Firefox Zero-Day Used to Install Mac Malware

Firefox Zero-Day Used to Install Mac Malware

Mozilla issued an emergency Firefox patch earlier this week, citing a dangerous zero-day exploit. Because it believed hackers were exploiting the flaw in the wild, Mozilla declined to provide details on the nature of the problem. There are some additional details now, and they suggest the focus of the attack is on cryptocurrency exchange employees.

The vulnerability came as a result of JavaScript flaws that malicious actors could use to produce an exploitable browser crash. That opened the door to running remote code on the system. As second related vulnerability allowed attackers to break out of the Firefox security sandbox and into the operating system. Mozilla issued the JavaScript patch on Tuesday and the sandbox fix on Thursday.

Before either of those patches rolled out, Mozilla became aware of an attack leveraging both vulnerabilities. At the time, we only knew the attacks had something to do with Coinbase as the initial bug report came from a researcher who works on both Google’s Project Zero and the Coinbase security team. Now, Coinbase’s head of security Philip Martin says the attack was aimed at Coinbase employees and not users. Martin also notes that other exchanges were targeted in the attacks, although none have stepped forward.

Meanwhile, Apple security expert Patrick Wardle published an analysis of malware that appears to have installed itself on a fully updated Mac. The hash provided by Wardle matches one from Martin, and the victim of the attack was involved with a cryptocurrency exchange until very recently. Unfortunately, the malware is novel and avoided Apple’s protection mechanisms, but Wardle believes that Apple will have a patch to change the way macOS scans files downloaded by applications rather than the user.

2/ We walked back the entire attack, recovered and reported the 0-day to firefox, pulled apart the malware and infra used in the attack and are working with various orgs to continue burning down attacker infrastructure and digging into the attacker involved.

— Philip Martin (@SecurityGuyPhil) June 19, 2019

Wardle also has a copy of the phishing email sent to the victim, who says the attack consisted of a so-called “drive-by download” in Firefox. The website has since vanished, though. The aim was probably to gain access to the crypto wallets used by exchanges to move funds.

The malware samples collected from this attack are only compatible with macOS, but one of the command and control servers has also been known to control Windows malware. It’s possible a Windows version of the attack exists in the wild but has evaded detection thus far.

Continue reading

Malware Masquerading as Android 2FA App Infected 10,000 Phones Before Removal
Malware Masquerading as Android 2FA App Infected 10,000 Phones Before Removal

Known simply as 2FA Authenticator, the app picked up more than 10,000 installs until security researchers identified it as a vehicle for trojan-dropper malware.

Clever Malware Masquerades as Windows 11 Installer
Clever Malware Masquerades as Windows 11 Installer

A Russian website disguised as an official Microsoft page is distributing an "upgrade installer" that won't get you Windows 11. What it will get you is a bunch of malware.

Researchers Devise Malware That Runs When an iPhone is Powered Off
Researchers Devise Malware That Runs When an iPhone is Powered Off

The iPhone's low-power mode allows users to access Express cards and locate lost devices even when the phone is turned off—but it also presents a concerning security vulnerability.

Google Warns of Sophisticated Malware Distributed With The Help of ISPs
Google Warns of Sophisticated Malware Distributed With The Help of ISPs

According to Google's Threat Analysis Group (TAG), this spyware was developed by an Italian company called RCS Labs. The firm claims to be on the right side of the law, but that doesn't change the fact its software is being used to breach user privacy.