RESOLVED Strange script tries to run when connection is down

Ask for help about NoScript, no registration needed to post
User avatar
GµårÐïåñ
Lieutenant Colonel
Posts: 3369
Joined: Fri Mar 20, 2009 5:19 am
Location: PST - USA
Contact:

Re: Strange script tries to run when connection is down

Post by GµårÐïåñ »

computerfreaker wrote:
GµårÐïåñ wrote:Basically someone could have analyzed a code for an extension and found a way to inject into or use it to run their own code, absolutely. HOWEVER, that being said, it will masquerade and install as "SOMETHING", what that is depends but it WILL be visible in the addons and you know you didn't put it there, you remove it.
So are you saying nothing can hide from the addons list, just piggyback on a legitimate addon? Because it sounds like these goored infections are all hiding from the addons list, but it also sounds like you're saying nothing can hide from the list... I'd like to resolve that discrepancy, primarily just for the knowledge.
Ok, the fact is that nothing is IMPOSSIBLE. I am exploring the most likely vector because it is more likely. The reason being that in order for a simple patch of an active addon to be done must have so many conditions available that its NEARLY impossible that anyone would be that careless or clueless. Yes, THEORETICALLY, it is VERY possible to patch a set of addons that function in a particular fashion that fits their paradigm, check for the conditions needed to patch it, patch it and then run as part of that addon for as long as the lifecycle is planned. However, the most likely vector is via the web, which means unless somehow you are giving the website chrome level permissions and HD access to write (I/O access) then it cannot inject or patch squat that it can't access. However, if you were to be HIT OUTSIDE of a browser by a file of just able any executable type, then it can happen much easier, it WILL be invisible (so far as to now show up in the addon list) and yes will run without your knowledge until someone or something looking for it, finds it and cleans it out. Make better sense now?

One, completely off the top of my head example would be: A page loads a flash or java applet with a payload that is downloaded to your cache as part of the execution of the APP. Then when it is done, it will have an internal code that allows for the LOCAL execution to put it in your addons. Now, if its within the cache system (browser UI) then NoScripts ABE Local will kill that but say you didn't have it or was disabled or you somehow made it useless with another exemption or [insert whatever you did or could have done to open a compromising hole] then it will be able to do so very effectively. Now, does this mean that the website you trust screwed you intentionally, generally the answer is probably not. Why? They may be using a publicly available application to show the consumer something that has a vulnerability that can be injected by someone to hit their viewers. (think back to the formail.pl where the script was used by so many to handle mailing form results to themselves that it was exploited and used to send out spam on your behalf, it was pretty much terminated in most circles, but people still try to have this script uploaded somehow by YOU so they can go back and use it). Hope this clears up some of what I said and is easier to know what I meant.

I would be happy to be part of a PM discussion on this, no problem. Also keep in mind that when I write, I write only to what I find relevant and not too long and off topic. Since Tom experienced the same problem, however briefly, and I KNOW his habits and what he will and will not do, it eliminated quite a bit of possible assumptions from discussion and why I reached that conclusion and did not bother expanding the million other ways it can be done. If I was younger and healthier, I would whip up a few POCs for you to see but I don't have that kind of time right now. Cheers.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: Strange script tries to run when connection is down

Post by therube »

(Has this ever been Zip'd/posted somewhere?)


Being able to slip a plugin into a Mozilla browser is nothing new.
(If MS can do it, anyone can.)

Having/using Mozilla as an attack vector by an unrelated application is nothing new.
Security Exploit Uses Internet Explorer to Attack Mozilla Firefox

Rogue or insecure extensions. Sure.
(If MS can do it, anyone can. Oh wait, I already said that :lol:.)

Rogue or insecure plugins. Sure.
(If Macromedia or Apple can do it, anyone can.)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.6pre) Gecko/20091114 SeaMonkey/2.0.1pre
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: Strange script tries to run when connection is down

Post by Tom T. »

therube wrote:(Has this ever been Zip'd/posted somewhere?)
http://forums.informaction.com/viewtopi ... 222#p13222
therube wrote:Being able to slip a plugin into a Mozilla browser is nothing new.
(If MS can do it, anyone can.)
I think the question here is why it wouldn't have shown up in OP's plugins/extension lists.
Having/using Mozilla as an attack vector by an unrelated application is nothing new.
Security Exploit Uses Internet Explorer to Attack Mozilla Firefox
In that particular example, the user had to *be running IE*. Hopefully, no one here does that. :mrgreen:
therube wrote:Rogue or insecure plugins. Sure.
(If Macromedia or Apple can do it, anyone can.)
Oh, absolutely. We're trying to find the source. Would you care to take a shot at the code posted from the above link, and see if you can de-obfuscate with the js-deobfuscate tool, and find out the source?

