Get Ready For Google Gadget Malware - InformationWeek
Government // Enterprise Architecture
03:03 PM
Connect Directly

Get Ready For Google Gadget Malware

At Black Hat, RSnake is expected to demonstrate a zero-day vulnerability that allows for information theft, spoofing, and authentication issues.

"Gmalware" may be coming soon to your iGoogle page.

In two weeks, at the Black Hat Conference on Wednesday, Aug. 6, Cenzic senior security analyst Tom Stracener and security researcher Robert Hansen, better known as "RSnake," plan to demonstrate a zero-day vulnerability that affects Google Gadgets.

"At the core of the talk is the concept of Gmalware, which is basically a malicious gadget," said Stracener. "The idea is that gadgets are supported by the gmodule domain and security architecture. And with the current security architecture, it doesn't protect individuals from malicious gadgets very well. Nor does it protect gadgets from one another."

Google Gadgets, said Stracener, are vulnerable to information theft, deceptive practices, content spoofing, and authentication issues.

A Google Gadget, for example, can log you into an account without your knowledge and monitor your Google Search queries, Stracener explained. It can also be made to attack another Google Gadget and steal information.

No malicious Google Gadgets have been spotted in the wild yet. Once details about the vulnerabilities emerge, however, that may change.

Google has been alerted to the researchers' findings but hasn't yet publicly acknowledged whether or not it sees a problem. The company did not respond to a request for comment.

"We alerted them to that and what they came back with was this is the expected behavior of this domain," said Hansen. "Both Tom and I found that to be a fairly contentious attitude. We alerted them to it and they decided not to fix it and now we're just demonstrating what we found."

Hansen said that the underlying problem is that Google's security architecture allows an attacker to put pretty much whatever he or she wants inside Google Gadgets. Likening the issue to a SQL injection vulnerability, he said that an attacker could put malicious Flash, HTML, or scripts into a Google Gadget.

Google has some measures at the perimeter to prevent bad gadgets from being introduced. "But there are some tricks that we've come up with to get the Google Gadget subversively added to somebody's iGoogle page," said Hansen.

Google also tries to sandbox the gmodules domain, where Google Gadgets operate, from "The problem is that protects you from two or three very specific attacks but it leaves you open to a huge number of other attacks," said Hansen. "What we're outlining is everything else that's wrong with this model."

Google tries "to separate that into a different domain, the gmodules domain," said Hansen. "That protects you from two or three very specific attacks, but it leaves you open to a huge number of other attacks. What we're outlining is everything else that's wrong with this model."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll