Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

09/30/2018
by   Panagiotis Papadopoulos, et al.
0

The proliferation of web applications has essentially transformed modern browsers into small but powerful operating systems. Upon visiting a website, user devices run implicitly trusted script code, the execution of which is confined within the browser to prevent any interference with the user's system. Recent JavaScript APIs, however, provide advanced capabilities that not only enable feature-rich web applications, but also allow attackers to perform malicious operations despite the confined nature of JavaScript code execution. In this paper, we demonstrate the powerful capabilities that modern browser APIs provide to attackers by presenting MarioNet: a framework that allows a remote malicious entity to control a visitor's browser and abuse its resources for unwanted computation or harmful operations, such as cryptocurrency mining, password-cracking, and DDoS. MarioNet relies solely on already available HTML5 APIs, without requiring the installation of any additional software. In contrast to previous browser-based botnets, the persistence and stealthiness characteristics of MarioNet allow the malicious computations to continue in the background of the browser even after the user closes the window or tab of the initial malicious website. We present the design, implementation, and evaluation of a prototype system, MarioNet, that is compatible with all major browsers, and discuss potential defense strategies to counter the threat of such persistent in-browser attacks. Our main goal is to raise awareness regarding this new class of attacks, and inform the design of future browser APIs so that they provide a more secure client-side environment for web applications.

READ FULL TEXT
research
08/13/2019

A Simple and Intuitive Algorithm for Preventing Directory Traversal Attacks

With web applications becoming a preferred method of presenting graphica...
research
05/12/2023

The Case for the Anonymization of Offloaded Computation

Computation offloading (often to external computing resources over a net...
research
07/13/2021

The Master and Parasite Attack

We explore a new type of malicious script attacks: the persistent parasi...
research
01/14/2019

BlackWatch: Increasing Attack Awareness Within Web Applications

Web applications are relied upon by many for the services they provide. ...
research
12/04/2021

PhishMatch: A Layered Approach for Effective Detection of Phishing URLs

Phishing attacks continue to be a significant threat on the Internet. Pr...
research
10/02/2019

Persistent and Unforgeable Watermarks for Deep Neural Networks

As deep learning classifiers continue to mature, model providers with su...
research
01/07/2020

Is Cryptojacking Dead after Coinhive Shutdown?

Cryptojacking is the exploitation of victims' computer resources to mine...

Please sign up or login with your details

Forgot password? Click here to reset