BLACK HAT - Blog readers vulnerable to embedded malware

Reading blogs could cause your computer to catch a virtual cold, said a leading security expert Wednesday at the Black Hat USA conference.

Internet users who employ Web-based services such as Bloglines or Web browsers such as Firefox to read Web site feeds and blogs are vulnerable to embedded malicious code that can install spyware, log users' passwords, scan PCs and corporate networks for open ports and more, said Caleb Sima, chief technology officer at SPI Dynamics, a Web application security company.

So far, only a few proof-of-concept attacks against blog readers from Google and Yahoo have occurred, Sima said, though he believes that more are on the way.

"The only reason we haven't had a lot of problems yet is because no one has really thought of it," he said. According to Sima, software and services used to download feeds transmitted via the RSS or Atom formats can unwittingly download and execute JavaScript code buried within the text.

JavaScript is a scripting programming language that has become popular as a way of providing rich interactivity to Web sites. But it can also be employed by hackers to take over users' computers, sniff for vulnerabilities and more.

"The possibilities are limited only by how creative you are," Sima said, who calls the technique "feed injection." Sima said this type of attack is a variant of cross-site scripting, a popular way of attacking Web sites by entering HTML or JavaScript commands instead of text, which can cause errors and disable the site, leaving it open to hackers.

Seemingly random strings of characters such as "

This way, seemingly garbled text can hide malicious JavaScript commands that can do damage without having to install or run an outside file, a telltale sign that would normally alert an antivirus or antispyware program.

But don't users sign up for RSS feeds only from Web publishers they already know and trust? True, said Sima, but there are many ways those publishers could be compromised. A Web feed could contain a link to another Web site or blog that's hosting malicious JavaScript. Or the Web feed's author could unknowingly paste that JavaScript into his own blog. Or a blog may have an area allowing readers to post public comments. Those can also store malicious bits of JavaScript, Sima said.

Finally, because RSS and Atom readers don't typically authenticate the publisher of each feed every time they download, they might blindly download feeds sent by an impersonating or infected Web publisher, Sima said.

Because RSS and Atom feeds are normally stored by blog readers as HTML files on users' local hard drives, they also bypass Web browser security settings that might be set to prevent JavaScript from unknown outside Web sites from executing. Turning off JavaScript altogether to prevent such attacks is no solution, Sima said. Too many popular Web sites and applications today rely on JavaScript invisibly executing in the background to operate, making them "painful to use." The best way to guard against these sorts of attacks, he said, would be for blog-reading software and services to re-encode all JavaScript it receives to render it harmless.

"It could be as simple as adding a few lines of extra code," he said. Creating this filter would not cause feeds to arrive much slower, either, he said. But as far as he knows, no blog-reading software or service re-encodes the JavaScript as he suggests to de-fang it.

In the absence of blog readers filtering their feeds, Sima recommends that CIOs and chief information security officers start treating individual PCs as potential attack points.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Eric Lai

Computerworld
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?