Closed
Bug 439679
Opened 17 years ago
Closed 7 years ago
Socorro report to watch for adware, spyware, malware in crash data
Categories
(Socorro :: General, task)
Tracking
(Not tracked)
RESOLVED
WONTFIX
Future
People
(Reporter: chofmann, Unassigned)
References
(Blocks 1 open bug)
Details
(Whiteboard: search [crashkill][crashkill-metrics])
Attachments
(1 file)
10.68 KB,
text/plain
|
Details |
Starting to see a variety of suspicious .dll's showing up in crash reporter data. We should develop reports that give us trends in the existence of adware/malware to watch for attacks or outbreaks of malware affecting firefox users and think about defenses that could help protect.
http://crash-stats.mozilla.com/report/index/a6277345-3c91-11dd-8c01-0013211cbf8a
which has the stack, and shows a likely crash in the asksbar.dll
0 ASKSBAR.DLL ASKSBAR.DLL@0xc7c2
1 ASKSBAR.DLL ASKSBAR.DLL@0x2186b
2 ASKSBAR.DLL ASKSBAR.DLL@0x21c90
3 ASKSBAR.DLL ASKSBAR.DLL@0x2295b
4 ASKSBAR.DLL ASKSBAR.DLL@0x22445
5 ASKSBAR.DLL ASKSBAR.DLL@0x14cd4
6 ASKSBAR.DLL ASKSBAR.DLL@0x1bf6
7 A2PLUGIN.DLL A2PLUGIN.DLL@0x1f15
8 A2PLUGIN.DLL A2PLUGIN.DLL@0x4e08
9 xul.dll ns4xPluginInstance::SetWindow mozilla/modules/plugin/base/src/ns4xPluginInstance.cpp:1175
10 xul.dll nsPluginNativeWindow::CallSetWindow nsPluginNativeWindow.h:95
11 xul.dll nsPluginNativeWindowWin::CallSetWindow mozilla/modules/plugin/base/src/nsPluginNativeWindowWin.cpp:499
12 xul.dll nsPluginHostImpl::InstantiateEmbeddedPlugin mozilla/modules/plugin/base/src/nsPluginHostImpl.cpp:3642
13 xul.dll nsObjectFrame::InstantiatePlugin mozilla/layout/generic/nsObjectFrame.cpp:860
and definition of the asksbar can be found here.
http://www.what-is-exe.com/filenames/asksbar-dll.html
Another example of borderline suspect apps/toolbar was also found in bkavhook.dll but after investigation I think it looks like some kind of Vietnamese locale application or toolbar.
http://crash-stats.mozilla.com/report/index/fac25d94-3c8f-11dd-933c-0013211cbf8a
0 BkavHook.dll BkavHook.dll@0x357d
1 xul.dll nsSocketTransport::InitiateSocket mozilla/netwerk/base/src/nsSocketTransport2.cpp:1158
2 xul.dll nsSocketTransport::OnSocketEvent mozilla/netwerk/base/src/nsSocketTransport2.cpp:1426
3 xul.dll nsSocketEvent::Run mozilla/netwerk/base/src/nsSocketTransport2.cpp:98
4 xul.dll nsThread::ProcessNextEvent mozilla/xpcom/threads/nsThread.cpp:510
5 xul.dll NS_ProcessPendingEvents_P nsThreadUtils.cpp:180
6 xul.dll nsSocketTransportService::Run mozilla/netwerk/base/src/nsSocketTransportService2.cpp:555
7 xul.dll nsThread::ProcessNextEvent mozilla/xpcom/threads/nsThread.cpp:510
8 xul.dll nsThread::ThreadFunc mozilla/xpcom/threads/nsThread.cpp:254
9 @0x13dff6b
http://www.spywaredata.com/spyware/spyware-adware/process/719/results.php
http://www.siteadvisor.com/sites/saigon.vnn.vn/downloads/2609716/
we could scrap adware/spyware/malware lists and then search for instants of these .dll's in the stack, or process list, then show frequency of presence in the incoming crash data.
Reporter | ||
Comment 1•17 years ago
|
||
semi-related to bug 423968 , but this would have a different report output to meet a different use case.
