on Windows)

•   Runs in user space

•   Runs only when browser is open

•   Extensions are not yet supported in:

    •   Chrome on Android/iOS

    •   Safari on iOS
Gmail demo
• defeat 2 step verification
• Why Google?
• Hacking “the others” is boring
 • clear text cookies
 • missing 2 step verification
 • no concurrent session detection
Gmail demo


• defeat 2 step verification
One                             to rule them all
•   Cookie + password stealing – defeat Google 2-step verification
•   Use password reset on other sites linked to G-mail (Paypal, etc.)
•   Install any app from Google Play to victim’s Android phone
•   Access Android WIFI passwords
•   Access to Google+, Docs, Picasa, Blogger, Contacts, Web
    history, Checkout, Apps, OpenID
•   Backdooring Google account
    •   Adding application specific password
    •   Stealing backup codes
    •   G-mail mail forward rule
Chrome - rootkit
ChromeOS
DEMO
ChromeOS
DEMO
Not today :-(

no extension install from 3rd
party site

no Flash, no Java, no NPAPI
ChromeOS
DEMO
Not today :-(

no extension install from 3rd
party site

no Flash, no Java, no NPAPI
Zombie Android
         DEMO

• Android SQLite Journal Information
  Disclosure (CVE-2011-3901)
• Android 2.3.7
Firefox webcam
Browser extensions might be bad

•   @antivirus developers

    •   Be reactive

    •   The browser is the new OS

•   @browser developers (Mozilla)

    •   Default deny installing extensions from 3rd-party sites

    •   Chrome-level security

    •   Require permissions

    •   Extension components – separate privileges

•   @browser developers (Google) – keep on the good job

    •   but disable NPAPI :)
Browser extensions might be bad

•   @website developers

    •   There is no prevention against password stealing

    •   Cookie-stealing

    •   Restrict session to IP (by default)

•   @users

    •   Beware of malicious browser extensions

    •   Use separated OS for e-banking and other sensitive stuff

    •   Removing malicious extensions - create new clean profile in clean OS

•   @companies

    •   Control which browsers users can use

    •   Restrict extensions via GPO
One more thing ...
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Should I release
 it on GitHub?
References
•   Grégoire Gentil: Hack any website, 2003

•   Christophe Devaux, Julien Lenoir: Browser rootkits, 2008

•   Duarte Silva: Firefox FFSpy PoC, 2008

•   Andreas Grech: Stealing login details with a Google Chrome
    extension, 2010

•   Matt Johansen, Kyle Osborn: Hacking Google ChromeOS, 2011

•   Nicolas Paglieri: Attacking Web Browsers, 2012
Browser extensions might be bad,
                    Mmmkay???
                zbalazs@deloittece.com
                zbalazs4
                hu.linkedin.com/in/zbalazs

                Code released(?) under GPL
                http://github.com/Z6543/
                ZombieBrowserPack

                Greetz to @hekkcamp

More Related Content

PDF
PDF
Qubes os presentation_to_clug_20150727
PDF
Intro To Gentoo Embedded Cclug
PDF
Hands on Virtualization with Ganeti
PDF
Gentoo Linux, or Why in the World You Should Compile Everything
PDF
[DockerCon 2019] Hardening Docker daemon with Rootless mode
PPTX
QNAP COSCUP Container Station
PDF
[KubeConUS2019 Docker, Inc. Booth] Distributed Builds on Kubernetes with Bui...
Qubes os presentation_to_clug_20150727
Intro To Gentoo Embedded Cclug
Hands on Virtualization with Ganeti
Gentoo Linux, or Why in the World You Should Compile Everything
[DockerCon 2019] Hardening Docker daemon with Rootless mode
QNAP COSCUP Container Station
[KubeConUS2019 Docker, Inc. Booth] Distributed Builds on Kubernetes with Bui...

