Tom T. wrote:computerfreaker wrote:I also use Sandboxie on occasion; looks like I'd better start using it more.
How 'bout "100% of the time"? Only exceptions: Firefox updates from Mozilla. (Need an admin-privileged browser.)
100% sounds good to me - since I use Fx Portable, I don't want automatic updates (they break any Fx local installs, last I heard). 100% is good...
Tom T. wrote:Only downsides: If you d/l a video, pic, sound clip, etc., there's an extra step or two to move it from the sandbox to your "real" machine. If you forget, you *could* lose it, but well-behaved SB looks for the types of files that you might want to save, and prompts you to recover them (or not), before it will close and empty.
Cool. With d/l'ing, I'd have to be careful, though, as my dialup connection isn't the sort of thing to make that kind of mistake with... especially with a big, 101-MB OOo install, eh?
Tom T. wrote:The manual move of mysong.mp3 from sandbox to HD is easy. When I click "Save as... " etc., I get an immediate prompt from SB, "Would you like to recover the following file?" "Yes, to same folder" .. "Yes, to a different folder" "Not right now".
Sounds easy... and my own (admittedly limited) experience with SandBoxie confirms the ease-of-use.
Tom T. wrote:Tip: I have my mouse pointer configured so that the pointer automatically jumps to any highlighted dialogue button. So one left-click, and it's *done*. I don't know if all mouse drivers support this. (This is a laptop, where the touchpad isn't as fast to use as a physical mouse is.)
My touchpad supports that, but I won't be doing it anytime soon - I tend to click pretty quickly, and any auto-moving could result in my clicking something I don't want to. I've already turned that off...
Tom T. wrote:You can get some xpi updates in this fashion (manual move, then later drop into an Admin browser).
Oh, that's right, I'd have to run addon updates in a non-sandboxed browser... oh well, not a big deal.
Tom T. wrote:Tom T. wrote:@ computerfreaker: Would you like a job here? Rewards: Long hours, no pay, occasional flames from disgruntled users ....
It would be a great honor.

Consider the statement a great honor.

But it's not my place to choose Mods. (also will PM you with some additional considerations.) Slightly facetious, but indeed a compliment to your tireless detective work.
Your statement is a very great honor to me; this is definitely one for Scrapbook to save.

I understand you can't choose mods, and your additional considerations are very valid as well; however, just the statement is a huge reward. I value everything you guys have to say, and (especially from a mod) that statement means a great deal to me...
Tom T. wrote:Tom T. wrote:Edit: Oops, missed that one line,
CF: "Tom, you might want to search your own computer sooner rather than later."
I'd already done all of the searches, including the one that was eventually successful for Montagar, and I'm about 100% certain that Sandboxie dumped the badware. (another reason I empty it *very* frequently -- often, between each site visit). Inability to reproduce confirms this.
Good. I wasn't sure, since the malware was an addon, if your enabling/disabling temporarily took out the addon or if closing the sandbox took care of it for good. Good riddance...
Now I have to wonder how the thing managed to survive one browser restart - addons can't be installed w/o a browser restart, and the sandbox took care of it so... I'd love to know just what went on inside your computer that the malware survived one restart but not two. (Although maybe you just restarted your browser, not the entire sandbox? That's possible...)
The last statement isn't possible. I have SB configured to the safest setting, which is to automatically empty the sandbox whenever the sandboxed app (the browser, in this case) is closed.
So there are two possibilities: 1) A legitimate, but infected update was obtained with a non-SB'd browser, and restarted as required, in which case the malcode *is* part of the update that is written to the HD. Then, SB would clone the infected extension every time. BUT that would *not* have extinguished the malcode, as we apparently saw SB do. I would still be able to reproduce it as ol' Monty did. So let's rule that out.
2) What I had said earlier: That I picked up the infection in the same browsing session, perhaps as part of some rogue code running on Google (I have all of the ads and ad scripts blocked), and never did close the session on that "interesting" day. Perhaps when I did the test of disabling the extensions, which *does* require restarting an admin-priv browser, it wasn't the
disabling that eliminated it, it was the
closing of SB to do the disable/restart that dumped the just-acquired malcode.
The more I think about it, the more #2 seems to be the only possibility.
#2 has one problem though - you'd have to restart the browser to install the addon! So how this thing survived on browser/sandbox restart (to install), but not a second restart, is a mystery that probably only the source code can clear up.
Tom T. wrote:
Well, IMHO something like VMWare or VirtualBox could be useful in cases like this - by locking down the VM, infection would be kept inside it but could be readily examined. (With no fear of the infection vanishing the next day unless you deleted the VM)
Definitely. Or I could have inspected the contents in real time, as mentioned. Or copied them to a permanent folder on my machine, and *opened its files sandboxed only*, at leisure, to examine the contents. Yes, you can open just about any app or file inside SB. (Uh-oh, sounds like I'm touting it again. Just thinking of ways I could have used it to examine this sucker even after it was extinguished from the virtual browser.)
If Montagar ever posts the source (see his comment below), I'll be opening it
in a sandbox only - I don't feel like turning it loose on my system, thanks anyway.
Tom T. wrote:VMWare is much more expensive than SB (which is available for free if you can stand the nag screens), and requires more disk space, memory, etc. Definitely a good thing for the tech-savvy, developers, etc. SB (and some others) are light in weight and require only a very short learning curve, after which there aren't any decisions to make -- probably more friendly for the average home user. I know that devs like Guardian and Giorgio Maone use the more sophisticated ones so that they can easily have multiple OSs on one machine, test sw, patches, etc.
I was thinking more of VMWare Server or VMWare Player, both of which are free... (I know, because I've used both before)
VirtualBox is also free, but a little less advanced AFAICT. (I've used VirtualBox as well, but ditched it in favor of VMWare)
Tom T. wrote:Tom T. wrote:Or *everyone* could get some kind of virtualization tool (should be standard with all OS and browsers