Reporter | ||
Comment 2•17 years ago
|
||
We should also keep an eye on z4spyblk.dll
http://crash-stats.mozilla.com/report/list?product=Firefox&query_search=signature&query_type=contains&range_unit=hours&version=Firefox%3A3.0&signature=Z4SPYBLK.DLL%400x7b4c&range_value=9
Firefox 3.0 Crash Report [@ Z4SPYBLK.DLL@0x7b4c ]
0 Z4SPYBLK.DLL Z4SPYBLK.DLL@0x7b4c
1 Z4SPYBLK.DLL Z4SPYBLK.DLL@0x78a1
2 @0x28137ae
3 @0x2813af1
4 xul.dll CallNPMethodInternal mozilla/modules/plugin/base/src/nsJSNPRuntime.cpp:1378
5 xul.dll CallNPMethod mozilla/modules/plugin/base/src/nsJSNPRuntime.cpp:1425
6 js3250.dll js_Invoke mozilla/js/src/jsinterp.c:1297
7 js3250.dll js_Interpret mozilla/js/src/jsinterp.c:4852
8 js3250.dll js_Invoke mozilla/js/src/jsinterp.c:1313
9 xul.dll nsXPCWrappedJSClass::CallMethod mozilla/js/src/xpconnect/src/xpcwrappedjsclass.cpp:1523
10 xul.dll nsXPCWrappedJS::CallMethod mozilla/js/src/xpconnect/src/xpcwrappedjs.cpp:559
11 xul.dll PrepareAndDispatch mozilla/xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp:114
12 xul.dll SharedStub mozilla/xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp:141
13 xul.dll nsEventListenerManager::HandleEventSubType mozilla/content/events/src/nsEventListenerManager.cpp:1080
Its under investigation at spyware data
http://www.spywaredata.com/spyware/malware/z4spyblk.dll.php
this article and others detect it in a Zone Alarm installation, but its not clear if it is part of the standard installation, or attacking it.
http://www.atribune.org/forums/index.php?s=186d8535602e50c75f6f7ac6d5633c6b&showtopic=3962&st=0&p=18762&#entry18762
Reporter | ||
Comment 3•17 years ago
|
||
here is another one
http://crash-stats.mozilla.com/report/list?product=Firefox&query_search=signature&query_type=contains&range_unit=hours&version=Firefox%3A3.0&signature=ffe.dll%400x9e69&range_value=6
commnents
> was during initial startup - not sure what crashed - but I know my kids told me we've been having trouble with bookmarks
> loading Firefox 3 for the first time.
stack
0 ffe.dll ffe.dll@0x9e69
1 xul.dll nsDocLoader::FireOnStateChange mozilla/uriloader/base/nsDocLoader.cpp:1235
2 xul.dll xul.dll@0x7d04cf
modules list
ffe.dll 1.1.0.141 45E5E83315 ffe.pdb
investigations
http://www.spywarewarrior.com/viewtopic.php?t=15598
844] C:\WINDOWS\system32\fee.dll -> Spyware.Look2Me : Error during cleaning
http://www.prevx.com/filenames/2885319548134216537-0/T1.S1.FEE.DLL.html
http://spywaredlls.prevx.com/RRABHC41015003/PGMR-FEE.DLL.html
Looks like this could be part of windows logon or replaced by attackers.
Reporter | ||
Comment 4•17 years ago
|
||
here is another one. crashing in firebit.dll 6 seconds after first start up or less.
http://crash-stats.mozilla.com/report/list?product=Firefox&query_search=signature&query_type=contains&range_unit=hours&version=Firefox%3A3.0&signature=firebit.dll%400x17b44&range_value=10
stack
0 firebit.dll firebit.dll@0x17b44
1 firebit.dll firebit.dll@0x19376
2 ntdll.dll ntdll.dll@0x3e4b5
3 ntdll.dll ntdll.dll@0x3e488
Avira considers this malware:
http://analysis.avira.com/samples/details.php?uniqueid=cjfH4B3dkkt7mM7TrqHyEOIv6J5x0PbH&incidentid=145222
the firebit.dll appears to be distributed by or from a free hosting site http://bitware.net
Interesting report at mcafee
http://forums.mcafeehelp.com/showthread.php?p=520116
"... lately when i have been searching on google with firefox i am being redirected to totally different sites and yesterday i couldnt access either ie or firefox and my pc was running very slow.
