HackDig : Dig high-quality web security articles for hacker

Facebook Users Targeted By Android Same Origin Policy Exploit

2014-12-26 22:30

A few months back we discussed the Android Same Origin Policy (SOP) vulnerability, which we later found to have a wider reach than first thought. Now, attacks are found under the collaboration of Trend Micro and Facebook, which actively attempt to exploit this particular vulnerability, whose code we believe was based in publicly available Metasploit code.

This attack targets Facebook users via a link in a particular Facebook page that leads to a malicious site. This page contains obfuscated JavaScript code (see in Figure 1 below), which includes an attempt to load a Facebook URL (seen in Figure 2) in an inner frame. The user will only see a blank page as the page’s HTML has been set not to display anything via its div tag (Figure 3), while the inner frame has a size of one pixel (Figure 4).

Figure 1. Malware code segment upon opening the Facebook page

Figure 2. Corresponding content of opened Facebook page

Figure 3. The main page is set to be invisible

Figure 4. The inner frame has a size of one pixel

While these routines are being carried out, the SOP bypass is being performed. A remote JavaScript file is loaded from a legitimate cloud storage provider. This file contains the malicious code of this attack:

facebook_BB_fig5new

Figure 5. The malware code segment performs the SOP attack

The JavaScript code allows attackers to carry out the following activities or routines on Facebook:

  1. Add friends
  2. Like and follow Facebook pages
  3. Modify subscriptions
  4. Authorize a Facebook app to access the user’s public profile, friends list, birthday information, likes and friends’ likes
  5. Steal the victim’s access tokens and upload them to their server  at http://{BLOCKED}martforchristmas.website/walmart/j/index.php?cid=544fba6ac6988&access_token= $token;
  6. Collect analytics data (such as victims’ location, HTTP referrer,  etc.) using the legitimate service at https://whos.{BLOCKED}ung.us/pingjs/

In addition to the code at the above site, we found a similar attack at http://www.{BLOCKED}php.com/x/toplu.php. We believe both of them are created by the same author because they share several function names, as well as the client_id of the Facebook app.

Which app was authorized?

The client_id involved in this malware was “2254487659”. This is an official BlackBerry App  maintained by BlackBerry. We confirmed with BlackBerry and clarified that this malware is trying to take advantage of the trusted BlackBerry brand name and steal user’s access-tokens, which can be used to make requests to Facebook APIs and read user’s information or to publish content to Facebook on behalf of a person. Blackberry released this statement:

“The mobile malware using the Android SOP Exploit (Android Same Origin Policy Bypass Exploit) is designed to target Facebook users regardless of their mobile device platform. However, it attempts to take advantage of the trusted BlackBerry brand name by using our Facebook web app. BlackBerry is continuously working with Trend Micro and Facebook to detect and mitigate this attack. Note that the issue is not a result of an exploit to Blackberry’s hardware, software, or network.”

Google has already released fixes for this vulnerability as noted in our earlier post. However, not all users may be able to update their browser and/or Android version. Until device vendors are able to release patches, users will still be at risk.

The threats related to this attack are detected by Trend Micro products as JS_ANDRSOPEXP.A and HTML_ANDRSOPEXP.A.


Source: /Y7sKvC5chdg/3~/golBerawlaM-itnA/r~/moc.orcimdnert.sdeef

Read:2194 | Comments:0 | Tags:Bad Sites Mobile Vulnerabilities android SOP vulnerability e

“Facebook Users Targeted By Android Same Origin Policy Exploit”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud