{"id":12436,"date":"2017-02-23T22:46:21","date_gmt":"2017-02-24T03:46:21","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=12436"},"modified":"2017-02-24T11:31:47","modified_gmt":"2017-02-24T16:31:47","slug":"beware-of-the-google-chrome-missing-font-hack","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/beware-of-the-google-chrome-missing-font-hack\/","title":{"rendered":"Beware of the Google Chrome &#8216;Missing Font&#8217; Hack"},"content":{"rendered":"<h1><strong>Beware of the Google Chrome &#8216;Missing Font&#8217; Hack<\/strong><\/h1>\n<h3><strong><em>PLEASE NOTE: <a href=\"http:\/\/thundercloud.net\/Emsisoft\" target=\"_blank\">EMSISOFT<\/a> USERS ARE PROTECTED FROM THIS HA<\/em>CK.<\/strong><\/h3>\n<p>This week a very well executed malware attack aimed at users who visit compromised web sites was found by Mahmoud Al-Qudsi of NeoSmart Technologies. The hack tries to trick users into believing the reason why the font on the page they&#8217;re visiting is garbled and unreadable, is because the their PC is missing a font.<\/p>\n<p>Before we post the article that explains this hack, let us warn you that no site is going to warn you that you&#8217;re missing a font. The way Web sites work is &#8211; if a site uses a font that is not installed on your PC, you&#8217;ll see the site&#8217;s font in whatever your default font is &#8211; you won&#8217;t see a garbled, unreadable mess.<\/p>\n<p>So DO NOT FALL FOR THIS TRICK. Your PC will be infected. Here&#8217;s what it looks like so you&#8217;ll know it if you see it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone \" src=\"http:\/\/thundercloud.net\/infoave\/images\/2017\/chromehack.png\" width=\"716\" height=\"358\" \/><\/p>\n<p>Notice how the text on the compromised web site is garbled and unreadable.<\/p>\n<p>Here&#8217;s a close up:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone \" src=\"http:\/\/thundercloud.net\/infoave\/images\/2017\/chromehack1.png\" width=\"723\" height=\"206\" \/><\/p>\n<p>DO NOT CLICK &#8220;UPDATE&#8221;. Close the page or your browser immediately.<\/p>\n<p>As of today ( 23 February 2017)\u00a0there has been no patch for Chrome released by Google. Google has been notified and hopefully Chrome will be patched against this hack soon.<\/p>\n<p><a href=\"http:\/\/www.itpro.co.uk\/malware\/28175\/chrome-malware-masquerades-as-missing-font-files\" target=\"_blank\">Here&#8217;s an article from ItPro<\/a>\u00a0written by Dale Walker,\u00a0with more detailed information about the &#8220;missing font&#8221; hack:<\/p>\n<div data-reactid=\".0.1.0.0.0\">\n<div data-reactid=\".0.1.0.0.0.0\">\n<div class=\"mx-auto px2\" dir=\"ltr\" data-reactid=\".0.1.0.0.0.0.2\">\n<div class=\"mx-auto containerMedium_fjt81s\" data-reactid=\".0.1.0.0.0.0.2.0\">\n<div data-reactid=\".0.1.0.0.0.0.2.0.0\">\n<blockquote>\n<h2 class=\" textColorLightHeadline_1wuba1o serifBold_15mdipy headlineMedium_7zat9q\" data-reactid=\".0.1.0.0.0.0.2.0.0.2\">Chrome malware masquerades as &#8216;missing font&#8217; files<\/h2>\n<p class=\"bylineMedium_11i1y96 bylineBorderLightPage_eikcr8 textColorLightByline_up2uu7 sansDemiBold_1e7tjhi-o_O-byline_o10m2r\" data-reactid=\".0.1.0.0.0.0.2.0.0.3\">A security researcher has discovered a new hacking tactic on Google Chrome that manipulates websites into displaying missing font prompts, which then trick users into downloading malicious files.<\/p>\n<\/blockquote>\n<\/div>\n<div class=\" parsedContent mercury-light-theme mercury-medium-text mercury-serif textColorLightHeadline_1wuba1o serifRegular_1ptorrc bodyMedium_qseu60 \" dir=\"ltr\" data-reactid=\".0.1.0.0.0.0.2.0.1\">\n<div class=\"field field-name-body\">\n<blockquote><p>The infection was first spotted on an unnamed WordPress website by Mahmoud Al-Qudsi, a researcher at cybersecurity firm NeoSmart Technologies, who detailed the process in a <a href=\"https:\/\/neosmart.net\/blog\/2017\/beware-of-this-new-chrome-font-wasnt-found-hack\/\">blog post<\/a>.<\/p>\n<p>The attack involves a hacker exploiting JavaScript to alter the rendering of content on a webpage, causing it to resemble mis-encoded text which appears as a jumble of symbols and shapes. The code then prompts the user to download the missing fonts through a Chrome language pack to decipher the text.