Google Toolbar error opens the PC door for hackers
Security researcher Aviv Raff recommends that Google Toolbar users avoid adding new buttons to the toolbar or they will be infected with malicious code.
Security researcher Aviv Raff recommends that Google Toolbar users avoid adding new buttons to the toolbar or they will be infected with malicious code.
The Google Toolbar plug-in mechanism vulnerability is the cause of this situation. This mechanism often ignores uncontrolled source of buttons. Hackers have taken advantage of this to forge the source of a button that makes users accept installing maliciously implanted buttons and still think it is a button from a legitimate website.
Expert Raff recommends that this mechanism could be exploited to steal data or implant malicious code into a user's PC.
' This error could allow hackers to create evidence to convince users that they are installing a button from a trusted website. But actually that button is the tool that helps hackers download malicious code or fraudulent users '.
The eWEEK magazine has tested and confirmed the version of Google Toolbar 5 Beta for Internet Explorer also has the error. Meanwhile, expert Raff said that Google Toolbar 4 versions for both Internet Explorer and Firefox could be exploited to attack users.
Google confirmed that it is urgently trying to fix the error. Now Raff also released a exploit code to confirm the possibility of exploiting errors to attack users.
But the security community does not appreciate the error Google Toolbar mentioned above because to successfully attack requires a lot of interaction from the user.
First, hackers must trick users into clicking on a web link that allows a pop-up window to ask whether or not a user will accept the installation of a button on the Google Toolbar. This window is spoofed by hackers just like windows appear from legitimate websites.
Even if the user accepts installation of the button, hackers still cannot attack them. Hackers have to wait until users click on that button, accept the download and run an executable file to be able to attack. The downloaded file is usually a malicious software.
Hoang Dung
- Google 'opens up' a wide range of websites for phisher
- Appeared a fake Google Toolbar trojan
- Adobe Reader opens the PC hard drive door for hackers
- Official Gmail 'opens the door'
- Where does the error 'Error 404' come from?
- Skype error paved the way for hackers to attack
- Error OpenOffice interconnects multiple operating systems
- The most popular keywords 2005 on Google
- Google Desktop vulnerability before the new attack
- Why do hackers like to wear hooded shirts, sitting in the dark?
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system