UPDATED 23:55 EDT / MAY 16 2017

INFRA

Serious vulnerability in Google Chrome on Windows could expose user credentials

A serious vulnerability in the Windows version of Google’s Chrome web browser has been discovered that could allow hackers to steal user credentials.

Spotted by Bosko Stankovic, an information security engineer at DefenseCode LLC, the vulnerability in the default configuration of the latest version of Chrome allows malicious websites to trick users into downloading a .scf (Shell Command File format) file without prompting the user as it would typically do with other types of downloads. By bypassing this option, the malicious .scf file lies dormant in the downloads directory until a victim opens the directory, at which point the file automatically runs without the user having to click on it.

Once up and running, the file allows the attacker to gain access to a victim’s username and Microsoft LAN Manager password hash. That leaves the victim open to attacks, including a so-called Server Message Block relay attack that allows the hacker to use the credentials to authenticate to a personal computer or network resource.

The password angle is where the method of attack gets more interesting. Stankovic found that although the password itself would need external brute-force cracking, a number of Microsoft services will accept the password in its hashed form for authentication, meaning that decryption isn’t necessary. Services that could potentially be accessed include OneDrive, Outlook.com, Office 365, Office Online, Skype, Xbox Live and others.

If that isn’t bad enough, Stankovic claims, no antivirus software tested managed to flag the flag the file as being anything suspicious, though he hopes that will change soon.

Google has been informed of the vulnerability and is said to be working on a fix, but no time frame has been given as to when a patch will be made available.

Photo: casasroger/Flickr

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.