<\/p>\n<div id=\"file-32374\" class=\"file file-image file-image-png file-content-full-width\">\n<div class=\"content\"><img decoding=\"async\" src=\"http:\/\/cdn2.itpro.co.uk\/sites\/itpro\/files\/styles\/insert_main_wide_image\/public\/2017\/02\/chrome-attack-1-pixelated.png?itok=_UhEFcM1\" \/><\/div>\n<\/div>\n<p>Clicking &#8220;Update&#8221; results in a file called &#8220;Chrome Font v7.5.1.exe&#8221; being downloaded and a second prompt encourages the user to run the file, all the while appearing as a perfectly safe Chrome download.<\/p>\n<p>The attack is particularly well disguised and makes every attempt to appear a legitimate Chrome pop up, including the correct text formatting and right use of colours for the &#8220;Update&#8221; button.<\/p>\n<div id=\"file-32375\" class=\"file file-image file-image-png file-content-full-width\">\n<div class=\"content\"><img decoding=\"async\" src=\"http:\/\/cdn2.itpro.co.uk\/sites\/itpro\/files\/styles\/insert_main_wide_image\/public\/2017\/02\/chrome-attack-2-pixelated.png?itok=_nAA1ZN8\" \/><\/div>\n<\/div>\n<p>&#8220;This attack gets a lot of things right that many others fail at,&#8221; said Al-Qudsi. &#8220;The premise is actually believable: the text doesn&#8217;t render, and it says that it is caused by a missing font (Hoefler Text, which is a real font), which it then prompts you to download and install.&#8221;<\/p>\n<p>&#8220;The shape of the update button seems correct, and the spelling and grammar are definitely good enough to get a pass.&#8221;<\/p>\n<div id=\"file-32376\" class=\"file file-image file-image-png file-content-full-width\">\n<div class=\"content\"><img decoding=\"async\" src=\"http:\/\/cdn1.itpro.co.uk\/sites\/itpro\/files\/styles\/insert_main_wide_image\/public\/2017\/02\/zoomed-in.png?itok=EP7wJ64O\" \/><\/div>\n<\/div>\n<p>Al-Qudsi does identify some tell-tale signs that the prompt is not all as it seems. A savvy user will know what version of Chrome they are running, in this case version 56, however the prompt has version 53 hard-coded into its dialogue.\u00a0It also features a rather conspicuous &#8216;X&#8217; in the top right corner, which gives the game away, according to Al-Qudsi.<\/p>\n<p>However once the file is downloaded, the quality of the scam &#8220;takes a nosedive&#8221;, with text appearing blurry on prompts, and inconsistent file names for the downloaded material.<\/p>\n<div id=\"file-32377\" class=\"file file-image file-image-png file-content-full-width\">\n<div class=\"content\"><img decoding=\"async\" src=\"http:\/\/cdn2.itpro.co.uk\/sites\/itpro\/files\/styles\/insert_main_wide_image\/public\/2017\/02\/zoomed-in-2.png?itok=nYSOSkm5\" \/><\/div>\n<\/div>\n<p>Although Chrome will notify the user with a &#8220;this file isn&#8217;t downloaded very often&#8221; warning, it will not catch the download as a malicious file. It also slips by Windows Defender, and a check of virus scanning database VirusTotal reveals that only nine of 59 recorded antivirus scanners are able to correctly identify the file as malware.<\/p>\n<p>Al-Qudsi has forwarded the discovery on to Google&#8217;s security team, but pending an update patch, Chrome still fails to identify the file as malware. The firm advises users to be extra vigilant against these types of download prompts.<\/p><\/blockquote>\n<p><em>Pictures courtesy of NeoSmart<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"socialBorderTopLightPage_1m33bc5 social_8a1iu5\" data-reactid=\".0.1.0.0.1\"><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beware of the Google Chrome &#8216;Missing Font&#8217; Hack PLEASE NOTE: EMSISOFT USERS ARE PROTECTED FROM THIS HACK. This week a very well executed malware attack aimed at users who visit compromised web sites was found by Mahmoud Al-Qudsi of NeoSmart Technologies. The hack tries to trick users into believing the reason why the font on the page they&#8217;re\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/beware-of-the-google-chrome-missing-font-hack\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1678,1669,1426,1656,1674,779],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/12436"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=12436"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/12436\/revisions"}],"predecessor-version":[{"id":12442,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/12436\/revisions\/12442"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=12436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=12436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=12436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}