{"id":6706,"date":"2017-02-21T10:10:01","date_gmt":"2017-02-21T18:10:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/21\/news-523\/"},"modified":"2017-02-21T15:02:54","modified_gmt":"2017-02-21T23:02:54","slug":"news-523","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/21\/news-523\/","title":{"rendered":"Rogue Chrome extension pushes tech support scam"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 21 Feb 2017 17:22:42 +0000<\/strong><\/p>\n<p>Given Google Chrome&#8217;s popularity, it is no surprise to see it being more and more targeted these days. In particular, less than reputable\u00a0ad networks are contributing to the distribution of malicious Chrome extensions via very deceptive means.<\/p>\n<p>In this post we look at a forced installation of such an extension that eventually leads to more adverts being\u00a0force fed\u00a0into Chrome. And once you spin the\u00a0malvertising roulette, anything can happen&#8230;<\/p>\n<h3>Malvertising campaign<\/h3>\n<p>Google Chrome users are profiled based on the user-agent string they show whenever they visit a website. Rather than\u00a0redirecting them to an exploit kit, they are often redirected to fake software updates, scams, or rogue browser extensions.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/traffic.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16405\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/traffic.png\" alt=\"\" width=\"702\" height=\"432\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/traffic.png 702w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/traffic-300x185.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/traffic-600x369.png 600w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" \/><\/a><\/p>\n<p>This malvertising flow (XML feed) shows how the user is redirected to a bogus site that is enticing them to install a Chrome extension.<\/p>\n<p>Enticing might in fact be a euphemism, since in this case the user is giving no choice other than &#8220;<em><strong>Add Extension to Leave<\/strong><\/em>&#8220;, while their browser is stuck\u00a0in a never ending loop of fullscreen modes.\u00a0The tricks used here are very similar to what <a href=\"https:\/\/blog.malwarebytes.com\/author\/metallicamvp\/\" target=\"_blank\">Pieter Arntz<\/a> described in his Nov. &#8217;16 blog (<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/11\/forced-into-installing-a-chrome-extension\/\" target=\"_blank\"><em>Forced into installing a Chrome extension<\/em><\/a>).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16406\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/site_code.png\" alt=\"\" width=\"671\" height=\"491\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/site_code.png 671w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/site_code-300x220.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/site_code-600x439.png 600w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/p>\n<h3>Hidden but omnipresent<\/h3>\n<p>Once installed, this extension ensures it stays in hiding by using\u00a0a 1&#215;1 pixel image\u00a0as its logo (note the blank space on the top right next to the Chrome menu from the animation below) and\u00a0by hooking\u00a0<em>chrome:\/\/extensions<\/em> and <em>chrome:\/\/settings<\/em> such that any attempt to access those is automatically redirected to\u00a0<em>chrome:\/\/apps<\/em>. That makes it much more difficult for the average user to see what extensions they have, let alone uninstalling one of them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16407\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/redirection2.gif\" alt=\"\" width=\"640\" height=\"297\" \/><\/p>\n<p>The real bad stuff is buried into a couple of obfuscated JavaScript files:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16410\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/folder_view.png\" alt=\"\" width=\"547\" height=\"230\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/folder_view.png 547w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/folder_view-300x126.png 300w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/p>\n<p>The larger one reveals a connection to a command and control server where it can receive instructions on what to do next:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/content_injection.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16408\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/content_injection.png\" alt=\"\" width=\"1082\" height=\"652\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/content_injection.png 1082w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/content_injection-300x181.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/content_injection-600x362.png 600w\" sizes=\"auto, (max-width: 1082px) 100vw, 1082px\" \/><\/a><\/p>\n<h3>Ad fraud and scams<\/h3>\n<p>The perpetrators behind this extension are checking for certain keywords within the current URL and blocking\/redirecting if the conditions are met. For instance, if the user tries to visit the Malwarebytes website, the browser will immediately get redirected, first to a YouTube video, and then to one\u00a0of various Potentially Unwanted Programs (PUPs), get-rich-quick schemes, and various other scams.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16409\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/redir_flow.png\" alt=\"\" width=\"662\" height=\"488\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/redir_flow.png 662w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/redir_flow-300x221.