i ran virus scan but it didnt pick up anything so i tried a free online scanner and it picked up these,
C:\System Volume Information\_restore{1283C4C2-5C9F-4160-B9A2-AC1BC36A6A58}\RP94\A0019710.exe
C:\System Volume Information\_restore{1283C4C2-5C9F-4160-B9A2-AC1BC36A6A58}\RP94\A0019711.exe
Trojan-Downloader.Win32.Zlob.jgs
C:\Documents and Settings\Application Data\Mozilla\Firefox\Profiles\jcl6fq4j.default\ext ensions\firebit@firebit\components\firebit.dll/C:\Documents and Settings\Application Data\Mozilla\Firefox\Profiles\jcl6fq4j.default\ext ensions\firebit@firebit\components\firebit.dll
C:\Documents and Settings\Application Data\Mozilla\Firefox\Profiles\jcl6fq4j.default\ext ensions\firebit@firebit\components\firebit.dll
not-a-virus:AdWare.Win32.Kitsune.b
if anyone can tell me what these are or can help in any way it would be much appreciated thanks"
Reporter | ||
Comment 5•17 years ago
|
||
Search comments from the Reverse Engineering b10g also indicate
http://letitbit.net (another free hosting/downloading) site wants to install firebit.dll.
Question was also asked there "Has anybody reversed it and care to explain what it does? I noticed it adds two http request headers: ... " but I can't find the post or any responses.
Reporter | ||
Comment 6•17 years ago
|
||
here is another
Crash Reports in rlxf.dll@0xe9dc
Frame Module Signature [Expand] Source
0 rlxf.dll rlxf.dll@0xe9dc
rlxf.dll 1.0.0.5
mostly crashing at start up and shortly after. here are comment:
every time it starts it crashes
um i just opened it and it crashes1 to 2 seconds after
i downloaded the 3.0 and now i can't even get on it.
Other crash reports here:
http://crash-stats.mozilla.com/report/list?range_unit=weeks&query_search=signature&query_type=contains&product=Firefox&version=Firefox%3A3.0&branch=1.9&signature=rlxf.dll%400xe9dc&query=.dll&range_value=1
Reports that try and describe what this .dll is about are at:
http://forums.majorgeeks.com/archive/index.php?t-100395.html
...suggest steps to remove
http://forums.majorgeeks.com/archive/index.php?t-100395.html
...rxfl.dll classified as dangerous
http://research.sunbelt-software.com/threatdisplay.aspx?name=Marketscore.RelevantKnowledge&threatid=15129
... indicates some association with adware
Reporter | ||
Comment 7•17 years ago
|
||
here is an interesting one
Firefox 3.0 Crash Report [@ radhslib.dll@0x3b6f
0 radhslib.dll radhslib.dll@0x3b6f
1 radhslib.dll radhslib.dll@0x16bf5
2 @0x5f110009
3 nspr4.dll SocketSend mozilla/nsprpub/pr/src/io/prsocket.c:694
4 nspr4.dll SocketWrite mozilla/nsprpub/pr/src/io/prsocket.c:714
5 xul.dll nsSocketOutputStream::Write mozilla/netwerk/base/src/nsSocketTransport2.cpp:576
6 xul.dll nsHttpConnection::OnReadSegment mozilla/netwerk/protocol/http/src/nsHttpConnection.cpp:530
7 xul.dll nsHttpTransaction::ReadRequestSegment mozilla/netwerk/protocol/http/src/nsHttpTransaction.cpp:411
8 xul.dll nsBufferedInputStream::ReadSegments mozilla/netwerk/base/src/nsBufferedStreams.cpp:331
9 xul.dll nsHttpTransaction::ReadSegments mozilla/netwerk/protocol/http/src/nsHttpTransaction.cpp:436
10 xul.dll nsHttpConnection::OnSocketWritable mozilla/netwerk/protocol/http/src/nsHttpConnection.cpp:565
11 xul.dll nsHttpConnection::OnOutputStreamReady mozilla/netwerk/protocol/http/src/nsHttpConnection.cpp:776
12 xul.dll nsSocketOutputStream::OnSocketReady mozilla/netwerk/base/src/nsSocketTransport2.cpp:515
13 xul.dll nsSocketTransport::OnSocketReady mozilla/netwerk/base/src/nsSocketTransport2.cpp:1543
14 xul.dll nsSocketTransportService::DoPollIteration mozilla/netwerk/base/src/nsSocketTransportService2.cpp:658
15 xul.dll nsSocketTransportService::OnProcessNextEvent mozilla/netwerk/base/src/nsSocketTransportService2.cpp:522
16 xul.dll nsThread::ProcessNextEvent mozilla/xpcom/threads/nsThread.cpp:497
17 nspr4.dll PR_Lock
no version info in the modules list, but some of the reports show multiple instances of the .dll
radhslib.dll
radprlib.dll
more reports at http://crash-stats.mozilla.com/report/list?range_unit=weeks&query_search=signature&query_type=contains&product=Firefox&version=Firefox%3A3.0&branch=1.9&signature=radhslib.dll%400x3b6f&query=.dll&range_value=1
on further examination radhslib.dll appears to be part of Naomi web filter by Radiant Morning Technologies. http://forum.utorrent.com/viewtopic.php?id=34978
so this one might be one to disable if we can based on incompatibility/stability problems. we could also just put an advisory of possible compatibilty problems with this software on sumo.