What's hot (20)

PPTX
OpenWRT and Perl
PPTX
Qt5 (minimal) on beaglebone, with Yocto
PDF
How to Connect MQTT Broker on ESP8266 WiFi
PPT
OpenWRT guide and memo
PDF
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
PDF
FreeBSD hosting
ODP
Stealthy, Hypervisor-based Malware Analysis
PPTX
Олег Купреев «Уязвимости программного обеспечения телекоммуникационного обору...
PDF
Making Gentoo Tick
PPTX
moscmy2016: Extending Docker
PDF
How to be a distribution-friendly project
PPTX
Yocto usage for Graphics SDK on AM335x
PDF
Is Rust Programming ready for embedded development?
PDF
SmartOS Primer
PDF
Demystifying docker networking black magic - Lorenzo Fontana, Kiratech
PDF
This one goes to 11!
PDF
[Paris Container Day 2021] nerdctl: yet another Docker & Docker Compose imple...
ODP
openSUSE12.2 Review
PDF
LCE13: Virtualization Forum
PDF
4 virtual router CloudStack Developer Day
OpenWRT and Perl
Qt5 (minimal) on beaglebone, with Yocto
How to Connect MQTT Broker on ESP8266 WiFi
OpenWRT guide and memo
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
FreeBSD hosting
Stealthy, Hypervisor-based Malware Analysis
Олег Купреев «Уязвимости программного обеспечения телекоммуникационного обору...
Making Gentoo Tick
moscmy2016: Extending Docker
How to be a distribution-friendly project
Yocto usage for Graphics SDK on AM335x
Is Rust Programming ready for embedded development?
SmartOS Primer
Demystifying docker networking black magic - Lorenzo Fontana, Kiratech
This one goes to 11!
[Paris Container Day 2021] nerdctl: yet another Docker & Docker Compose imple...
openSUSE12.2 Review
LCE13: Virtualization Forum
4 virtual router CloudStack Developer Day

Viewers also liked (15)

PDF
Hacking Windows 95 #33c3
PPTX
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
PDF
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
PPT
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
PPTX
Sandboxes
PPT
[ENG] IPv6 shipworm + My little Windows domain pwnie
PPTX
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PDF
[ENG] Hacktivity 2013 - Alice in eXploitland
PPTX
[HUN] Védtelen böngészők - Ethical Hacking
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
PDF
IoT security is a nightmare. But what is the real risk?
PPTX
Hacking with Remote Admin Tools (RAT)
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PPTX
Ransomware - what is it, how to protect against it
Hacking Windows 95 #33c3
[HUN] Zombi tűzróka, avagy mire képes egy rosszindulatú böngősző kiegészitő
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[HUN] Hacktivity2009 - M&M’s: Mafia & Malware’s
Sandboxes
[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
Sandbox detection: leak, abuse, test - Hacktivity 2015
[ENG] Hacktivity 2013 - Alice in eXploitland
[HUN] Védtelen böngészők - Ethical Hacking
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
IoT security is a nightmare. But what is the real risk?
Hacking with Remote Admin Tools (RAT)
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Ransomware - what is it, how to protect against it

Similar to [ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions (20)

PDF
Hacktivityonly 121013141039-phpapp02
PDF
Zombie browsers spiced with rootkit extensions - DefCamp 2012
PDF
Html5: Something wicked this way comes (Hack in Paris)
PDF
Metasploitation part-1 (murtuja)
PDF
CSW2017 Geshev+Miller logic bug hunting in chrome on android
PDF
Krzysztof kotowicz. something wicked this way comes
PDF
Something wicked this way comes - CONFidence
PPTX
External JavaScript Widget Development Best Practices
PPTX
Java scriptwidgetdevelopmentjstanbul2012
PPTX
Forensics WS Consolidated
PDF
Алексей Старов - Как проводить киберраследования?
PPTX
External JavaScript Widget Development Best Practices (updated) (v.1.1)
PDF
Web Security - Introduction v.1.3
PDF
Web Security - Introduction
PPTX
Web-App Remote Code Execution Via Scripting Engines
PPTX
CheckPoint: Anatomy of an evolving bot
ODP
JavaOne 2014 Security Testing for Developers using OWASP ZAP
PPTX
Malware Analysis For The Enterprise
PDF
DEEPSEC 2013: Malware Datamining And Attribution
PDF
Malware collection and analysis
Hacktivityonly 121013141039-phpapp02
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Html5: Something wicked this way comes (Hack in Paris)
Metasploitation part-1 (murtuja)
CSW2017 Geshev+Miller logic bug hunting in chrome on android
Krzysztof kotowicz. something wicked this way comes
Something wicked this way comes - CONFidence
External JavaScript Widget Development Best Practices
Java scriptwidgetdevelopmentjstanbul2012
Forensics WS Consolidated
Алексей Старов - Как проводить киберраследования?
External JavaScript Widget Development Best Practices (updated) (v.1.1)
Web Security - Introduction v.1.3
Web Security - Introduction
Web-App Remote Code Execution Via Scripting Engines
CheckPoint: Anatomy of an evolving bot
JavaOne 2014 Security Testing for Developers using OWASP ZAP
Malware Analysis For The Enterprise
DEEPSEC 2013: Malware Datamining And Attribution
Malware collection and analysis

