Browsers with extensions? How they steal the data

Malicious websites can take advantage of the browsers' extensions APIs to run code within the browser and steal sensitive information such as bookmarks, browsing history, or even user cookies.

Of course, an attacker can with cookies understand the user's active sessions and gain access to sensitive accounts, such as e-mail inboxes, social network profiles or accounts on etc.Browsers

Additionally, the same extension APIs (we're always talking about extensions that browsers use) can be used to enable malicious files and to store them on the user's device. This data is stored in an extension's storage, and can be used later to track users across the web.

These types of attacks are no longer theoretical, as they were recently proven in a study published by Dolière Francis Somé, a researcher from the Université Côte d'Azur and INRIA, the French research institute.

Somé developed a tool and looked over 78.000 extensions for Chrome, Firefox and Opera. He managed to identify 197 extensions that allowed the API's internal communication interface to appear with web applications. This can give malicious websites access to the data stored in a user's browser, data that should normally not be accessible.

Chrome Firefox Opera Total
Extensions analyzed 66,401 9,391 2,523 78,315
Suspicious extensions 3,303 483 210 3,996
Execute code 15 2 2 19
Bypass SOP 48 9 6 63
Read cookies 8 - - 8
Read browsing history 40 - - 1
Read bookmarks 37 1 - 38
Get extensions installed 33 - - 33
Store / retrieve data 85 2 3 90
Trigger downloads 29 5 2 36
Total of unique extensions 171 16 10 197

The French researcher reports that he was surprised by the results, as only 15 (7,61%) of 197 extensions were development tools, a category of extensions that usually have full control over what happens to a browser and are from applications that do not must have security holes.

About 55% of all extensions had less than 1.000 installations, but over 15% had over 10.000.

Somé said he advised browser developers of his findings before publishing the survey to the public in early January.

"Everyone recognized the problems," says Somé. “Firefox has all the extensions I mentioned to them. Opera has also removed all extensions but there are still 2 that can be exploited to trigger downloads”.

“Chrome also recognized the problem. We are still discussing together the possible measures to be taken. ”

The researcher also created a tool that allows users to check if their extensions contain a susceptible API that can exploit malicious websites. The tool is web-based and hosted on this page.

Για να το χρησιμοποιήσετε, θα πρέπει να αντιγράψετε-επικολλήσετε το of y manifest.json of the extension you are interested in.

Watch the videos published by the researcher

If you want to read more in Somé's work: EmPoWeb: Empowering Web Applications with Browser Extensions, ”You can download it as a PDF from here and here.

_______________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).