July 11, 2016 By Larry Loeb 2 min read

Barkly, a computer security firm, had one of its installations sound an alarm due to a new Firefox malware.

It was obvious that a drive-by attempt had been made in an effort to breach the system. A user clicked on a link or visited the wrong site and the malware took advantage — a relatively standard path.

But as SecurityWeek stated, it was the payload of this Firefox malware that was of interest. Even though Barkly prevented the breach, it wasn’t able to distinguish what the attacker was trying to deliver. The malware disguised itself as an update to the Firefox browser that needed a click to activate but otherwise looked normal.

Now for Something Completely Different

Barkly’s analysis of the payload allowed the researchers to finally identify it. The examination revealed that the threat was actually a new variation of the Kovter malware, which made a name for itself by hijacking machines and executing remote, sophisticated campaigns.

“What makes this new variant particularly nasty,” the blog states, “is that it’s the later, fileless version of Kovter, and it’s now using an apparently legitimate certificate. That’s bad news because a legitimate certificate causes plenty of traditional antivirus/endpoint solutions to give the software a pass.”

That use of a legitimate certificate means security products will likely be fooled by the Firefox malware, allowing it to get one step closer to potential victims; it will look like any other Firefox update to the user.

Working Around the Firefox Malware

The good news is that there are ways to work around this malware. For example, if users only update their browsers on demand, any update that appears unrequested should not be installed.

But Firefox also has something called the update channel that automatically delivers upgrades to the user. Many people use this option and, as a result, expect updates to happen without requesting them.

The simplest way to deal with this problem is to turn off automatic updates. Those who want that feature should always verify whether the update is real. Firefox will manually check for updates when requested: If the browser says it is up to date when the user checks, then the upgrade should be discarded.

This method of disguise may become more prevalent for malware as cybercriminals search for new installation techniques. Luckily, simple checks and security measures can defeat it.


UPDATE, 7/13/16, 10:34 a.m. EDT: A Mozilla spokesperson has contacted Security Intelligence with the following statement:

“It is critically important that users keep Firefox up to date to make sure they have the latest security fixes. Automatic updates are the best way to do that. In order to better protect users, Firefox automatically updates itself in the background, so there is no need for users to download updates themselves. We strongly advise that users not disable automatic updates in Firefox.”

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today