Last Comment Bug 724650 - Malicious "YouTube" add-on
: Malicious "YouTube" add-on
Product: Toolkit
Classification: Components
Component: Blocklisting (show other bugs)
: unspecified
: All All
-- normal (vote)
: ---
Assigned To: Jorge Villalobos [:jorgev]
: Jorge Villalobos [:jorgev]
Depends on:
  Show dependency treegraph
Reported: 2012-02-06 12:53 PST by MarkH
Modified: 2016-03-07 15:30 PST (History)
4 users (show)
See Also:
Crash Signature:
QA Whiteboard:
Iteration: ---
Points: ---
Has Regression Range: ---
Has STR: ---

20120206 (181.71 KB, application/octet-stream)
2012-02-06 12:53 PST, MarkH
no flags Details

Description User image MarkH 2012-02-06 12:53:05 PST
Created attachment 594775 [details]

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_2) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7

Steps to reproduce:

Installed the add-on from http://my-vod[.]net/you.xpi?d=3453453

Actual results:

Runs JS from add-on to inject http://staticserve/[.]org/code2.js

The JS is heavily obfuscated:

JS loads staticserve[.]org/web/f0.php

It keeps the list of FB pages to like in HTML5 localstorage under the key "fb_page<page_id>".

Page Ids found in local storage:

Has you like pages via POSTs to

Does a lot of CSS modification of the FB DOM.

Injects ads onto your news feed and other pages, wiping out Facebook's ads and sponsored stories.

Expected results:

It should not inject ads into Facebook or send likes on your behalf, without your consent.
Comment 1 User image Jorge Villalobos [:jorgev] 2012-02-06 14:42:13 PST
Comment 2 User image Jorge Villalobos [:jorgev] 2012-02-06 14:47:08 PST

Note You need to log in before you can comment on or make changes to this bug.