Search This Blog

Powered by Blogger.

Blog Archive

Labels

New Zero-day Vulnerability spreads malwares via hijacked status updates

Bitdefender Security Researchers discovered a new 0-day Exploit in Yahoo Messenger , it allows remote hacker to hijack the status message and execute the malwares. This vulnerability found in v11.x(including freshly released 11.5.0.152-us)

How does it work?

The status message change occurs when an attacker simulates sending a file to a user. This action manipulates the $InlineAction parameter (responsible for the way the Messenger form displays the accept or deny the transfer) in order to load an iFrame which, when loaded, swaps the status message for the attacker's custom text. This status may also include a dubious link. This iFrame is sent as a regular message and comes from another Yahoo Instant Messenger user, even if the user is not in the victim’s contact list.

Why is this dangerous?

Status messages are highly efficient in terms of click-through rate, as they address a small group of friends. Chances are that, once displayed, they will be clicked by most contacts who see them.

One scenario: the victim's status message is swapped with an attention-getting text that points to a page hosting a zero-day exploit targeting the IE browser, the locally installed Java or Flash environments or even a PDF bug, to mention only a few. Whenever a contact clicks on the victim’s status message, chances are they get infected without even knowing it. All this time, the victim is unaware that their status message has been hijacked.

Another lucrative approach to changed status messages is affiliate marketing (ie: sites that pay affiliates for visits or purchases through a custom link). Someone can easily set up an affiliate account, generate custom links for products in campaign, then massively target vulnerable YIM victims to change their status with the affiliate link. Then, they just wait for the contact-generated traffic to kick in. There are actually a couple of services that pay YIM users to change their status with custom links as part of their business.

Am I vunerable?

If you can receive messages from contacts outside of your list, you are 100% vulnerable.

You are not vulnerable if:

You are running a Bitdefender security solution (Bitdefender Antivirus Plus, Bitdefender Internet Security or Bitdefender Total Security). We detect this threat via the HTTP scanner and block it before it reaches the Messenger application.

You have Yahoo Messenger set to “ignore anyone who is not in your Yahoo! Contacts“(which is off by default).

Bitdefender has already identified this kind of attack in the wild. We recommend you prevent this kind of attack by installing an antivirus solution or by adjusting your privacy settings as per the instructions above.

We have provided Yahoo! with the documentation and proof-of-concept code for fixing the issue.

Exploit analysis courtesy of malware researchers Doina Cosovan and Răzvan Benchea.
Share it:

Vulnerability

Web Application Vulnerability