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/redir_flow-600x442.png 600w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><\/p>\n<p>This blog post wouldn&#8217;t be complete without a tech support scam which it seems one can&#8217;t avoid these days. If the user clicked on a new tab or typed a &#8216;forbidden&#8217; keyword, the redirection chain would then deliver a fake Microsoft warning.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS_traff.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16422\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS_traff.png\" alt=\"\" width=\"802\" height=\"397\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS_traff.png 802w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS_traff-300x149.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS_traff-600x297.png 600w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS1.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16412\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS1.png\" alt=\"\" width=\"1149\" height=\"770\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS1.png 1149w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS1-300x201.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/TSS1-600x402.png 600w\" sizes=\"auto, (max-width: 1149px) 100vw, 1149px\" \/><\/a><\/p>\n<h3>Extension woes<\/h3>\n<p>Google Chrome extensions are very powerful programs which are extremely useful in extending the browser&#8217;s capabilities, but can also be used for malicious purposes. Unfortunately, it is way too easy for online crooks to trick people\u00a0into installing their malicious extension.<\/p>\n<p>If you ever visit family or friends who run\u00a0Chrome or own a Chromebook, have a check at the installed extensions on their machines, and you&#8217;ll be surprised by how many shady or flat out fraudulent ones are in there.<\/p>\n<p>In addition to redirecting to bogus sites and junk offers, there are some\u00a0serious privacy and security implications (<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/01\/rogue-google-chrome-extension-spies-on-you\/\" target=\"_blank\"><em>Rogue Google Chrome Extension Spies On You<\/em><\/a>) when an extension can read what you type and send this information to criminals.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16420\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/injection.gif\" alt=\"\" width=\"640\" height=\"481\" \/><\/p>\n<p>Google has pulled\u00a0this bogus extension from its store. If you already have it installed and can&#8217;t get rid of\u00a0it (it won&#8217;t let you do it the regular way), please download Malwarebytes and run a scan. We detect and remove this one as\u00a0<em>Rogue.ForcedExtension<\/em>.<\/p>\n<h3>IOCs<\/h3>\n<p><u><em>Fake extension:<\/em><\/u><br \/> <em>pakistance.club<\/em><br \/> <em>lfbmleejnobidmafhlihokngmlpbjfgo<\/em><\/p>\n<p><u><em>Backend server (ad fraud\/malvertising):<\/em><\/u><br \/> <em>amserver.info<\/em><br \/> <em>qma0.2dn.xyz<\/em><\/p>\n<p><u><em>Tech support scam:<\/em><\/u><br \/> <em>microsoft-official-warning.info<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/02\/rogue-chrome-extension-pushes-tech-support-scam\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 21 Feb 2017 17:22:42 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/02\/rogue-chrome-extension-pushes-tech-support-scam\/' title='Rogue Chrome extension pushes tech support scam'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2013\/11\/photodune-5966048-hex-back-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Google Chrome may be one of the more secure browsers but an increasing number of malicious extensions are being forced onto users. The one we analyze can hide itself and receive commands from a remote server in order to hijack the browser with incessant offers, fraud and even tech support scams.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/social-engineering-threat-analysis\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chrome\/\" rel=\"tag\">chrome<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/chrome-extension\/\" rel=\"tag\">Chrome Extension<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/extension\/\" rel=\"tag\">extension<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake-chrome-extension\/\" rel=\"tag\">fake chrome extension<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-chrome\/\" rel=\"tag\">Google Chrome<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scam\/\" rel=\"tag\">tech support scam<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/02\/rogue-chrome-extension-pushes-tech-support-scam\/' title='Rogue Chrome extension pushes tech support scam'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10699,11424,11425,11426,1670,11427,10531,10510,10544,10494],"class_list":["post-6706","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chrome","tag-chrome-extension","tag-extension","tag-fake-chrome-extension","tag-google","tag-google-chrome","tag-malvertising","tag-social-engineering","tag-tech-support-scam","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6706"}],"version-history":[{"count":1,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6706\/revisions"}],"predecessor-version":[{"id":6718,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6706\/revisions\/6718"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6706"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}