Download Protection Bypass: Windows os system targeting
Reported by
bowlingb...@gmail.com,
Sep 11 2017
|
|||||||||
Issue description
VERSION
Chrome Version: 61.0.3163.79 (Official Build) (64-bit)
Operating System: All Windows Operating Systems
REPRODUCTION CASE
I was able to get any virus past google download protection using bat to exe advanced, with this tool I'm able to make an exe that builds then starts the virus file of my choosing the following file hold Dark comet remote administration tool if ran it would let me hijack the hole computer it was ran on. This has been tested on 34 people and has proven to work.
sincerely,
Godschild Gaming
EDIT(vakh, 2017/09/22): Removed the template text.
,
Sep 12 2017
Thank you for providing more feedback. Adding requester "vakh@chromium.org" to the cc list and removing "Needs-Feedback" label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Sep 12 2017
yes I can also provide how bat to exe can be used to bypass the protection. So finale holder is the finished product of the bypassing method it holds all the holders and payloads but only starts holder3 which holder3 start holder2 which starts holder1 at which holder1 builds and starts the dark comet payload. I will include all files used to hide the payload *edit* I had to redo the commet forgot to include files
,
Sep 22 2017
,
Sep 22 2017
Thanks for the details. I'll investigate this further.
,
Oct 3 2017
I'm focusing on some other work at the moment but I'll come back to this on or before 10/12. Sorry for the delay here.
,
Oct 6 2017
auk -- this may be of interest to you. I'll follow-up offline.
,
Oct 6 2017
This is just another form of mutating a binary. As long as we're sending a ping for the outer .exe, I think this is WAI.
,
Oct 13 2017
Can you please share the contents of the page at chrome://histograms/SBClientDownload.CheckDownloadStats before and after downloading the file?
,
Oct 20 2017
,
Oct 22 2017
ok here
,
Nov 10 2017
Thanks for sharing the screenshots. Since the histogram at chrome://histograms/SBClientDownload.CheckDownloadStats shows a value of 10, it is working as intended. This value represents that the Safe Browsing service will get uploads from extended reporting users for this file, so this is not eligible for a reward according to the VRP rules. See "Q: Can I have more details about the Download Protection bypass rewards?" at https://www.google.com/about/appsecurity/chrome-rewards/index.html
,
Feb 17 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||
►
Sign in to add a comment |
|||||||||
Comment 1 by vakh@chromium.org
, Sep 11 2017