×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

GS-III :
  • 21 June, 2020

  • 10 Min Read

Has Google failed to protect its Chrome browser?

Has Google failed to protect its Chrome browser?

Context

  • A few days ago, Reuters reported a “newly discovered spyware effort” targetting users of Google’s browser Chrome.
  • The spyware, it said, has been pushed through at least 111 malicious or fake Chrome browser extensions, which have been downloaded some 32 million times.

(Browser extensions are add-ons that provide additional capabilities to the user.)

  • The report also said Google had taken off more than 70 extensions from its official Web Store last month after being alerted to their malicious nature by researchers at Awake Security.

How do these malicious extensions get in to the Chrome store in the first place?

Short answer: they seem harmless, to being with.

  • According to the report by Awake Security, which brought this issue to light, these “sleeper agent extensionsappear to do nothing in the beginning.
  • The “malicious payloads” are only pushed on to the extensions much after the “clean” versions have been approved.

What do the malicious extensions do?

  • They can take “screenshots, read the clipboard, harvest credential tokens stored in cookies or parameters, grab user keystrokes (like passwords),” says the report.

How has Google reacted to this?

  • As mentioned above, Google has recently removed the malicious extensions.

It has been mentioned that some of the fake extensions were never in the Chrome Web Store. How were they made to work then?

  • This is due to the misuse of an open-source browser project, Chromium — installing it can lead to malicious add-ons.
  • This works as a rogue browser when users unwittingly give it the okay to run when prompted.

Are browser extensions a vulnerability?

  • A significant part of what we do on the computer these days is via the browser.
  • Also, the research report points out that it has been a challenge for security solutions to spot malicious activity that is happening within the browser.
  • The Awake Security report says, “Rogue access to the browser therefore frequently means rogue access to the ‘keys to the kingdom’ — from email and corporate file sharing to customer relationship management and financial databases.”

How are users fooled?

  • Watch out for prompts that urge you to make a new browser as default.
  • The security firm has also documented some standard characteristics of malicious campaigns. For starters, some of these malicious players have professional-looking web sites that peddle false promises. An example recorded is that of a security extension that certifies a page with malicious content as secure.

Identifiers of a malicious web extensions

  • Security experts can visually figure out if an extension is malicious or fake, says the Awake Security report, listing out the following easy identifiers:
  • These extensions, for an unknown brand and little information, have a huge following; the user reviews are always great; these extensions have a huge following despite being relatively new in the market.

What other vulnerability has this finding revealed?

  • The Awake Security report ends with a question mark on the conduct and practices of a small Israel-based domain registrar called Galcomm, formally known as CommuniGal Communication Ltd according to Reuters.
  • Its report says 60% of its domains are high risk for organisations.
  • These malicious domains have managed to evade categorisation as unsafe because their actions depend on where the client is connecting to it from.
  • They act maliciously only if the client connects from a broadband or cable network.
  • They act benignly if the request comes from a data centre or virtual private network.
  • It says, “This registrar, who also maintains a Registrar Accreditation Agreement with ICANN (The Internet Corporation for Assigned Names and Numbers), is responsible for putting far more malicious domains, malware, and exploitative content on the internet than legitimate content.
  • We believe the research and analysis summarized in this report proves that Galcomm is at best complicit in malicious activity.”
  • The bigger issue raised by the report is one of lack of oversight by ICANN, which oversees domain name standards.

Domain Registrar

  • A domain name registrar is a business that handles the reservation of domain names as well as the assignment of IP addresses for those domain names.
  • Domain names are alphanumeric aliases used to access websites; for example Google's domain name is 'google.com' and their IP address is 192.168. 1.1.

What has been Galcomm’s response?

  • Reuters reported that Galcomm owner Moshe Fogel has denied any wrong-doing.

Source: TH


Oceanic Anoxic Event 1a and MASS EXTINCTION

Oceanic Anoxic Event 1a from the Paris Basin (Environment) Paper-3 PMP OAE 1a refers to a period during the Cretaceous Period (145 million years ago and ended 66 million years ago) when Earth's oceans became depleted of oxygen, causing a significant disruption in marine life.  Cause: The event is believed to have been

Viksit Panchayat Karmayogi (Good governance)

Viksit Panchayat Karmayogi (Good governance) Governance GS PAPER-2 PMP Dr. Jitendra Singh launched the ‘Viksit Panchayat Karmayogi’ initiative on Good Governance Day, celebrated to mark the 100th birth anniversary of former Prime Minister Atal Bihari Vajpayee. The initiative, which is part of the broader ‘Prashasan Gaon

Major programmes to control Air Pollution

Major programmes to control Air Pollution National Clean Air Programme? It was launched by the Ministry of Environment, Forests and Climate Change (MoEFCC) in January 2019. It is the first-ever effort in the country to frame a national framework for air quality management with a time-bound reduction target. The

Air pollution and Air quality Measures in India

Air pollution and Air quality Measures in India (Environment) GS Paper-3 P-M-P Air pollution may be defined as the presence of any solid, liquid or gaseous substance including noise and radioactive radiation in the atmosphere in such concentration that may be directly and/or indirectly injurious to humans or other l

Geopolitical Significance of Ports

Geopolitical Significance of Ports (IR)  Act as geopolitical assets: Ports enhance the projection of strategic reach, which helps strengthen the country’s control over important sea and energy supply routes.  E.g. Indian Navy’s staging base at Agalega Islands will enable marine patrols

Toppers

Search By Date

Newsletter Subscription
SMS Alerts

Important Links

UPSC GS Mains Crash Course - RAW Prelims Answer Key 2024