The real puzzler is that it *seems* that I picked this up in one session, live, from the Web, the day I read the post -- because closing Sandboxie that night seems to have destroyed it. I would not have gotten any new or updated apps from Apple, Adobe/Macromedia, etc. during that session. Any clues?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: Strange script tries to run when connection is down

Post by therube »

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.6pre) Gecko/20091114 SeaMonkey/2.0.1pre
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: Strange script tries to run when connection is down

Post by Tom T. »

Second link:
Third-party applications installed on your machine would sometimes try extend Firefox by just adding their own code directly to the “components” directory, where much of Firefox’s own code is stored.
This might explain a vector for this situation. Overall, the change in 3.6 should help prevent a lot of this stuff. Thanks for the links.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
User avatar
computerfreaker
Senior Member
Posts: 220
Joined: Wed Sep 16, 2009 10:03 pm
Location: USA

Re: Strange script tries to run when connection is down

Post by computerfreaker »

@Guardian, thanks for the explanation. That makes a lot more sense, and it also means this addon probably came separate from any other addon. We're down to drive-by downloads and 3rd-party stuff without a conscience... I don't know which is worse.
Tom T. wrote:
computerfreaker wrote:Well, I'm glad the "named" addon isn't responsible; regardless of the addon, a malicious addon on mozilla.org would really cause a stink.
Yeah, I was thinking that too. Now we just need to find out how they evaded Guardian's very firm opinion that it would have shown up somewhere in the Add-ons/Extensions list. Some new obfuscation technique?
Nothing new at all. I checked out one of the links from later in the thread, and look what I found. (https://developer.mozilla.org/devnews/i ... refox-3-6/)
In addition to the standard mechanism for extending the browser via add-ons and plugins, though, there has historically been another way to do it. Third-party applications installed on your machine would sometimes try extend Firefox by just adding their own code directly to the “components” directory, where much of Firefox’s own code is stored.

There are no special abilities that come from doing things this way, but there are some significant disadvantages. For one thing, components installed in this way aren’t user-visible, meaning that users can’t manage them through the add-ons manager, or disable them if they’re encountering difficulties.
(Emphasis mine)
Tom T. wrote:@ CF: Does the one you found support the newer systems?

Edit: ComputerFreaker's tool appears to support up through 2008, which would include Vista.
No idea, and (I think I mentioned, not sure though) I don't have Vista or Win 7 so I can't test my own find. :oops:
Tom T. wrote:therube's link in his post at the Web Tech topic, "Freeware-guide: File Searching", has numerous file-searching utilities, some of which support "all" Windows. So there's something for everyone. Don't know why this didn't come up before, but now everyone should be able to search for text *and* binary in *any* file, with a multititude of freeware tools available.
yes, nice to have those tools. A bit like locking the stable after the horse was stolen, but these tools will come in very handy in the future... even for normal, everyday work. (NSIS, anyone?)
therube wrote:being able to slip a plugin into a Mozilla browser is nothing new.
(If MS can do it, anyone can.)

Rogue or insecure extensions. Sure.
(If MS can do it, anyone can. Oh wait, I already said that :lol:.)

Rogue or insecure plugins. Sure.
(If Macromedia or Apple can do it, anyone can.)
At least the MS thing was visible and could be disabled... can't say the same for our goored "friend".
Tom T. wrote:I think the question here is why it wouldn't have shown up in OP's plugins/extension lists.
See my comment above...
Tom T. wrote:Oh, absolutely. We're trying to find the source. Would you care to take a shot at the code posted from the above link, and see if you can de-obfuscate with the js-deobfuscate tool, and find out the source?
Sorry, I wanted to do it today, but a lot of other stuff interfered. I'll try again tomorrow...
Tom T. wrote:The real puzzler is that it *seems* that I picked this up in one session, live, from the Web, the day I read the post -- because closing Sandboxie that night seems to have destroyed it. I would not have gotten any new or updated apps from Apple, Adobe/Macromedia, etc. during that session. Any clues?
The real puzzler is how it survived one restart (to install itself), but not two.
Tom T. wrote:This might explain a vector for this situation. Overall, the change in 3.6 should help prevent a lot of this stuff. Thanks for the links.
How does that explain a possible vector?
It explains the way the addon got installed & got hidden, but not how it got there in the first place - I doubt you guys got hit by a drive-by download, so what the heck happened?
With great power comes great responsibility.
Learn something new every day, and the rest will take care of itself.
Life is a journey, not a destination. Enjoy the trip!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: Strange script tries to run when connection is down