we could also follow up with contact to http://www.radiance.m6.net/ to diagnose and see if we can get afix in the works.
Reporter | ||
Comment 8•17 years ago
|
||
re: comment 6
there is also a different stack signature for the same .dll
Firefox 3.0 Crash Report [@ rlxf.dll@0x14d4a
and this signature is assoicated with a different version number in the .dll
rlxf.dll 1.2.0.5
comments asking for help are a bit more desparate in this batch of crash reports
http://crash-stats.mozilla.com/report/list?range_unit=weeks&query_search=signature&query_type=contains&product=Firefox&version=Firefox%3A3.0&branch=1.9&signature=rlxf.dll%400x14d4a&query=.dll&range_value=1
Reporter | ||
Comment 9•17 years ago
|
||
here is another angle on the reporting. something like this would be very helpful. It shows we have several different stack signatures for this .dll representing several versions of the .dll that are in use.
rank stack sig. #of-crashes .dll version
1 rlxf.dll@0xe9dc 200 rlxf.dll 1.0.0.5
2 rlxf.dll@0x14d4a 133 rlxf.dll 1.2.0.5
3 rlxf.dll@0xcfc1 72 rlxf.dll 1.1.0.8
4 rlxf.dll@0x111e3 58 rlxf.dll 1.2.0.3
5 rlxf.dll@0xcc8b 35 rlxf.dll 1.1.0.7
this base query gets us part of the way there. then you currently have to drill down with a number of clicks to see the pattern. the idea is that we just want to reduce the number of clicks and raise the right set of data to the surface
http://crash-stats.mozilla.com/?do_query=1&product=Firefox&branch=1.9&version=Firefox%3A3.0&query_search=signature&query_type=contains&query=rlxf.dll&date=&range_value=1&range_unit=weeks
Reporter | ||
Comment 10•17 years ago
|
||
re comment 3: the distribution for ffe.dll looks like
1 ffe.dll@0x9e69 130 ffe.dll 1.1.0.141
2 ffe.dll@0xa851 50 ffe.dll 1.1.0.141
3 ffe.dll@0x9e36 15 ffe.dll 1.1.0.141
4 ffe.dll@0x944e 12 ffe.dll 1.0.0.106
5 ffe.dll@0xa982 9 ffe.dll 1.1.0.141
6 ffe.dll@0x9662 2 ffe.dll 1.0.0.106
Reporter | ||
Comment 11•17 years ago
|
||
or this query
http://crash-stats.mozilla.com/?do_query=1&product=Firefox&branch=1.9&version=Firefox%3A3.0&query_search=signature&query_type=contains&query=.dll&date=&range_value=1&range_unit=weeks
produces a pretty interesting report of top 100 external .dlls that cause crashes. maybe its the start point for this kind of analysis. From this kind of list we could scan by eyeball, or whitelist out .dll's that suffer from just compatibility problems, and others that might be more serious malware.