), and a lot of these attacks would become non-issues.
True. Although it's probably just as well that Montagar didn't have a sandbox in place, as this circus could save other users with similar issues (and no sandbox)...
And no NoScript -- I wonder how many users of other browsers, or of Fx without NS, got this infection, and *what actual damage it did*? ... And why has it not made a splash in the security community? Seems like it didn't penetrate very far...
Definitely weird that we haven't heard more about this. Given the number of NS users, you'd think
somebody would notice...
Tom T. wrote:Don't want to sound nosy or anything, but could the two of you post your Fx addon list (including version #'s) and your application list? A simple comparison should eliminate most of the possibilities... and, given that both infections came recently (I can tell about Monty's from the file dates, and yours from the sandbox), it shouldn't be hard to track down. (The malware source code should really help, too)
Being naturally lazy

, how 'bout if we look at the source code first, which *might* be a dead give-away. If not, then we can take other steps.

Sure, let's see the source first.

Only thing is, if this is well-designed it won't leave any calling cards at all...
Firefoxer wrote:Hello Montagar, HijackThis is a deprecated malware removal tool mostly among the malware removal community now, did you know?
Depreciated? HJT? Wow.
It's still a pretty potent tool, AFAICT... and, like most depreciated things, I doubt it's going anywhere soon. That's just MHO, though.
Firefoxer wrote:The source of this variant of goored (it's been around since early last year) may still be on your hdd, despite the goored behaviour having been stopped for you just now.
In the Firefox forums, in a thread dealing with one of these vundo aka goored aka clickfeedmanager etc. variants, Daifne, a moderator, wrote:
and that's the best course of action for geeks and non-geeks alike when these kinds of infections arise.
True, but we weren't totally sure this was an infection - and even now, we're not sure, pending evidence from Montagar.
Firefoxer wrote:Malwarebytes' Anti-Malware (MBAM) is at the bleeding edge for finding malware right now, so it's the tool most likely to find evidence of the newest kinds of vundos.
True. But I thought you ran MBAM, Monty? Or am I thinking of something else?
Firefoxer wrote:With any luck, you are already free of any underlying malware, but I want to add that you please consider taking your findings to the forums which specialise in malware hunting anyway. This is because if your finding is a new variant, then your data won't be dangling around in a little-known forum (to the malware searcher's community, not to us in the Firefox community, of course

), it can be used to update the current very effective goored removal tool that will help the non-tech needy, and if your variant is already known, then you *may*, judging by the reported steps you've taken, still need help to be perfectly certain that you've found the original vundo infection source.
Sound advice, IMHO.
Montagar wrote:Okay... what method should I use to post the overlay.xul code? (Post it here using the code tags, use pastebin.com, etc)
If you decide to post it, any public upload site should be OK... just make sure you label it in such a fashion that nobody doubts it's malware (i.e. "Innoshots malware.zip" would be great), so nobody stumbles into it and gets infected by mistake. Also, make sure you change the link protocol so nobody accidentally clicks it, pre-loads it (addons like Fasterfox preload links, IIRC), etc...
GµårÐïåñ wrote:Basically someone could have analyzed a code for an extension and found a way to inject into or use it to run their own code, absolutely. HOWEVER, that being said, it will masquerade and install as "SOMETHING", what that is depends but it WILL be visible in the addons and you know you didn't put it there, you remove it.
So are you saying nothing can hide from the addons list, just piggyback on a legitimate addon? Because it sounds like these goored infections are all hiding from the addons list, but it also sounds like you're saying nothing can hide from the list... I'd like to resolve that discrepancy, primarily just for the knowledge.
Montagar wrote:Well before I post the source code there are a few things that I need to get cleared up first.
I have looked at the code and done some research and it appears that this code belongs to a valid FF add-on (it's listed at addons.mozzila.org).
I know for a fact that I have never installed this particular add-on (well at least not knowingly), and it was never listed in my extensions or plugins list.
So before I post the code, I am going to do some research like comparing the "valid" add-on with the "rogue" add-on.
I hope you all understand that I don't want to open the door for accusations and such without doing some prudent research first.
Well, I'll be danged. I'd love to know just what's going on here... has a valid addon been hacked, a malicious addon put out as a valid addon, or what the heck?
Monty, would you be willing to PM the details of this? I'd be happy to see the details, and I'm sure Tom, Guardian, Alan and possibly even Mr. Maone might want to see as well... (listing people who've been active in the thread, although you might want to be sure they're OK with you PM'ing the details)
As always, everything you send will be in strict confidence...
-computerfreaker
With great power comes great responsibility.
Learn something new every day, and the rest will take care of itself.
Life is a journey, not a destination. Enjoy the trip!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5