Security News Firefox 0 day in the wild! What to do.

BoraMurdar

Super Moderator
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
Update at 2:32pm PST / 5:32pm EST: Firefox released a fix for this a few minutes ago. Update to Firefox 50.0.2 now to patch this vulnerability. Tor have also released a fix with version 6.0.7 of their browser.There is also a Thunderbird fix out, version 45.5.1. I also posted an extended update at the end of the post including data indicating this exploit may be part of a law enforcement operation.

/End Update.

We’re publishing this as an emergency bulletin for our customers and the larger web community. A few hours ago a zero day vulnerability emerged in the Tor browser bundle and the Firefox web browser. Currently it exploits Windows systems with a high success rate and affects Firefox versions 41 to 50 and the current version of the Tor Browser Bundle which contains Firefox 45 ESR.

If you use Firefox, we recommend you temporarily switch browsers to Chrome, Safari or a non-firefox based browser that is secure until the Firefox dev team can release an update. The vulnerability allows an attacker to execute code on your Windows workstation. The exploit is in the wild, meaning it’s now public and every hacker on the planet has access to it. There is no fix at the time of this writing.

Currently this exploit causes a workstation report back to an IP address based at OVH in France. But this code can likely be repurposed to infect workstations with malware or ransomware. The exploit code is now public knowledge so we expect new variants of this attack to emerge rapidly.

This is a watering hole attack, meaning that a victim has to visit a website that contains this exploit code to be attacked. So our forensic team is keeping an eye on compromised WordPress websites and we expect to see this code show up on a few of them during the next few days. An attackers goal would be to compromise workstations of visitors to WordPress websites that have been hacked.

How this unfolded
On Tuesday just after noon Pacific time, someone published a 0 day exploit for Firefox and Tor to the tor browser mailing list.

Screen-Shot-2016-11-30-at-1.41.49-AM.png


Since then researcher Dan Guido posted a series of tweets with some analysis of the exploit itself.

Screen-Shot-2016-11-30-at-1.39.25-AM.png


Twitter user @TheWack0lian noticed the shellcode (code that executes on your Windows workstation once exploited) is very similar to shellcode likely used by the FBI back in 2013 to deanonymize visitors to child porn websites hosted by FreedomHosting. The FBI confirmed that they compromised that server and days later it was serving malware that would infect site visitor workstations. The code then reported site visitor real IP addresses, MAC addresses (network card hardware address) and windows computer name to a central server. This code is very similar.

Screen-Shot-2016-11-30-at-1.40.38-AM.png


What we found
The shell code in this attack calls back to IP address 5.39.27.226, which was a web server hosted at OVH in France. The site is now down. Our own research shows that if you look up this IP address in Shodan, it had an SSL certificate that is a wildcard for the energycdn.com domain name. That site for energycdn is simplistic and according to archive.org, it has not changed since 2014.

Googling energycdn.com shows that the domain is used frequently to host pirated content. Norton Safe Web reports it hosts viruses. Google Safe Browsing transparency report says the domain hosts malware and redirects to malicious sites.

One could speculate that the server at 5.39.27.226 was used by energycdn.com as one of their servers to host pirated content. Perhaps the server was compromised by whoever controls energycdn to host that content and then was reinfected by the perpetrator of this new malware variant. But we’re speculating.

Additional press coverage
Update at 2:03pm PST / 5:03PM EST on Wednesday:
Vice’s Motherboard have provided an update 2 hours ago on this issue from a few sources. Here’s the summary and some context:

Remember, this attack targeted Tor users specifically and the goal of the attack was to reveal the identity of the browser operator. It is also very similar to a 2013 attack that was likely launched on child porn website visitors by the FBI to identify and arrest them. The fact that this exploit simply tries to reveal a user’s identity rather than infect them with malware indicates it is being perpetrated by a law enforcement branch in some country.

Vice is now reporting that their sources are saying this exploit is active on a child porn website called The GiftBox Exchange. There are also warnings on the Dark Web about the presence of this malware. In my opinion this strongly indicates that this exploit is in fact the FBI or another agency targeting visitors of The GiftBox Exchange.

Vice has reached out to FBI and Europol. FBI declined to comment and Europol did not respond.

My guess is that you will hear about this again a few months from now when the indictments start to emerge. If that is the case, and it is confirmed this is an FBI operation, this would make it clear that using 0 day vulnerabilities to actively exploit browsers for surveillance is the new modus operandi of the FBI. This technique was used in 2013 to target visitors of websites on FreedomHosting. It was used again to target and indict visitors of Playpen in 2015. And this technique is being used again today.

Firefox have now released a fix with version 50.0.2.

Tor released an update to their browser today that fixes this vulnerability.

Thunderbird have also released a security fix related to this.

You can find the actual Firefox vulnerability report here.
 

Rocky Bennett

Level 1
Verified
Aug 12, 2016
28
I think that my system blocked this intrusion. I got a lot of pop ups that said that this was blocked, and my system still looks clean.

Also, I just made sure that I now have Firefox 50.0.2 installed so that I am good to go. Firefox is my default web browser in Windows 10, and I want to stay safe.
 
Last edited by a moderator:
K

KGBagent47

I understand this is patched now but out of curiosity how would this work "The vulnerability allows an attacker to execute code on your Windows workstation."

Would it force a malicious download?
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Fortunately I'm not using Firefox.

Honestly if the system is not connected through different networks then chances of infection will be minimal; still it's important that a solution is already taken as many systems nowadays have mediocre protection installed.
 

tim one

Level 21
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
I understand this is patched now but out of curiosity how would this work "The vulnerability allows an attacker to execute code on your Windows workstation."

Would it force a malicious download?
The flaw seems to exploit an heap overflow bug. The exploit code puts in place a buffer overflow attack on the content of the memory system, in the data area: the heap.
This, unlike the stack, is the portion of memory that is allocated dynamically by the running applications and typically contains user data program.
Using malicious JavaScript code, created especially for Firefox on Windows systems, it can make direct calls to the library kernel32.dll and to perform arbitrary operations on the user's machine.
 

pneuma1985

Level 4
Verified
Aug 30, 2015
189
Tor has been completely compromised as far as anonymity go they have a big section of its source code. That and them being in control of the major nodes they know who you are and they can see who you are. At least on any windows system without a good VPN.
 

soccer97

Level 11
Verified
May 22, 2014
517
Oh well, I use Chrome and Edge.

Tor, used it once to test it, meh and slow. There are some who uses it for legit reasons of course. Good to see the authorities going after the sickos.

Chrome isn't as safe is it used to be anyway unfortunately. If you haven't updated to the latest version (released 12/1/16), I would advise doing so. It fixes 36 vulnerabilities rated High, Critical or Medium. (And the fixes include fixes for vulns that are XSS and Memory out of Bounds, as well as PDF vulns).

Since Chrome has a large market-share, it is more likely to be targeted. Firefox is picking up steam on market.

Google Chrome Release Blog
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top