{"id":13683,"date":"2018-10-26T08:10:05","date_gmt":"2018-10-26T16:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/10\/26\/news-7450\/"},"modified":"2018-10-26T08:10:05","modified_gmt":"2018-10-26T16:10:05","slug":"news-7450","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/26\/news-7450\/","title":{"rendered":"Scammers use old browser trick to create fake virus download"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 26 Oct 2018 15:00:00 +0000<\/strong><\/p>\n<p>Tech support scammers are reusing an old technique in their existing browser locker (<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/browlock-2\/\" target=\"_blank\" rel=\"noopener\">browlock<\/a>) schemes to force a special kind of file download. Contrary to past attacks, where the purpose was to flood the machine with a large amount of file requests in order to crash the browser, this one is purely a social engineering ploy.<\/p>\n<p>Indeed, the flooding technique that abuses the\u00a0<em>window.navigator.msSaveOrOpenBlob<\/em>\u00a0method, which we <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/02\/tech-support-scammers-find-new-way-jam-google-chrome\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> on this blog before, has already been <a href=\"https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=809775\" target=\"_blank\" rel=\"noopener\">fixed in Google Chrome<\/a>. What we see here instead is a blend of a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2016\/11\/tech-support-scammers-abuse-bug-in-html5-feature-to-freeze-computers\/\" target=\"_blank\" rel=\"noopener\">previously-exploited<\/a> HTML5 method known as\u00a0<em>history.pushState()<\/em> and the <em>Anchor<\/em> download technique.<\/p>\n<p>Here&#8217;s how it works: Unsuspecting users are served a fake Microsoft alert page as they are browsing various websites. Typically, the redirection is initiated by a malicious advertising (<a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/06\/truth-in-malvertising-how-to-beat-bad-ads\/\" target=\"_blank\" rel=\"noopener\">malvertising<\/a>) chain.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26081\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/attachment\/chrome_browlock\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock.png\" data-orig-size=\"1078,810\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Chrome_browlock\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock-300x225.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock-600x451.png\" class=\"alignnone size-full wp-image-26081\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock.png\" alt=\"\" width=\"1078\" height=\"810\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock.png 1078w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock-300x225.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_browlock-600x451.png 600w\" sizes=\"auto, (max-width: 1078px) 100vw, 1078px\" \/><\/a><\/p>\n<p>The page attempts to use various tricks to create the lock impression, for example by monitoring mouse and keyboard events and forcing itself into fullscreen mode. Additionally, it starts an automatic file download named &#8220;<strong>This is a VIRUS.You computer is blocked&#8221;<\/strong>\u00a0(sic) as seen below:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26082\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/attachment\/chrome_downloads\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads.png\" data-orig-size=\"740,341\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Chrome_downloads\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads-300x138.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads-600x276.png\" class=\"alignnone size-full wp-image-26082\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads.png\" alt=\"\" width=\"740\" height=\"341\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads.png 740w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads-300x138.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/Chrome_downloads-600x276.png 600w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/a><\/p>\n<p>This file is a copy of the browser locker HTML code, so you could say that it is malicious in nature, but it cannot harm the computer like a virus or malware. The scammers are simply using strong words to scare potential victims.<\/p>\n<p>The underlying code responsible for this behavior consists of the use of the jQuery library (jquery-3.3.1.min.js) and a few blocks of JavaScript, starting with the <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTML\/Element\/a#\" target=\"_blank\" rel=\"noopener\">Anchor element<\/a>. This was likely grabbed and modified from this <a href=\"https:\/\/gist.github.com\/jmcarp\/9291539\" target=\"_blank\" rel=\"noopener\">5-year-old Github Gist:<\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26084\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/attachment\/force_download\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download.png\" data-orig-size=\"615,590\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"force_download\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download-300x288.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download-600x576.png\" class=\"alignnone size-full wp-image-26084\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download.png\" alt=\"\" width=\"615\" height=\"590\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download.png 615w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download-300x288.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_download-600x576.png 600w\" sizes=\"auto, (max-width: 615px) 100vw, 615px\" \/><\/a><\/p>\n<p>The second part consists of creating a loop and interjecting the <em>history.pushState<\/em> method:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26085\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/attachment\/force_interval\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval.png\" data-orig-size=\"606,367\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"force_interval\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval-300x182.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval-600x363.png\" class=\"alignnone size-full wp-image-26085\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval.png\" alt=\"\" width=\"606\" height=\"367\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval.png 606w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval-300x182.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/force_interval-600x363.png 600w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/a><\/p>\n<p>Different browsers will handle the automatic file download in their own way. For example, Firefox will prompt users multiple times for the bogus file download:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/FF_forced_download.gif\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26087\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/attachment\/ff_forced_download\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/FF_forced_download.gif\" data-orig-size=\"1173,843\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"FF_forced_download\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/FF_forced_download-300x216.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/FF_forced_download-600x431.gif\" class=\"alignnone size-full wp-image-26087\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/FF_forced_download.gif\" alt=\"\" width=\"1173\" height=\"843\" \/><\/a><\/p>\n<p>Once again, we see that tech support scammers continue to abuse browsers using basic techniques. Their effectiveness is in large part due to the fact that these are legitimate features or web standards that are being used in malicious ways.<\/p>\n<p>For this reason, browser vendors can have a hard time mitigating these types of attacks without also breaking legitimate use cases. The browser hang with infinite downloads bug we <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/02\/tech-support-scammers-find-new-way-jam-google-chrome\/\" target=\"_blank\" rel=\"noopener\">blogged about<\/a> at the beginning of the year is <a href=\"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1438214\" target=\"_blank\" rel=\"noopener\">still unresolved in Mozilla Firefox.<\/a><\/p>\n<p>Malwarebytes Browser Extension (Beta) mitigates these browser lockers both for <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/malwarebytes-browser-exte\/ihcjicgdanjaechkgeegckofjjedodee\" target=\"_blank\" rel=\"noopener\">Chrome<\/a> and <a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/malwarebytes\/\" target=\"_blank\" rel=\"noopener\">Firefox<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/\">Scammers use old browser trick to create fake virus download<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 26 Oct 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/' title='Scammers use old browser trick to create fake virus download'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/shutterstock_387502804.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A file downloaded to your computer says it&#8217;s a virus but turns out to just be a ploy used by tech support scammers.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/social-engineering-threat-analysis\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/browlock\/\" rel=\"tag\">browlock<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/browser-lockers\/\" rel=\"tag\">browser lockers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scams\/\" rel=\"tag\">scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support\/\" rel=\"tag\">tech support<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/virus\/\" rel=\"tag\">virus<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/' title='Scammers use old browser trick to create fake virus download'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/scammers-use-old-browser-trick-to-create-fake-virus-download\/\">Scammers use old browser trick to create fake virus download<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17024,19503,3764,10574,10510,10536,10494,10545,11214],"class_list":["post-13683","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-browlock","tag-browser-lockers","tag-malware","tag-scams","tag-social-engineering","tag-tech-support","tag-threat-analysis","tag-tss","tag-virus"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13683"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13683\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13683"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}