GµårÐïåñ wrote:First off, I was going to say it but since Alan already has, I have to say that he is correct, firefox.com is just fine and is legit and unlikely to be an attack vector. That being said the "hidden" extensions as is called here and there, are not so hidden. They may be installed using code directly into the registry like some well known companies (Microsoft, VideoLAN, DigitalPersona, RoboForm, RealPlayer, etc etc) but although the installation may be silent the presence is NOT. You will ALWAYS see an extension that is installed in the your extensions list and/or plugins page. That registry key is very helpful in removing stubborn global installs that won't go away on their own but nothing malicious can hide there long unless people just don't check their addons and what they are running.
The forum threads I referenced said "nothing extra was in the addon list, although Firefox said one new addon had been installed" - as I haven't run across anything like this myself, I felt it worthwhile to mention.
GµårÐïåñ wrote:As a POC, it is possible to load a compiled dll that piggy backs on an extension that is trusted and then do damage but the presence of it will be felt regardless because in order to exploit the admin/privileges access of chrome through an extension, it has to register it with the browser's core, hence, not hidden, just silent. Hidden action (clandestine) does not mean its hidden (transparent). You send in the spec-ops they will kill and leave before you know they were there, but you WILL know they were there shortly after. You may have been exposed to a hit and run code, extension, rogue extension, addon, or exploited addon/extension but its not "hidden" hidden, you just have to look to see if something is there that you didn't put there and then if you can't remove it because its global, then hit the registry. Just saying, let's not rush to judgment.
No, it can't be totally "hidden" like "invisible" hidden, but I'd say anything hiding from the addons list is moderately safe from discovery unless somebody is actively poking around looking for something - just what we're doing.
Tom T. wrote:I'm sorry, my wording wasn't clear. The link you gave said that the poster got the infection *in a Fx update*. What I was trying to say is that Fx2 hasn't been updated since Dec. 2008, whereas OP has the latest update. So the chance of last year's update of 2.x19 to 2.x20, *and* OP's several updates of 3.5.x *both* containing malware seem slim. Surely millions would have seen this?
yes, you're right. Another idea gone, but with so few possibilities left, we're down to the good ones... (and one not-so-good one, having to admit defeat)
Tom T. wrote:Nothing unusual in that Registry key or values, nor in the corresponding files and folders.
No, but your infection seems to be gone - let's see what Montagar finds.
Tom T. wrote:Last night, I got the notification that there was a new version of Firefox available, so I updated. After it had installed and I restarted, I noticed that the add-ons box popped up and it said that a new add-on had been installed, but I didn't actually see anything new.
I'm sure that I would have seen and investigated such a pop-up message. I'm sure that I haven't seen one.
I'm sure you would have seen that, too.
However, that doesn't have to be the delivery method - what about a "piggyback"? If this rogue addon entered your machine with a legit download, it might have covered its tracks - end result, no popup message.
Tom T. wrote:Anywho, let's say you search for something on Google or Yahoo (ask.com was mentioned as well, but I didn't try that). Let's also say that the first result for your search is
http://www.mozilla.com. When you mouseover the link, you see
http://www.mozilla.com in the status bar, but when you click it, you go to something like...
This is *not* the same issue as OP. He and I both saw it *upon first connecting* to Google, *without* clicking or mouseover any links -- and even when no Internet connection was available.
I know it's not the same issue, but it's the same caliber issue - somebody goes to Google, Yahoo, Bing, etc. and a malicious addon takes full advantage of that.
Their infection took the form of being redirected, but
this infection takes the form of launching another site's script. Shouldn't be all that hard to change the payload, right? Maybe the virus writers wanted something a little less noticeable than a full redirect?
Tom T. wrote:The above-linked poster's fix:
I've already got it fixed... as mentioned on the first link, you need to delete the folder:
Documents and Settings\(your name)\Local Settings\Application Data\{33238016-EFEB-43AA-8BCE-3CA12861EE79}
{33238016-EFEB-43AA-8BCE-3CA12861EE79} seems to be unique to each computer - mine was named {385E83C1-7EFE-491C-B303-2F462B11E491}.
I have no such string-named folder at that location. There was a long-string .ini, but a quick search showed that that was a Media Player Classic file.
Well, your infection is gone so I wouldn't expect you to find anything - Montagar might have different results.

Also, this is clearly a different malware, so I'd hardly expect it to use the same GUID...
Tom T. wrote:Note the difference in symptoms also in Link #3:
Recently, I noted that when opening search results from Google in Firefox 3.0.3, I would occasionally get redirected to a different, unrelated website than the one I thought I was headed for.
Again, that is *not* the issue. We were *not* being redirected from search results in Google, but rather saw this script trying to run even if we couldn't get to Google. (Internet connection off.)
I know, but see my comment above - the attack container (malicious addon) is probably the same, but the payload changed - after all, something a little less obvious but a little more effective is always what those malware writers seem to want...
Tom T. wrote:As said, nothing in the extensions or plugins list, folders, etc.; nothing in that registry key -- just the paths to the appropriate folders:
HKLM\SW\MZ\MZ Fx 2.0.0.20\Extensions (pardon the abbreviations, since we're all talking about the same key)
Components: = REG_SZ C:\Program Files\Mozilla Firefox\components
Plugins: = REG_SZ C:\Program Files\Mozilla Firefox\plugins
Two below that subkey in the Software folder is MozillaPlugins, with the only subkey: @adobe.com/FlashPlayer, and all of those entries look like perfectly normal entries related to Flash; no anomalies.
Well, as I mentioned, we need Montagar to find something - since your infection is apparently gone, I wouldn't expect to see anything unusual in your Registry... Monty's different though. (Come to think of it, he's the last "live" link to this malware...)
Tom T. wrote:Appreciate all the time and effort you've put into this, CF, but these don't quite seem to fit, either.
Maybe my revised & explained explanation will fit better...
Tom T. wrote:But since I can't reproduce it, and OP apparently still can, Montagar should definitely check all of the above folder locations and Registry keys. But according to Guardian, they would show up in the Extensions or Plugins list anyway.
Not to pick an argument with Guardian, and he knows way more about this stuff than I ever will, but I still think we're looking at a hidden addon. The guys in the MozillaZine & MalwareBytes forums had a hidden addon, and we don't have much else to go with...
A hidden, rogue addon would also take care of an infection vector - all we'd need is a combination of hacked, legitimate addons and/or hacked, legitimate applications to spread the infection. (Now the question is, how would only two people get the infection??)
Tom T. wrote:@ Guardian: Is it possible that a "legitimate" extension was corrupted to contain the rogue script? Should we check checksums on those extension folders? (Since I can't reproduce it, I doubt I'd find anything.)
Sure, it would be possible for a legitimate addon to be corrupted... remember the GreaseMonkey and Firebug security holes? They could be corrupted, IIRC, even by visiting a malicious webpage... no "formal" installation of
anything required.
idk about checking checksums, though - if any changes were made to those folders, whether by Fx or by the user, the checksums would be different and a legitimate addon might get blasted for something it didn't do...
With great power comes great responsibility.
Learn something new every day, and the rest will take care of itself.
Life is a journey, not a destination. Enjoy the trip!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5