Issue metadata
Sign in to add a comment
|
Security: Chrome allows cryptominer malicious scripts to misuse user's PC resources in opened popup
Reported by
bce...@gmail.com,
Sep 29 2017
|
||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS A page script is able to run a cryptocurrency miner through Chrome, it utilizes a hidden tab (by positioning it far bottom right, under the Windows start bar right after opening it) to make it mine for aslong the user got Chrome opened. So this means Chrome is facilitating hardware usage to execute practical malware (mine cryptocoins without user knownledge). In my case, this is what opened in that way: https://d3iz6lralvg77g.cloudfront.net/mmfb.html If they take it down, here's its source; https://pastebin.com/UWEC7iGv (or see .txt file attached) VERSION Chrome Version: [61.0.3163.100] + [stable] Operating System: Windows 10 Home, build 15063.632 REPRODUCTION CASE Visit the URL earlier mentioned aslong it's up, and see how your computer gets utilized for hardware cryptocurrency mining through Chrome popup tab, or replicate the exploit scripts page by using the attached .html code to this ticket. MY NOTES: Please analyze the scripts source code to see what is being exploited, it should not be possible for a page to run scripts that 'mine' cryptocurrency by utilizing Chrome user's hardware, after it was opened as advertisement popup (supposed to be) on a reputable site I was browsing. This is advanced type of malware that's alive aslong the fraudulent tab is opened. I had to unlock my Windows home bar and move it around so I could clearly see and drag the tab chrome window, they are being very clever to conceal it from sight. Another approach could be for you to block tabs being concealed under Metro/glass GUI elements of Windows, by them getting repositioned after ad/popups open.
,
Sep 29 2017
If you visit that link directly also, and watch Task manager in Windows, you will notice Chrome process starts using CPU intensively, which means it's cryptomining for these criminals.
,
Sep 30 2017
Adam, thoughts here ? Is this WontFix ?
,
Sep 30 2017
Please feel free to dupe to Issue 766068.
,
Sep 30 2017
(Oh, and the "hidden" window positioning part of this to Issue 467329).
,
Sep 30 2017
@elawre I would rather suggest merging it instead (or duping and unlocking for non-security bug viewers) as this is the first practical case being detailed on how that vulnerability gets exploited. Also please note the script I reported here, raises CPU usage to only around 35% so it's more stealth for the creators not to alert the PC user something is going on without their consent. Besides that, issue 766068 may not realistically portray the dangers of having this problem unpatched, while my entry makes sense of it, issue 766068 is generalizing high JS script usage only.
,
Sep 30 2017
The script ran by the page I referred is also of such advanced level (the code) that it can even be called web-ran malware instead. That other issue only gives examples of generic JS misuse that renders the browser unusable by 100% CPU usage, while this is designed to persist. An situation where the now clearly web-ran malware is allowed to be executed and achieve malicious goals of its malware creators, cannot be united with a browser like Chrome used by unsuspecting PC users, as Chrome allows unmetered access to that person's computer hardware for criminal profitmaking/mining purpose without their consent (but in this case of the clever script also limiting CPU usage, also without their knownledge or direct clue to investigate for them)
,
Oct 2 2017
Hiding a popup window is bad. As noted that's Issue 467329. We cannot, realistically, fingerprint and block this pattern of computation: web sites will be able to outrun us by mutating the code. Blocking the loading of these scripts is thus something for extensions. If this becomes too common, it might be something that the UI team needs to think about in order to better communicate to users which sites are taking CPU time. We have the Task Manager but it's (deliberately) a little obscure for regular users. So I believe that this is a wait-and-see issue and not immediately actionable.
,
Oct 3 2017
'If this becomes too common' - like the other issue reporter mentioned; https://www.google.com/search?q=coinhive+ads+malware https://www.theguardian.com/technology/2017/sep/27/pirate-bay-showtime-ads-websites-electricity-pay-bills-cryptocurrency-bitcoin https://www.theregister.co.uk/2017/09/25/showtime_hit_with_coinmining_script https://www.bleepingcomputer.com/news/security/coinhive-is-rapidly-becoming-a-favorite-tool-among-malware-devs/ https://blog.malwarebytes.com/threat-analysis/2017/09/drive-by-mining-and-ads-the-wild-wild-west/ If you don't think its seriously becoming common abusive practice already, then it has to be closely watched.
,
Oct 3 2017
Also for that reason of the need for monitoring, can you unlock the issue's perms so it can be viewed by any contributor?
,
Oct 3 2017
Absolutely, no reason for this to be restricted. |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by bce...@gmail.com
, Sep 29 2017