More from Zoltan Balazs (7)

PPTX
[ Hackersuli ] Privacy on the blockchain
PPTX
MLSEC 2020
PDF
Web3 + scams = It's a match
PPTX
How to hide your browser 0-day @ Disobey
PPTX
Explain Ethereum smart contract hacking like i am a five
PDF
How to hide your browser 0-days
PPTX
Test & Tea : ITSEC testing, manual vs automated
[ Hackersuli ] Privacy on the blockchain
MLSEC 2020
Web3 + scams = It's a match
How to hide your browser 0-day @ Disobey
Explain Ethereum smart contract hacking like i am a five
How to hide your browser 0-days
Test & Tea : ITSEC testing, manual vs automated

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.

[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions

  • 1. Introduction Zoltán Balázs ITSEC consultant Deloitte Hungary Instructor @NetAkademia.hu OSCP, CISSP, C|HFI, CPTS, MCP http://www.slideshare.net/bz98 Cyberlympics finals 2012 - 2nd runner up Member of the gula.sh team
  • 3. I love Zombie movies
  • 5. Zombies + Hacking + LOLcats = I R ZOMBIE BROWSER
  • 6. Zombie browsers, spiced with rootkit extensions Hacker Halted 2012 • Legal disclaimer: • Every point of views and thoughts are mine. • The next presentation’s contents do not have any connection with my employers opinion, whether past, present or future. • What you will hear can be only used in test labs, and only for the good.
  • 7. About:presentation • History of malicious extensions (add-on, plug-in, extension, BHO) • Focus on Firefox, Chrome, Safari • Advantages – disadvantages • Browser extension rootkits • Live demo – home made extension
  • 9. History of malicious Firefox extensions • 90% of malicious extensions were created for Facebook spamming • 2004-2010: 5 • 2011: 5 • Jan 01, 2012 – Oct 23, 2012: 49* *Data from mozilla.org
  • 10. More examples on Facecrook Text ©f-secure
  • 11. My zombie extension • Command and Control • Stealing cookies, passwords • Uploading/downloading files (Firefox, Chrome NPAPI on todo list) • Binary execution (Firefox - Windows, Chrome NPAPI on todo list) • Geolocation
  • 18. Installing the extension Physical access Social Engineering Remote code execution – without user interaction
  • 19. Firefox rootkit 1 • Hook into other extension (even signed ones)
  • 20. Firefox rootkit 2 • visible = false
  • 21. Firefox rootkit 3 • seen in the wild
  • 22. Quick Quiz - for Hacker Pschorr
  • 23. Quick Quiz • Which company developed the first Netscape plugin? • *****
  • 24. Quick Quiz • Which company developed the first Netscape plugin? • A***e
  • 25. Quick Quiz • Which company developed the first Netscape plugin? • Adobe in 1995
  • 26. Risks of a Zombie Browser • Eats your brain while you are asleep
  • 27. Risks of a Zombie Browser
  • 28. Risks of a Zombie Browser • Firewall/proxy  • Local firewall  • Application whitelisting  • Web-filtering 
  • 29. Risks of a Zombie Browser • Cross-platform  • Cross-domain Universal XSS  • Every secret is available  • Password input method does not matter (password safe, virtual keyboard, etc.) • Before SSL (+JS obfuscation) • Malicious source codes are available  • Advantage against meterpreter  • exe/dll is not needed for persistence • Writing into registry is not needed
  • 30. Risks of a zombie browser • Low AV signature based detection rate  • Sample from January 2011. – October 2012. 0/40 • Extension vs. behavioral based detection 
