{"id":11410,"date":"2018-02-07T15:10:03","date_gmt":"2018-02-07T23:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/07\/news-5181\/"},"modified":"2018-02-07T15:10:03","modified_gmt":"2018-02-07T23:10:03","slug":"news-5181","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/07\/news-5181\/","title":{"rendered":"Tech support scammers find new way to jam Google Chrome (updated)"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 06 Feb 2018 16:21:49 +0000<\/strong><\/p>\n<p><em>Update (1) (2018-02-07): This issue with Google Chrome was reported\u00a0<a href=\"https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=810031\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0and merged\u00a0<a href=\"https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=809775\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\n<p><em>Update (2)\u00a0(2018-02-07): Firefox and Brave seem to be affected by this bug as well (both vendors were informed).<\/em><\/p>\n<p>&#8211; &#8211;<\/p>\n<p>During the past quarter we have noted an increase in fake browser alerts pushing tech support scams. Most of these campaigns come from malicious advertising but also via compromised web sites. Crooks are using all sorts of tricks to not only scare users but also to try and &#8216;lock&#8217; their browsers.<\/p>\n<p>One such technique involving the <em>history.pushState<\/em> API which we <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2016\/11\/tech-support-scammers-abuse-bug-in-html5-feature-to-freeze-computers\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> about on this blog has now been patched but still continues to be used. There are also the infamous pop-unders that can be used in such a way that users are <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/tech-support-scammers-make-browser-lockers-resilient\/\" target=\"_blank\" rel=\"noopener\">stuck between various tabs<\/a>.<\/p>\n<p>In yet another twist, scammers are now abusing another API that achieves their intended goal of freezing the browser. By doing so they hope that users will panic and call the toll-free number for assistance. The following animation shows what a user may experience with Google Chrome&#8217;s latest version (64.0.3282.140).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21462 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/Chrome_TSS.gif\" alt=\"\" width=\"1192\" height=\"756\" \/><\/p>\n<p style=\"text-align: center\"><em>Figure 1: What happens when you visit the booby-trapped page.<\/em><\/p>\n<p>The code responsible for this is embedded within the main page, and slightly obfuscated:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/jam.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21466 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/jam.png\" alt=\"\" width=\"686\" height=\"780\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/jam.png 686w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/jam-264x300.png 264w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/jam-528x600.png 528w\" sizes=\"auto, (max-width: 686px) 100vw, 686px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 2: The underlying code shown with functions such as &#8216;bomb_ch&#8217; or &#8216;ch_jam&#8217;<\/em><\/p>\n<p>The <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Blob\" target=\"_blank\" rel=\"noopener\">Blob<\/a> constructor coupled with the <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/hh779016(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener\"><em>window.navigator.msSaveOrOpenBlob<\/em><\/a> method lets you save files locally and, as you may have guessed, is what is being abused here.<\/p>\n<p>The <em>ch_jam()<\/em> function calls another function called <em>bomb_ch()<\/em>, and are both appropriately named for what they do. This in turn calls the <em>download<\/em> function that uses the aforementioned Blob constructor.<\/p>\n<p>It happens too fast to see how it works, but you may be able to spot it with a powerful enough machine and if you try to close the tab early on. That code triggers a very large number of downloads in rapid fire, which causes the browser to become unresponsive within a few seconds, and unable to be closed via normal means.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/multiple_downloads.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21464 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/multiple_downloads.png\" alt=\"\" width=\"726\" height=\"618\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/multiple_downloads.png 726w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/multiple_downloads-300x255.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/multiple_downloads-600x511.png 600w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 3: Attempting to close the browser tab before it gets jammed reveals what is going on<\/em><\/p>\n<p>The primary targets for this particular browser freeze are Google Chrome users on Windows. Other browsers will get their own landing pages, abusing other HTML APIs. Considering that Chrome has the most market share in the browser category, this is yet another example of the desire for threat actors to deploy new social engineering schemes.<\/p>\n<p>Since most of these browser lockers are distributed via malvertising, an effective mitigation method is to use an ad-blocker. As a last resort, the Windows Task Manager will allow you to forcefully quit the offending browser processes. Malwarebytes users were already protected against the redirection mechanism used in this attack.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/02\/tech-support-scammers-find-new-way-jam-google-chrome\/\">Tech support scammers find new way to jam Google Chrome (updated)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/02\/tech-support-scammers-find-new-way-jam-google-chrome\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 06 Feb 2018 16:21:49 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/02\/tech-support-scammers-find-new-way-jam-google-chrome\/' title='Tech support scammers find new way to jam Google Chrome (updated)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/shutterstock_403565878.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Browsers are usually the first point of contact between victims and threat actors. With a few bits of code, crooks manage once again to freeze Google Chrome and scare users into calling for assistance.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chrome\/\" rel=\"tag\">chrome<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/freeze\/\" rel=\"tag\">freeze<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/jam\/\" rel=\"tag\">jam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scams\/\" rel=\"tag\">tech support scams<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/02\/tech-support-scammers-find-new-way-jam-google-chrome\/' title='Tech support scammers find new way to jam Google Chrome (updated)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/02\/tech-support-scammers-find-new-way-jam-google-chrome\/\">Tech support scammers find new way to jam Google Chrome (updated)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10699,17428,1670,17429,10546,10577],"class_list":["post-11410","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chrome","tag-freeze","tag-google","tag-jam","tag-malwarebytes-news","tag-tech-support-scams"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11410"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11410\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11410"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}