top100 signature tl crashes win mac linux sol
rank
59 BkavHook.dll@0x65bf 90 90 0 0 0
14 BkavHook.dll@0xff0 353 353 0 0 0
70 dirapi.dll@0x46a90 74 74 0 0 0
63 dirapiX.dll@0x379c3 88 88 0 0 0
41 ffe.dll@0x9e69 127 127 0 0 0
94 ffe.dll@0xa851 50 50 0 0 0
58 firebit.dll@0x174c4 90 90 0 0 0
66 firebit.dll@0x17b44 86 86 0 0 0
47 gears_ff2.dll@0x10577c 106 106 0 0 0
13 gears_ff2.dll@0x10577d 374 374 0 0 0
76 GoogleDesktopCommon.dll@0x1679 66 66 0 0 0
7 GoogleDesktopMozilla.dll@0x54da 1073 1073 0 0 0
1 GoogleDesktopMozilla.dll@0x5500 6085 6085 0 0 0
3 GoogleDesktopMozilla.dll@0x5512 3390 3390 0 0 0
75 GoogleDesktopMozilla.dll@0x552a 68 68 0 0 0
37 GoogleDesktopMozilla.dll@0x55d5 156 156 0 0 0
80 GoogleDesktopMozilla.dll@0x567f 61 61 0 0 0
4 GoogleDesktopMozilla.dll@0x56bc 1907 1907 0 0 0
78 GoogleDesktopMozilla.dll@0x56f0 66 66 0 0 0
68 GoogleDesktopMozilla.dll@0x5724 79 79 0 0 0
39 GoogleDesktopMozilla.dll@0x5742 142 142 0 0 0
9 GoogleDesktopMozilla.dll@0x5747 499 499 0 0 0
21 GoogleDesktopMozilla.dll@0x5824 226 226 0 0 0
2 googletoolbar.dll@0x4b2f 3924 3924 0 0 0
67 icm32.dll@0x433e 85 85 0 0 0
52 iFW_Xfilter.dll@0x37a9 98 98 0 0 0
44 imm32.dll@0x3e24 117 117 0 0 0
96 jpinscp.dll@0xac57 49 49 0 0 0
18 jpinscp.dll@0xd015 263 263 0 0 0
69 js3250.dll@0x4cb97 76 76 0 0 0
65 jvm.dll@0x10b5d0 87 87 0 0 0
93 jvm.dll@0x115da8 53 53 0 0 0
84 jvm.dll@0xb7688 57 57 0 0 0
81 jvm.dll@0xbc1f8 61 61 0 0 0
57 jvm.dll@0xbc228 93 93 0 0 0
54 jvm.dll@0xbc3a0 95 95 0 0 0
17 kernel32.dll@0x12aeb 284 284 0 0 0
36 kernel32.dll@0x442eb 157 157 0 0 0
22 kernel32.dll@0x49207 211 211 0 0 0
12 kernel32.dll@0x9e7a 404 404 0 0 0
48 libvlc.dll@0x1177f 104 104 0 0 0
71 mshtml.dll@0x84998 70 70 0 0 0
56 msvcr71.dll@0x28ed 93 93 0 0 0
87 msvcr80.dll@0x14500 57 57 0 0 0
49 msvcrt.dll@0x10a78 103 103 0 0 0
83 msvcrt.dll@0x1226a 57 57 0 0 0
26 msvcrt.dll@0x37740 180 180 0 0 0
62 msvcrt.dll@0x37c89 88 88 0 0 0
79 msxf.dll@0xe9dc 65 65 0 0 0
55 mzvkbd.dll@0x1871 95 95 0 0 0
61 npampx3.0.84.2.dll@0x2a63 89 89 0 0 0
50 npdivx32.dll@0x140f1 100 100 0 0 0
99 npdsplay.dll@0x2a3f7 48 48 0 0 0
88 npietab.dll@0x43e9 56 56 0 0 0
5 npLegitCheckPlugin.dll@0x14ed9 1776 1776 0 0 0
46 npOGAPlugin.dll@0xb391 109 109 0 0 0
100 nppdf32.dll@0x5696 47 47 0 0 0
24 nppdf32.dll@0x6d0a 201 201 0 0 0
91 nppdf32.dll@0xb125 54 54 0 0 0
34 nppdf32.dll@0xc3e8 163 163 0 0 0
10 nppl3260.dll@0x4341 488 488 0 0 0
6 nppl3260.dll@0x54bb 1140 1140 0 0 0
77 NPSWF32.dll@0x16e8b9 66 66 0 0 0
51 NPSWF32.dll@0x16ef 99 99 0 0 0
15 NPSWF32.dll@0x1ddbf1 308 308 0 0 0
74 NPSWF32.dll@0x241ce 68 68 0 0 0
72 NPSWF32.dll@0x288f 68 68 0 0 0
60 NPSWF32.dll@0x34860 90 90 0 0 0
38 NPSWF32.dll@0x3486f 153 153 0 0 0
27 NPSWF32.dll@0x348cd 179 179 0 0 0
16 NPSWF32.dll@0xa966b 299 299 0 0 0
32 NPSWF32.dll@0xd48bb 167 167 0 0 0
98 NPSWF32.dll@0xd49bc 48 48 0 0 0
23 NPSWF32.dll@0xd4ef8 202 202 0 0 0
85 NPSWF32.dll@0xd4ff9 57 57 0 0 0
82 NPSWF32.dll@0xf3492 60 60 0 0 0
64 npww.dll@0x1634 88 88 0 0 0
8 ntdll.dll@0x100b 770 770 0 0 0
33 ntdll.dll@0x1b1fa 164 164 0 0 0