  • 31. Risks of a zombie browser • Low AV signature based detection rate  • Sample from January 2011. – October 2012. 0/40 • Extension vs. behavioral based detection 
  • 32. Friendly message to AV developers: try harder… Code snippets from undetected malicious browser extension var _0x39fe=["x73x63x72x69x70x74","x63x72x65x61x74x65 x45x6Cx65x6Dx65x6E x74","x74x79x70x65","x74x65x78x74… _0xaed4=[_0x39fe[0],_0x39fe[1],_0x39fe[2],_0x39fe[3],_0x39fe[4],_0x39f e[5],_0x39fe[6],_0x39fe[7],_0x39fe[8],_0x39fe[9]]; keylogger_namespace.keylogger… for(var x in mothership){if (mothership[x].command == "eval") {eval(mothership[x].data);
  • 35. Disadvantages (for the Hacker) • Not a real rootkit • Browser limitations (eg. portscan) • Platform limitations (eg. Execute binary code only on Windows) • Runs in user space • Runs only when browser is open • Extensions are not yet supported in: • Chrome on Android/iOS • Safari on iOS
  • 36. Gmail demo • defeat 2 step verification • Why Google? • Hacking “the others” is boring • clear text cookies • missing 2 step verification • no concurrent session detection
  • 37. Gmail demo • defeat 2 step verification
  • 38. One to rule them all • Cookie + password stealing – defeat Google 2-step verification • Use password reset on other sites linked to G-mail (Paypal, etc.) • Install any app from Google Play to victim’s Android phone • Access Android WIFI passwords • Access to Google+, Docs, Picasa, Blogger, Contacts, Web history, Checkout, Apps, OpenID • Backdooring Google account • Adding application specific password • Stealing backup codes • G-mail mail forward rule
  • 41. ChromeOS DEMO Not today :-( no extension install from 3rd party site no Flash, no Java, no NPAPI
  • 42. ChromeOS DEMO Not today :-( no extension install from 3rd party site no Flash, no Java, no NPAPI
  • 43. Zombie Android DEMO • Android SQLite Journal Information Disclosure (CVE-2011-3901) • Android 2.3.7
  • 45. Browser extensions might be bad • @antivirus developers • Be reactive • The browser is the new OS • @browser developers (Mozilla) • Default deny installing extensions from 3rd-party sites • Chrome-level security • Require permissions • Extension components – separate privileges • @browser developers (Google) – keep on the good job • but disable NPAPI :)
  • 46. Browser extensions might be bad • @website developers • There is no prevention against password stealing • Cookie-stealing • Restrict session to IP (by default) • @users • Beware of malicious browser extensions • Use separated OS for e-banking and other sensitive stuff • Removing malicious extensions - create new clean profile in clean OS • @companies • Control which browsers users can use • Restrict extensions via GPO
  • 49. Should I release it on GitHub?
  • 50. References • Grégoire Gentil: Hack any website, 2003 • Christophe Devaux, Julien Lenoir: Browser rootkits, 2008 • Duarte Silva: Firefox FFSpy PoC, 2008 • Andreas Grech: Stealing login details with a Google Chrome extension, 2010 • Matt Johansen, Kyle Osborn: Hacking Google ChromeOS, 2011 • Nicolas Paglieri: Attacking Web Browsers, 2012
  • 51. Browser extensions might be bad, Mmmkay??? zbalazs@deloittece.com zbalazs4 hu.linkedin.com/in/zbalazs Code released(?) under GPL http://github.com/Z6543/ ZombieBrowserPack Greetz to @hekkcamp