Amateur Radio Emergency Service - W4ACA

Proudly using the Oak Ridge ARC (W4SKH) Repeaters & W4ACA APRS Digipeater

Friday, December 21, 2007

Google Toolbar: Beware of Buttons

December 20th, 2007

by Roderick Ordoñez

The Google toolbar has found yet another use: as a possible malware vector. Researcher Aviv Raff has released a proof-of-concept (PoC) code, which demonstrates how an attacker may install malicious software or conduct phishing attacks by prompting the user to install a new Google toolbar button.

Affected Google toolbar versions are as follows:

Google Toolbar 5 beta for Internet Explorer
Google Toolbar 4 for Internet Explorer
Google Toolbar 4 for Firefox (partially)

The code makes use of a specially crafted link that refers to the button’s XML file, which when clicked displays a dialog box summarizing the details of the button to be installed. This dialog box also displays a URL of where the button is to be downloaded. Through manipulation, however, a malicious author could make it appear that the said URL is non-malicious by adding special redirector strings. This further increases the user’s trust in the button to be installed. If the toolbar does get installed, the user must manually click on the button to execute it, which in turn may run an installation script (which a user must approve to install) or a fake log-in console (for phishing purposes).

However, Google classifies the PoC as non-critical, due to the multitude of steps involved before a user does get infected. Nevertheless, the search giant has confirmed that it is currently looking for a fix to remedy the bug.

Google actually encourages the creation of custom buttons for its toolbar, and outlines the ease of creating one in their Web site, complete with API documentation. This ease-of-creation feature, coupled with Google’s large fanbase, opens up plenty of possibilities for its users, malware authors included.

For the meantime, users of Google toolbar are advised to refrain from adding new buttons.

Read More

No comments:

Anderson County ARES Information

The Anderson County ARES net meets every Tuesday Night at 7PM local time.
We use the the W4SKH Oak Ridge ARC repeaters.

The main repeater is: 146.880 PL Tone 88.5 (Currently Online)
The current back up is: 146.970 (Currently Online)

The ARES Nation Simplex Frequency is 147.420 and will used if required.

The net preamble for the Anderson County ARES net can be found here.
NET PREAMBLE

Net Control Station Manual

New FCC BAND PLAN (pdf) Updated Version with a different layout HF Band Plan Vertical (pdf) Courtesy of KB6NU's Ham Radio Blog

If you would like to join Anderson County ARES please complete the application form and submit it by email to Jeff or Moe.


Emergency Coordinator and Staff

Jeff Yawn K4IK Emergency Coordinator (865)567-2577
Jim Bogard - KY4L Assistant Emergency Coordinator
Larry Hensley - KB4ITS Asst Emergency Coordinator / Net Manager
Steve Lothridge - KI4RGN Net Manager
Moe Brewer - N4CQW Asst Emergency Coordinator / Webmaster

Trend Micro

QTH.com Classifieds