89 ntdll.dll@0x3b15f 56 56 0 0 0
20 ntdll.dll@0x42e7b 249 249 0 0 0
53 ntdll.dll@0x43387 97 97 0 0 0
11 ntdll.dll@0x47dd2 404 404 0 0 0
29 ntdll.dll@0x59a94 174 174 0 0 0
45 ntdll.dll@0x60f34 111 111 0 0 0
35 ntdll.dll@0xe4f4 157 157 0 0 0
28 piclens.dll@0x114bd9 176 176 0 0 0
92 piclens.dll@0xe2d17 54 54 0 0 0
19 piclens19.dll@0x109eaa 254 254 0 0 0
97 piclens19.dll@0x117066 49 49 0 0 0
30 piclens19.dll@0x11a767 171 171 0 0 0
43 piclens19.dll@0x122d50 118 118 0 0 0
31 radhslib.dll@0x3b6f 170 170 0 0 0
86 rlxf.dll@0x111e3 57 57 0 0 0
40 rlxf.dll@0x14d4a 129 129 0 0 0
73 rlxf.dll@0xcfc1 68 68 0 0 0
25 rlxf.dll@0xe9dc 199 199 0 0 0
42 uxtheme.dll@0x1c78d 124 124 0 0 0
90 WMNetMgr.dll@0x47c82 55 55 0 0 0
95 xul.dll@0x272d81 49 49 0 0 0
Comment 12•17 years ago
|
||
noami is bug 427406
Comment 13•16 years ago
|
||
I hope this kind of information is useful in this bug report, please advise if it isn't.
I came across bug 448837 today which I presume is caused by MySearch. Info: http://ca.com/us/securityadvisor/pest/pest.aspx?id=453090717
dll's of interest:
S4BAR.dll
S4PLUGIN.DLL
Sample stack:
ID: 158a9e2b-602e-11dd-bd03-001a4bd43e5c
Signature @0x4b053b4
UUID 3fe4a911-60ae-11dd-996c-001321b13766
Time 2008-08-02 09:14:49-07:00
Uptime 1
Product Firefox
Version 3.0.1
Build ID 2008070208
OS Windows NT
OS Version 6.0.6001 Service Pack 1
CPU x86
CPU Info GenuineIntel family 6 model 23 stepping 6
Crash Reason EXCEPTION_ACCESS_VIOLATION
Crash Address 0x4b053b4
Comments
Crashing Thread
Frame Module Signature [Expand] Source
0 @0x4b053b4
1 user32.dll user32.dll@0x11911
2 user32.dll user32.dll@0x20816
3 user32.dll user32.dll@0x139f6
4 ntdll.dll ntdll.dll@0x599cd
5 user32.dll user32.dll@0x13cc2
6 user32.dll user32.dll@0xfd90
7 S4BAR.DLL S4BAR.DLL@0x2670
8 S4BAR.DLL S4BAR.DLL@0x1413
9 S4PLUGIN.DLL S4PLUGIN.DLL@0x1f13
10 S4PLUGIN.DLL S4PLUGIN.DLL@0x43ad
11 xul.dll ns4xPluginInstance::SetWindow
mozilla/modules/plugin/base/src/ns4xPluginInstance.cpp:1175
12 xul.dll nsPluginNativeWindow::CallSetWindow
nsPluginNativeWindow.h:95
13 xul.dll nsPluginNativeWindowWin::CallSetWindow
mozilla/modules/plugin/base/src/nsPluginNativeWindowWin.cpp:499
14 xul.dll nsPluginHostImpl::InstantiateEmbeddedPlugin
mozilla/modules/plugin/base/src/nsPluginHostImpl.cpp:3642
15 xul.dll nsObjectFrame::InstantiatePlugin
mozilla/layout/generic/nsObjectFrame.cpp:860
Updated•16 years ago
|
Summary: soccoro report to watch for adware,spyware, malware in crash data → Socorro report to watch for adware, spyware, malware in crash data
Reporter | ||
Comment 14•15 years ago
|
||
bug 512122 Possible Adware.DoubleD related Crash [@NPFFAddOn.dll@0x11867
has a good case study for why some reporting tools around this are needed, what kind of data we need, and how it it might be used.
Reporter | ||
Comment 15•15 years ago
|
||
the quicker we could get a report like this, the quicker we might be able to assess how many users might be getting their searches hijacked by malware.
see: https://bugzilla.mozilla.org/show_bug.cgi?id=513570
