Through the 'Add New Button' function

Dec 19, 2007 10:58 GMT  ·  By

Google Toolbar, that nice browser add-on produced by the Mountain View company, is one of the latest utilities able to enhance a hack attack and allow intruders deploy malicious applications. Aviv Raff has recently found a way to exploit a Google Toolbar vulnerability, which could seriously harm users' computers. According to his blog post, the 'Add New Toolbar Button' is the one which enhances the entire exploitation, as a hacker could easily change the details displayed to the user. Now, let's take it step by step to understand how it works.

First of all, I think many of you have already used the 'Add New Button' function provided by Google Toolbar. As you know, there are two fields displayed in the installation windows, which show the location of the new button and some privacy considerations related to the way the new button works. This is the way an attacker could trick a user: he creates a fake link that may look like a legitimate one and attempt to install a file on the user computer through the new toolbar button.

"By creating a specially crafted URLs it is possible for an attacker to fake the domains displayed in the 'Downloaded from' and 'Privacy considerations' sections. This specially crafted URL can be created by simply adding an open redirector before the URL. An attacker can use this vulnerability to gain the victim's trust to add and use the button, and by that, the victim will trust the files that the button offer, or enter private information. In the new beta version of the toolbar it is also possible to alert the user every few seconds to click on the button", Aviv Raff explained.

Google has already been informed about the vulnerability, so it is currently working on a patch to correct the flaw. Until then, you're advised to avoid adding new toolbar buttons. Just to remain on the safe side?