Post by Tom T. »

computerfreaker wrote:Nothing new at all. I checked out one of the links from later in the thread, and look what I found. (https://developer.mozilla.org/devnews/i ... refox-3-6/)
therube had already linked that a few posts above. (Yes, this thread is getting *very* convoluted.)
Tom T. wrote:Oh, absolutely. We're trying to find the source. Would you care to take a shot at the code posted from the above link, and see if you can de-obfuscate with the js-deobfuscate tool, and find out the source?
computerfreaker wrote:Sorry, I wanted to do it today, but a lot of other stuff interfered. I'll try again tomorrow...
CF: Sorry, it was directed at therube, who pointed out the de-obfuscation tool. I thought that by quoting him, it would be apparent that the reply was directed to therube. Guess in these complex threads, every sentence or paragraph should start with to whom it is addressed. :shock:
Tom T. wrote:The real puzzler is that it *seems* that I picked this up in one session, live, from the Web, the day I read the post -- because closing Sandboxie that night seems to have destroyed it. I would not have gotten any new or updated apps from Apple, Adobe/Macromedia, etc. during that session. Any clues?
computerfreaker wrote:The real puzzler is how it survived one restart (to install itself), but not two.
CF, that was answered a few posts above. It wasn't a full extension that would require a restart. I must have gotten it as a code injection (from where? Google running rogue code?) that would go to work immediately, but be dumped from the sandbox.
Tom T. wrote:This might explain a vector for this situation. Overall, the change in 3.6 should help prevent a lot of this stuff. Thanks for the links.
CF wrote:How does that explain a possible vector? It explains the way the addon got installed & got hidden, but not how it got there in the first place - I doubt you guys got hit by a drive-by download, so what the heck happened?
CF, it looks like exactly that. *IF* Google, etc. were hacked -- wouldn't be the first time -- or Yahoo (more likely for moi, since Google is untrusted, but I use Yahoo mail), but the issue was discovered and fixed quickly by those sites, then indeed my sandbox would have dumped it, while Monty would still have it on the HD. It's hard to think of any other explanation that fits all of the facts...
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
User avatar
computerfreaker
Senior Member
Posts: 220
Joined: Wed Sep 16, 2009 10:03 pm
Location: USA

Re: Strange script tries to run when connection is down

Post by computerfreaker »

computerfreaker wrote:Nothing new at all. I checked out one of the links from later in the thread, and look what I found. (https://developer.mozilla.org/devnews/i ... refox-3-6/)
Tom T. wrote:therube had already linked that a few posts above. (Yes, this thread is getting *very* convoluted.)
I actually got my quote from therube's link - "I checked out one of the links from later in the thread". Just thought I'd mention that little "hiding" technique since nobody else did... ;)
Tom T. wrote:Oh, absolutely. We're trying to find the source. Would you care to take a shot at the code posted from the above link, and see if you can de-obfuscate with the js-deobfuscate tool, and find out the source?
computerfreaker wrote:Sorry, I wanted to do it today, but a lot of other stuff interfered. I'll try again tomorrow...
Tom T. wrote:CF: Sorry, it was directed at therube, who pointed out the de-obfuscation tool. I thought that by quoting him, it would be apparent that the reply was directed to therube. Guess in these complex threads, every sentence or paragraph should start with to whom it is addressed. :shock:
I knew your comment was directed to therube, but I'd previously promised to try de-obfuscating that overlay.xul file. I'm going to do it in just a few minutes (soon as I'm done replying here)
Tom T. wrote:The real puzzler is that it *seems* that I picked this up in one session, live, from the Web, the day I read the post -- because closing Sandboxie that night seems to have destroyed it. I would not have gotten any new or updated apps from Apple, Adobe/Macromedia, etc. during that session. Any clues?
computerfreaker wrote:The real puzzler is how it survived one restart (to install itself), but not two.
Tom T. wrote:CF, that was answered a few posts above. It wasn't a full extension that would require a restart. I must have gotten it as a code injection (from where? Google running rogue code?) that would go to work immediately, but be dumped from the sandbox.
I hadn't thought that "half-addon" would go to work immediately, but a little logic says it would...
* Infection arrives
* Infection adds its entry to Fx's registry keys
* Fx's internal components keep checking that registry "folder" for data
* Fx detects the new "half-addon"
* Fx initializes & uses the "half-addon"
* Innoshot tries to fire when Google, Ask.com, Bing, etc. load
Tom T. wrote:This might explain a vector for this situation. Overall, the change in 3.6 should help prevent a lot of this stuff. Thanks for the links.
CF wrote:How does that explain a possible vector? It explains the way the addon got installed & got hidden, but not how it got there in the first place - I doubt you guys got hit by a drive-by download, so what the heck happened?
Tom T. wrote:CF, it looks like exactly that. *IF* Google, etc. were hacked -- wouldn't be the first time -- or Yahoo (more likely for moi, since Google is untrusted, but I use Yahoo mail), but the issue was discovered and fixed quickly by those sites, then indeed my sandbox would have dumped it, while Monty would still have it on the HD. It's hard to think of any other explanation that fits all of the facts...
You'd think Google, Yahoo, etc. would actually say something... like "hey, we got hacked so make sure you run your antivirus stuff if you've used our search engine lately"
Then again, how many times have we seen the big corporations cover themselves first and their users last (or not at all)? :roll: :mad:
With great power comes great responsibility.
Learn something new every day, and the rest will take care of itself.
Life is a journey, not a destination. Enjoy the trip!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
User avatar
computerfreaker
Senior Member
Posts: 220
Joined: Wed Sep 16, 2009 10:03 pm
Location: USA

Re: Strange script tries to run when connection is down

Post by computerfreaker »

I'll be danged. I copied Monty's Pastebin upload into Notepad and saved it as "overlay.xul" - Microsoft Forefront Client Security immediately popped up a warning.
Check this out...
Image

At least one AV program gets this - and it's MS's. Go figure... :roll:
With great power comes great responsibility.
Learn something new every day, and the rest will take care of itself.
Life is a journey, not a destination. Enjoy the trip!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
User avatar
computerfreaker
Senior Member
Posts: 220
Joined: Wed Sep 16, 2009 10:03 pm
Location: USA

Re: Strange script tries to run when connection is down

Post by computerfreaker »

Monty, I think I need you to post the entire infection's code. I just spent 20-30 minutes trying to debug this, and it's not working - JavaScript Deobfuscator won't recognize the presence of a script, Rhino won't do anything but throw errors, and I'm really getting frustrated... I have one last shot in my locker, then we're down to manually de-obfuscating this.
If you'd be willing to post (post, PM, whatever) the entire infection's code, this would probably be a LOT easier to work on...

EDIT: I still want to work on the entire infection, but I'm at least whopping this part of it... I've got most of it de-obfuscated, and I'm finishing the rest right now. Just wanted to make sure nobody else wastes time, since de-obfuscating twice is one time too many... ;)
I'll post the de-obfuscated infection when I finish cleaning it up.
With great power comes great responsibility.
Learn something new every day, and the rest will take care of itself.
Life is a journey, not a destination. Enjoy the trip!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
User avatar
computerfreaker
Senior Member
Posts: 220
Joined: Wed Sep 16, 2009 10:03 pm
Location: USA

Re: Strange script tries to run when connection is down

Post by computerfreaker »

Score one more for the good guys - overlay.xul is de-obfuscated.
http://pastebin.com/m4b805613

Here's what I did to de-obfuscate it (I actually did this mostly by hand, since the automated tools kept failing):
(I used Notepad++ for this - the syntax highlighting, brace matching, and - most important of all - hex-to-text conversion were absolutely huge in getting this done.)

Step 1. Go through the code, adding line breaks, tabs, etc. where necessary
End result: Nicely-formatted, although heavily obfuscated, code

Step 2. Go through the code, looking for obfuscated strings (the strings were just concatenated hex character codes). Use Notepad++'s hex-to-text capabilities to de-obfuscate the strings. (I had to leave one string partly obfuscated, though, because it has chr(12) in it - the unprintable form feed character)
End result: Mostly readable code, with just variable names still obfuscated

Step 3. Go through the code, replacing each array item reference with the appropriate string. (This malware used hard-coded string arrays to store some important stuff, then used the appropriate array item where necessary)
End result: Only a few (<5) variable names still obfuscated; everything else clear

Step 4. Go through the code, read it to see what it does, and replace the few obfuscated variable names with appropriate English names
End result: Completely de-obfuscated code except for one array & array reference I had to leave in place (see my note about chr(12) in Step 2).