if we could see how many crash reports had .dll's related to TSPY_EBOD.A and Nine-Ball loaded in the module list that would give us rough numbers on how many firefox users might be affected in the general population.
Reporter | ||
Comment 16•15 years ago
|
||
other bug related to search hijacking added to dependency list
Updated•15 years ago
|
Whiteboard: cloud, next
Reporter | ||
Comment 17•15 years ago
|
||
darkreading just published an interesting study on number of enterprise users affected by botnets.
http://www.darkreading.com/insiderthreat/security/client/showArticle.jhtml?articleID=220200118
we could do something similar with #firefox users affected in the general population of 100million daily users, and also in segment of large institutional use of firefox.
It would be interesting to see if general population and instituional botnet infection is lower or the same for places were firefox is already deployed.
we have the pretty good start of the .dll's in the process/module list to go look for under the dependency list in bug 512788
Reporter | ||
Updated•15 years ago
|
Blocks: malware-attacks
Reporter | ||
Comment 18•15 years ago
|
||
whoa, this is hot news day for this kind of stuff.
http://www.thetechherald.com/article.php/200939/4504/Cyveillance-More-than-half-of-the-active-threats-online-go-undetected
writes that
[the research company Cyveillance said a couple of interesting things]
-----
...that they detect hundreds if not thousands of new Malware attacks. To test detection rates, they fed these active attacks through thirteen of the top anti-Virus vendor offerings. McAfee scored the highest, with a detection rate of 44-percent, followed by Sophos (38%), Dr. Web (36%), Symantec (35%), Trend Micro (34%), AVG (31%), and F-Secure with 28-percent.
They tested browser security as well, using Internet Explorer, Safari, Google Chrome, and Firefox. The browser test aimed at Phishing protections, and overall, Mozilla scored the highest. Firefox detected 54.9-percent of Phishing related attempts upon initial discovery, and 87.1-percent after the fist 24-hours. Chrome came in second, followed by Safari and Internet Explorer
----
research on the module list could help validate and track that 54.9% number.
I think the first paragraph is making the claim that they have the most authortative list of what constitutes malware, or atleast a pretty good list that all the anti-virus companies have, but just aren't able to protect against yet. I wonder if they would be interested in sharing that list so we could use it for checking against the crash report module lists.
Updated•15 years ago
|
Target Milestone: --- → 1.3
Updated•15 years ago
|
Whiteboard: cloud, next → cloud, next [crashkill][crashkill-metrics]
Updated•15 years ago
|
Target Milestone: 1.3 → 1.4
Updated•15 years ago
|
Assignee: nobody → deinspanjer
Comment 19•15 years ago
|
||
This will need to use the new system -- Daniel can you put this near the top of your list? When can we start hacking on this using the cluster?
