New issue
Advanced search Search tips

Issue 770414 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Closed: Oct 2017
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: Chrome allows cryptominer malicious scripts to misuse user's PC resources in opened popup

Reported by bce...@gmail.com, Sep 29 2017

Issue description


VULNERABILITY DETAILS

A page script is able to run a cryptocurrency miner through Chrome, it utilizes a hidden tab (by positioning it far bottom right, under the Windows start bar right after opening it) to make it mine for aslong the user got Chrome opened. So this means Chrome is facilitating hardware usage to execute practical malware (mine cryptocoins without user knownledge).

In my case, this is what opened in that way: https://d3iz6lralvg77g.cloudfront.net/mmfb.html

If they take it down, here's its source; https://pastebin.com/UWEC7iGv (or see .txt file attached)

VERSION
Chrome Version: [61.0.3163.100] + [stable]
Operating System: Windows 10 Home, build 15063.632

REPRODUCTION CASE
Visit the URL earlier mentioned aslong it's up, and see how your computer gets utilized for hardware cryptocurrency mining through Chrome popup tab, or replicate the exploit scripts page by using the attached .html code to this ticket.

MY NOTES: Please analyze the scripts source code to see what is being exploited, it should not be possible for a page to run scripts that 'mine' cryptocurrency by utilizing Chrome user's hardware, after it was opened as advertisement popup (supposed to be) on a reputable site I was browsing. This is advanced type of malware that's alive aslong the fraudulent tab is opened.

I had to unlock my Windows home bar and move it around so I could clearly see and drag the tab chrome window, they are being very clever to conceal it from sight. Another approach could be for you to block tabs being concealed under Metro/glass GUI elements of Windows, by them getting repositioned after ad/popups open. 

 
ScriptSource.html
135 KB View Download

Comment 1 by bce...@gmail.com, Sep 29 2017

Also please note that if you visit the added link directly, it won't position it below the Windows bar in attempt to conceal it, the popup by its default scripted behaviour did but I failed to screenshot that before I moved the tab to close/inspect it, as when I drawn it into sight I was yet to find out what it was.

Comment 2 by bce...@gmail.com, Sep 29 2017

If you visit that link directly also, and watch Task manager in Windows, you will notice Chrome process starts using CPU intensively, which means it's cryptomining for these criminals.
Owner: agl@chromium.org
Status: Assigned (was: Unconfirmed)
Adam, thoughts here ? Is this WontFix ? 
Please feel free to dupe to Issue 766068.
(Oh, and the "hidden" window positioning part of this to Issue 467329).

Comment 6 by bce...@gmail.com, Sep 30 2017

@elawre I would rather suggest merging it instead (or duping and unlocking for non-security bug viewers) as this is the first practical case being detailed on how that vulnerability gets exploited. 

Also please note the script I reported here, raises CPU usage to only around 35% so it's more stealth for the creators not to alert the PC user something is going on without their consent. Besides that, issue 766068 may not realistically portray the dangers of having this problem unpatched, while my entry makes sense of it, issue 766068 is generalizing high JS script usage only.

Comment 7 by bce...@gmail.com, Sep 30 2017

The script ran by the page I referred is also of such advanced level (the code) that it can even be called web-ran malware instead. That other issue only gives examples of generic JS misuse that renders the browser unusable by 100% CPU usage, while this is designed to persist.

An situation where the now clearly web-ran malware is allowed to be executed and achieve malicious goals of its malware creators, cannot be united with a browser like Chrome used by unsuspecting PC users, as Chrome allows unmetered access to that person's computer hardware for criminal profitmaking/mining purpose without their consent (but in this case of the clever script also limiting CPU usage, also without their knownledge or direct clue to investigate for them)

Comment 8 by agl@chromium.org, Oct 2 2017

Status: WontFix (was: Assigned)
Hiding a popup window is bad. As noted that's Issue 467329.

We cannot, realistically, fingerprint and block this pattern of computation: web sites will be able to outrun us by mutating the code. Blocking the loading of these scripts is thus something for extensions.

If this becomes too common, it might be something that the UI team needs to think about in order to better communicate to users which sites are taking CPU time. We have the Task Manager but it's (deliberately) a little obscure for regular users.

So I believe that this is a wait-and-see issue and not immediately actionable.

Comment 10 by bce...@gmail.com, Oct 3 2017

Also for that reason of the need for monitoring, can you unlock the issue's perms so it can be viewed by any contributor?

Comment 11 by agl@chromium.org, Oct 3 2017

Labels: -Restrict-View-SecurityTeam
Absolutely, no reason for this to be restricted.

Sign in to add a comment