A security expert defined a new attack technique dubbed Reflected File Download that allows to serve a ‘Zero-Day’ Worm without possibility of defense.
The security expert Oren Hafif has invented a new attack technique dubbed Reflected File Download (RFD) that could be adopted to hack victim’s computer when he tries and logs in to popular and trusted website like Google and Bing.
The Reflected File Download (RFD) technique defined by Hafif, which is a Trustwave SpiderLabs security researcher, allows attackers to serve at a malware by presenting it as a legitimate link and once downloaded by the victim it is able to gain complete control of the infected machine.
Hafif has also developed a worm that is able to take advantage of his Reflected File Download (RFD) attack technique.
Let’s analyzed in detail the Reflected File Download (RFD) technique:
The technique defined by Hafif is able to evade detection, the malware doesn’t trigger any system warnings, so the victim will have no perception of an ongoing attack. The researcher explained that current security measures like antivirus software and firewalls cannot avoid the infection.
Hafif provided a proof of concept to Google showing how a bad actor could send a link from the trusted Google.com domain that would download an exploit file called “ChromeSetup.bat”. As explained before, if victim executes the file, it would open a Google Chrome connection to the attacker’s website, bypassing the Same Origin Policy protection used to prevent malicious code passing between websites and tabs. Once executed the file, the scripts from the attacker’s website could then steal sensitive information from that domain and send it to the attacker’s website.
Oren Hafif will demonstrate the Reflected File Download (RFD) technique at the next Black hat Europe conference in Amsterdam, Netherlands. Hafif will demonstrate how he created a worm that could exploit the Reflected File Download (RFD) attack across the most important social networks.
“Hafif will show how he created code for a worm that could easily spread malicious links containing RFD attack code across the world’s biggest social networks. Anyone who clicked the links he created risked handing over their cookies, though real criminals could craft attacks that would do much worse. They could take over reams of machines. Hafif believes it’s the first cross-social-network worm ever created.” states a blog post on Forbes.
Fortunately in time I’m writing there are no news about the exploitation of the Reflected File Download technique being used in attacks worldwide, anyway a similar method adopted in the wild would have devastating effects.
(Security Affairs – Reflected File Download (RFD) technique , hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.