New Google Chrome Vulnerability Found Actively Exploited in the Wild

Soldato
Joined
1 May 2003
Posts
11,198
Not seen another thread about this.

You must update your Google Chrome immediately to the latest version of the web browsing application.

The latest version fixes a security vulnerability (CVE-2019-5786) that can be potentially exploited by malicious web-pages to hijack the software, and run spyware, ransomware, and other nasties on your device or machine.

https://thehackernews.com/2019/03/update-google-chrome-hack.html
 
These articles are frustrating, as they never seem to re-iterate that you will have to have opened/clicked/visited something dubious, and also,
the role that ublock origin, or similar, can have to avoid javascript/code from illicit sites being executed. (if you leave you keys in the front door !)

... what percentage of home PC's do pick up a virus/other every year ?
 
It's frustrating because Google have restricted access to the exploit which is why the article cannot go into any specific details.

Personally when I see several different sources telling me we need to update to mitigate the threat, I'll update. ;)
 
Bare in mind the exploit hackers are currently taking advantage of is also taking advantage of a vulnerability within Windows 7 32-bit, so with these two together they can have full access to your system. No word from Microsoft of when a patch will be rolled out for that. Other OSes are fine for now but it does mean they can use Chrome as a window to find possible vulnerabilities in whatever OS you're running.

I'm guessing this will also affect Opera, Brave, Vivaldi, etc since they're based on the same engine. Just make sure you have at least 72.0.3626.121 and you should be fine. A quick look Vivaldi and Brave is fine but Opera is still on 71.x.
 
good point ... and if google get their way you will soon be naked and afraid
Google Chrome changes could 'destroy' ad-blockers

Personally when I see several different sources
they were all just repeating the same info https://security.googleblog.com/2019/03/disclosing-vulnerabilities-to-protect.html

when i looked I could not find any separate information .. if there were serious breeches I would expect kaspersky, sophos etc to have some view.

not sure why google would not disclose compromised web sites , if they knew them ..
they don't want the culprits to know ? it would only help users to know if they might be infected (in addition to having social media exposure)
 
And this is why a world where Chromium becomes the only browser engine in use is terrible for the Internet...

Protect the Internet and use Firefox.

In any other industry the absolute dominance of 1 "option" would be met with absolute uproar, yet chromium slowly asserts it market dominance and we are heading to that result.

Dont get me wrong, I know building a browser engine is expensive and thankless, but its very much needed.
 
its used to be good, then one day it just started to crash ever hour or 2 and never stopped

No crashing here.

I would try it again if I was you. A lot changed when they switched to Quantum in 57. Crashing is usually caused by extensions.

I don't use them ever. For reasons of stability and security.
 
Also on this subject, the new Microsoft Skype in the browser works on Chromium and Windows but not Firefox and Linux. So Microsoft are now tying their apps to Chromium and Windows.

Article.

Unhealthy.
 
Isn't skype now marginalised , yesterdays tech ... in preference to facetime, or, personally an IPsoftphone service at a fraction of skype prices.
... but maybe there are other examples of Firefox being sidestepped
 
ironically seems some of the zero day malware is delivered by FakeUpdate messages from Chrome/FF, from infected web-sites (nov 2018)

The campaign, which has been running for at least four months, is able to compromise websites running a variety of content management systems, including WordPress, Joomla, and SquareSpace. That's according to a blog post by Jérôme Segura, lead malware intelligence analyst at Malwarebytes. The hackers, he wrote, cause the sites to display authentic-appearing messages to a narrowly targeted number of visitors that, depending on the browsers they're using, instruct them to install updates for Firefox, Chrome, or Flash.

To escape detection, the attackers fingerprint potential targets to ensure, among other things, that the fake update notifications are served to a single IP address no more than once. Another testament to the attackers' resourcefulness: the update templates are hosted on hacked websites, while the carefully selected targets who fall for the scam download a malicious JavaScript file from DropBox. The JavaScript further checks potential marks for virtual machines and sandboxes before delivering its final payload. The resulting executable file is signed by an operating-system-trusted digital certificate that further gives the fake notifications the appearance of legitimacy.

https://blog.malwarebytes.com/threa...ampaign-leverages-multiple-website-platforms/

unfortunately cannot see if any of your favourite web-sites are impacted ... have to subscribe

According to this PublicWWW query, a little over 900 SquareSpace sites have been injected with this malicious redirection code.

... that's the kind of information that should be available.


[
the report of skpes death was an exaggeration ?

That was a rocky period for the service as a whole, with broken notifications, poor reliability, and just a generally frustrating experience. Microsoft now needs to focus on simplifying Skype in an era where there’s far greater competition. WhatsApp, Messenger, FaceTime, WeChat, Line, and Telegram are hugely popular services that millions use to send messages and make calls. It will be difficult for Microsoft to now win back consumer trust when there are now so many reliable alternatives.
]
 
According to this PublicWWW query, a little over 900 SquareSpace sites have been injected with this malicious redirection code.

since websites distributing malware/zero-delay can be identified quickly once they have malware distribution signature ... I want someone who distributes a ublock blacklist
that gets updated when they are identified, or,
if ublock was able to give a risk assessment of (has the site offended) sites in it's pull-down menu .. that would be great.

I'd nearly be prepared to pay for that.
 
Back
Top Bottom