Looks like some fairly simple code - it monitors the address bar for certain strings, i.e. Google, Bing, Ask.com, AOL, etc. If one of those strings is found, the malware redirects the page by replacing the address in the address bar. Not a fearsome beast, but not one I'd want running on my machine...
With great power comes great responsibility.
Learn something new every day, and the rest will take care of itself.
Life is a journey, not a destination. Enjoy the trip!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: Strange script tries to run when connection is down

Post by Tom T. »

computerfreaker wrote:I'll be danged. I copied Monty's Pastebin upload into Notepad and saved it as "overlay.xul" - Microsoft Forefront Client Security
At least one AV program gets this - and it's MS's. Go figure... :roll:
So much for MalwareBytes Anti-Malware being the "bleeding edge" in detecting malware. (No offense to Firefoxer and the whole MB team, but....)
CF wrote:Looks like some fairly simple code - it monitors the address bar for certain strings, i.e. Google, Bing, Ask.com, AOL, etc. If one of those strings is found, the malware redirects the page by replacing the address in the address bar
Actually, we already knew that. :D .. but it's good to have it proven. Any evidence as to the *source*? ... probably not.

Too bad this board doesn't give Karma points, but somehow I expect that you'll get them anyway, in life. ;) Nice. :ugeek:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
Montagar
Junior Member
Posts: 43
Joined: Tue Oct 27, 2009 11:44 pm

Re: Strange script tries to run when connection is down

Post by Montagar »

computerfreaker, Tom T., and GµårÐïåñ... you have private messages.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 (.NET CLR 3.5.30729)
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: Strange script tries to run when connection is down

Post by therube »

Since this thread deserves a forum of its own ...
A rogue add-on, maybe?
Yes, no, maybe?
adblock plus 1.1.1
cacheviewer 0.6
cookiebuller 1.3.1
fireftp 1.0.6
greasemonkey 0.8.20090920.2
ie tab 1.5.2009.0525
noscript 1.9.9.12
pixlr 1.2
sqlite manager 0.5.6
One of them?
Then try a contents search of the files in your extensions directory tree for the string 'innoshot' & see if anything turns up. (Could be plugin related too, I suppose?)
And it was? Extension? Plugin? A bit of each?
Basically the right idea. We just were not looking in enough possible locations & further searching for other potential strings.
Does it happens when you disable all your extensions as well?
That answer was, Yes.
HOSTS file? Anti-malware tools? Your router?
No, it was not that.
Malware on your computer?
Heh.
Could it be a toolbar?
That possibility exists.
exploited either in the browser itself, one of its addons, or a plugin
Yep, but which?
happens with all add-ons and plugins disabled
So this "hidden" extension/plugin, whatever it is, was not thwarted by starting in Safe Mode?
And -safe-mode does not block plugins, or it does? (Maybe I should read the linked article!)
I have Comodo software firewall
Comodo is quite talkative, wanting you to confirm all kinds of actions. So if something odd was trying to run or to get it, you would think it would have been flagged. Unless that part of the firewall were disabled?


And Tom had the same experience - for a short while. How did that happen?



Lots of talk about thwarting/stopping the redirect issues ("clickfeedmanager.com" virus targets Firefox), but nothing on how they came to be infected in the first place? (Yeah, yeah, I know, the simple answer. Porn & warez. But that alone tells nothing.)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.6pre) Gecko/20091114 SeaMonkey/2.0.1pre
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: Strange script tries to run when connection is down

Post by Tom T. »

therube wrote:Since this thread deserves a forum of its own ...
A rogue add-on, maybe?
Yes, no, maybe?
adblock plus 1.1.1
cacheviewer 0.6
cookiebuller 1.3.1
fireftp 1.0.6
greasemonkey 0.8.20090920.2
ie tab 1.5.2009.0525
noscript 1.9.9.12
pixlr 1.2
sqlite manager 0.5.6
One of them?
I have *none* of them, except for NS, which IIRC was either .13 or .14 at the time.
Could it be a toolbar?
I have no external toolbars.
And Tom had the same experience - for a short while. How did that happen?
*Had* to be drive-by or otherwise picked up on-the-fly, since Sandbox emptying disposed of it. The fact that I use Yahoo mail, and therefore trust the 60 to 80 scripts (no kidding) that they run *just for mail*, suggests that rogue code got into a Yahoo script, at least for me. Monty doesn't use Yahoo mail, but apparently, he visits Google (I don't -- use only secure Scroogle for searches, and use no other Google services), and they could have been targeted, too.
therube wrote: (Yeah, yeah, I know, the simple answer. Porn & warez. But that alone tells nothing.)
Neither apply in my case.

@ Mongagar: Thanks, will check -- I get auto-notifications by email of PMs as well as of replies to threads in which I'm involved.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
Locked