Worst Browser Threats May Not Be Security Holes

Experts in combating spyware and adware warn that the widely publicized security holes plaguing Internet Explorer and other Web browsers may not be the most common ways malware gets into computers.
Experts in combating "spyware" and "adware" are now warning that the widely publicized security holes that plague Internet Explorer and other Web browsers may not be the most common ways unwanted software gets into computer users' PCs.

Eric Howes, a frequent contributor to SpywareWarrior.com and a consultant to antispyware companies, says the media focus on security holes is overshadowing a larger issue. It's true that hackers can take advantage of weaknesses in browsers to secretly install spyware programs on users' PCs, Howes agrees. But equally important is the fact that spyware programs are often installed because users are fooled into clicking "Yes" by dialog boxes that look like official Windows notices, he says.

Interestingly, Howes asserts that the latest version of Windows XP, which includes an upgrade called Service Pack 2 (SP2), makes Microsoft's Internet Explorer (IE) browser handle such threats better than Firefox, the fast-growing open-source software distributed by the Mozilla Foundation. Let's examine this claim.

How Spyware Tricks Users Into Installing It

The Firefox browser offers at least four ways to install new forms of software, Howes says. He feels two of these ways are fairly safe, while the other two are open to abuse by spyware authors.

Setup programs. These are the most traditional kind of software install. Using a browser, an executable file is downloaded, saved to disk, and then run once to install an application. While any program poses potential risks, Howes says, traditional setup programs at least make themselves visible to the user, who much choose to run them.

Browser plug-ins. Plug-ins are programs, such as Macromedia Flash, that enable a browser to display special content, such as multimedia files. These are also fairly safe in Firefox, Howes says, because users are presented with information about the plug-in before installing it, and can read any end-user license agreement (EULA) associated with it.

Extensions. Firefox extensions, small programs that may, for example, add a menu item to the browser, present a more serious problem, Howes maintains. Once a user clicks a yellow "information bar" at the top of the browser window that offers to install an extension, they see a dialog box that prompts them to allow the software to install. This dialog, Howes says, provides no information about the source of the software, nor does it provide any link to a EULA.

Java applets. The greatest risk, Howes warns, comes from the ability of Java applets to display dialog boxes that look exactly like ordinary Windows notices. Many users are accustomed to clicking "Yes" when they see a dialog box informing them that, for example, an updated media player or "codec" is required to play some requested content. Since Firefox currently displays nothing but the name of a possibly obscure software company, all too often users click "Yes" without even reading the information.

To install as many software programs as possible, some adware companies even make up company names such as "Click Here To Continue." This name shows up prominently in Windows dialog boxes, making many users believe they have no choice but to click "Yes" to complete their task, according to an article by Ben Edelman, a spyware researcher who is currently studying at Harvard Law School.

How Internet Explorer in XP SP2 Works Differently

With the release of Service Pack 2 for Windows XP in September 2004, Microsoft made a positive change in the behavior of IE, which is bundled with Windows. "It took them a number of years to get it," Howes says, "but they eventually did get it."

Instead of popping up a dialog box when a Web site tries to install, for example, an ActiveX program, IE with SP2 now displays a much less intrusive alert about the situation. "They put it in the Information Bar to take the dialog boxes out of people's faces," Howes notes, "so they don't feel pressured into making potentially bad decisions."

It's still possible for a user to click IE's Information Bar, find more information about software that a Web site wants to install, and click "OK" to install it. But it's much less likely. This, hopefully, will prevent many copies of spyware and adware from being installed. (Users of Windows XP who haven't installed SP2, as well as users of Windows 2000 and earlier versions, don't enjoy even this much protection against trickery, unfortunately.)

Adware Publishers Begin Using Java Applets

Adware makers are already distributing files on the Internet that launch Java applets on Firefox and other Mozilla-based browsers. According to Howes, these programs include 180search Assistant, istbar, PowerScan, Sidefind, PeopleonPage, and the YourSiteBar.

Other programs, including iSearch/iDownload, present dialog boxes to Firefox users through browser extension methods, according to a PDF statement (page 2, paragraph 3) by Sunbelt Software, an antispyware maker that has consulted with Howes.

It's certainly true that computer owners should be able to install just about any software they want. The problem arises when official-looking dialog boxes are presented to users, who often see no difference between them and other Windows dialog boxes that they must click on every day.

Officials of the Mozilla Foundation, which makes the Firefox browser, did not respond to e-mails seeking comment by press time.

Defending Against Deceptive Dialog Boxes

"The Firefox 'yellow bar' gives little notice of what is actually trying to install itself, and so, in that respect, IE does have some small advantage," according to Christopher Boyd, a spyware researcher associated with VitalSecurity.org. Boyd is a Microsoft "Most Valuable Player" for security, an honor the Redmond company bestows on individuals who aren't employed by the firm but who play an important role in educating end users on Web forums and elsewhere.

At the same time, Boyd says, "until Microsoft untangles IE from the operating system, the number one target for spyware/malware will always be IE. The problem we have now is that, realizing Windows and IE are becoming more hardened (coupled with the raft of security tools people now employ), attackers are simply resorting to cruder methods of attack -- namely social engineering and cheap tricks."

Company executives can't expect computer end users to guess correctly when confronted with Windows dialog boxes urging them to click "Yes," Boyd states.

"A security professional who neglects the human aspect of an attack is not a security professional," he says. "Here's something that could get to your PC across almost all browsers, regardless of secure lockdowns. All it took was a simple click of a 'Yes' prompt. And unfortunately, users click 'Yes' to things!"

Conclusion

It's still important for companies to stay current with security patches that emerge from Microsoft and other software companies. But these patches can't prevent spyware and adware from getting into your company's computers. It's equally important for you to guard against dialog boxes, which may seem perfectly innocent, but can be deceptive. All too often, even the most careful person will guess wrong.

A big step forward would be for all browser developers to prevent dialog boxes from being thrust in the face of PC users by Web sites they may visit. If a site really needs visitors to install a certain piece of software, it can explain that fact right in its text and provide a dedicated download page.

Until then, I'm afraid the market for spyware and adware removers will continue to grow.

An 11-page PDF report Howes prepared for Sunbelt Software on the problem, which was originally scheduled for publication in March but was never formally released, is available at a University of Illinois host, where Howes is based.






0 Comments (click to add your comment)
Comment and Contribute

 


(Maximum characters: 1200). You have characters left.