Updated•15 years ago
|
OS: Mac OS X → All
Target Milestone: 1.4 → 1.5
Comment 20•15 years ago
|
||
Shortly after bug 538206 is fixed. I'll make it a top priority.
Reporter | ||
Comment 21•15 years ago
|
||
a ranking report by Firefox product version would fit the bill on this very nicely. just linkify the signatures so a viewer of the report could drill down.
this kind of report could allow third party providers to watch their .dlls, or anti-virus companies and us to look for new instances of .dll's that are crashing and should be blocked or removed from the system.
Reporter | ||
Comment 22•15 years ago
|
||
we could also link to bugs with signatures in the bug title that correspond to .dll names as we do in the reports like
http://crash-stats.mozilla.com/topcrasher/byversion/Firefox/3.6
Updated•15 years ago
|
Updated•15 years ago
|
Target Milestone: 1.5 → 1.6
Updated•15 years ago
|
Target Milestone: 1.6 → 1.7
Comment 23•15 years ago
|
||
After we have imported the existing jsonz files into production, we'll be able to begin developing a MR to answer this question.
Since we need schema changes to be able to import jsonz and those changes won't be in production until 1.7, technically, this bug is impossible to close as part of 1.7 and should be pushed to 1.8
Assignee: deinspanjer → aphadke
Updated•15 years ago
|
Target Milestone: 1.7 → 1.8
Updated•15 years ago
|
Whiteboard: cloud, next [crashkill][crashkill-metrics] → search
Updated•15 years ago
|
Whiteboard: search → search [crashkill][crashkill-metrics]
Updated•15 years ago
|
Target Milestone: 1.8 → 1.9
Comment 24•14 years ago
|
||
Possible to develop this MR job now?
Comment 25•14 years ago
|
||
Laura/choffman - What exactly do we need out here?
1. A framework for MR job that returns related DLLs with counts for a given input DLL as per comment #15 or something else?
2. What time range?
3. By when do you want this?
Daniel - Would meta_data:json column be sufficient for this job or we need to do some sort of backfilling?
-anurag
Reporter | ||
Comment 26•14 years ago
|
||
there are two basic types of monitoring we could do with respect to monitoring
first would be to watch for crashes in suspiious .dll's to watch for widespread outbreaks of malware attacks against firefox, where poorly written malware is also generating crashes.
second would be to scan the module list of crash reports looking for known malware .dll's then attempting to warn users what we spotted in their crash report submission. we have e-mail notification system sort of in place now, and we could build extra client features for notification.
both of these kinds of analysis involve starting to build a list of known, suspected, and to-be-investigated malware .dll's and then banging them against crash reports.
I'll try to write more, or get someone to write more on this soon.
Comment 27•14 years ago
|
||
Looking for signatures with .dll in them and no bug report assigned, filtering out a few known valid libraries (like ntdll.dll) would probably go a long way for the first part. What makes the task harder is that some malware seems to mask with random names or names of valid libraries, apparently, but we probably can never be perfect on automatic detection.
Fore the second part that chofmann mentions here, I guess we'll need to go build a list of known malware dlls - though as mentioned, name masking might pose a problem here as well. :(
Updated•14 years ago
|
Assignee: aphadke → nobody
Assignee | ||
Updated•13 years ago
|
Component: Socorro → General
Product: Webtools → Socorro
Comment 28•13 years ago
|
||
Will DLL Directory cover everything that's needed here?
Comment 29•13 years ago
|
||
(In reply to Laura Thomson :laura from comment #28)
> Will DLL Directory cover everything that's needed here?
From how I read comment #0, the DLL Directory would be a prerequisite for getting what chofmann has intended here, but it would need to become integrated into Socorro. If anything, that can only be a term-term goal, nothing we can immediately attack.
Reporter | ||
Comment 30•13 years ago
|
||
yep, this is another "explosiveness" kind of report based on stacks and module lists that have spyware. the dictionary only helps us to describe and keep track of what dll's are and what they do.
Updated•11 years ago
|
Target Milestone: --- → Future
Comment 31•7 years ago
|
||
We can pursue this in data platform if it is still desired. crash-stats will not implement this or dll directory.
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•