Feeds

Mozilla snuffs password pilfering Firefox add-on

Beware unreviewed software calling itself Mozilla Sniffer

Next gen security for virtualised datacentres

Mozilla has disabled and block-listed a Firefox add-on containing code that nabs login data sent to any website and reroutes it to a remote server.

The add-on — known as, um, Mozilla Sniffer — was uploaded to the Firefox add-on site on June 6, and the malicious code was discovered on Monday, after which the add-on was block-listed. This means netizens who installed the add-on will be prompted to remove it. Mozilla also says that, yes, anyone who has installed the add-on should change their web passwords tout de suite.

"If a user installs this add-on and submits a login form with a password field, all form data will be submitted to a remote location," Mozilla said in a Tuesday blog post, before adding that the remote server charged with collecting passwords appeared to be down.

According to Mozilla, the Sniffer was downloaded about 1,800 times, and as of Tuesday, there were 334 active users.

The add-on had not been reviewed by Mozilla. It was marked as "experimental", meaning that anyone who attempted to install it received a warning that the code had not been reviewed. Such unreviewed add-ons are merely scanned for viruses, trojans, and other malware.

Mozilla, however, is (slowly) developing a new security model designed to prevent unreviewed add-ons from being served to world+dog. "Having unreviewed add-ons exposed to the public, even with low visibility, has been previously identified as an attack vector for hackers. For this reason, we’re already working on implementing a new security model for addons.mozilla.org that will require all add-ons to be code-reviewed before they are discoverable in the site."

The proposed model is described in detail here.

Mozilla also said it had discovered a security vulnerability in version 3.0.1 of a far more popular add-on known as CoolPreviews, which displays previews of webpages when you mouse over links. Version 3.0.1 and earlier versions have been disabled, and a patched add-on has been uploaded to addons.mozilla.org.

According to Mozilla, when the user mouses over a link, the add-on could execute remote JavaScript code with local chrome privileges, giving an attacker control over the user's machine. "If a user has a vulnerable version installed and clicks on a malicious link that targets the add-on, the code in the malicious link will run with local privileges, potentially gaining access to the file system and allowing code download and execution," Mozilla said.

About 177,000 users had a vulnerable version of the add-on installed as of Tuesday — less than 25 per cent of total users. Mozilla intends to block-list vulnerable versions "very soon." ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.