Malvertising Group Harnesses WebKit 0-Day to Redirect Users to Scam Sites

February 17, 2021

A malvertising collective known as “ScamClub” has exploited a zero-day vulnerability in WebKit-based browsers to inject malicious payloads that redirect users to fraudulent gift card scam websites. The attacks, first identified by the advertising security firm Confiant in late June 2020, took advantage of a bug (CVE-2021–1801) that allowed malicious actors to circumvent the iframe sandboxing policy in the browser engine used by Safari and Google Chrome on iOS, enabling them to execute harmful code. This technique specifically targeted the way WebKit manages JavaScript event listeners, allowing attackers to escape the sandbox of an ad’s inline frame even with the “allow-top-navigation-by-user-activation” attribute in place, which typically prevents redirection unless an event occurs within the iframe. To validate this approach, researchers created a simple HTML file featuring a cross-origin sandboxed iframe, along with an external button…

Malvertisers Exploit WebKit 0-Day to Redirect Users to Fraudulent Schemes

On February 17, 2021, security researchers revealed a significant cybersecurity threat posed by a malvertising group dubbed “ScamClub.” This group has taken advantage of a zero-day vulnerability within WebKit-based browsers, enabling them to inject malicious payloads that redirect unsuspecting users to scam websites, particularly involving fraudulent gift card schemes.

The vulnerability, identified as CVE-2021–1801, was first detected by the ad security firm Confiant in late June 2020. This critical flaw allows attackers to circumvent the iframe sandboxing policy inherent in browsers like Safari and Google Chrome for iOS, thus facilitating the execution of malicious code. By exploiting weaknesses in how WebKit manages JavaScript event listeners, the attackers were able to escape the confinement typically enforced on ad inline frames. This occurred despite the capability provided by the “allow-top-navigation-by-user-activation” attribute, which is designed to restrict redirection outside of an iframe unless triggered by a user click.

To explore this vulnerability further, researchers constructed a straightforward HTML file that included a cross-origin sandboxed iframe alongside a button positioned outside the iframe. Their investigation underscored how the manipulation of event listeners allowed attackers to perform seemingly unauthorized actions, effectively bypassing established security barriers.

The targets of these fraudulent schemes are primarily users of WebKit browsers, which have a significant user base in the United States. The ease with which attackers can exploit such vulnerabilities highlights the pressing need for heightened cybersecurity awareness among users and businesses alike. As more users interact with digital advertisements, the risks of falling victim to such tactics increase.

In the context of the MITRE ATT&CK framework, this attack aligns with various adversary tactics and techniques. Initial access was achieved through the exploitation of the WebKit vulnerability, enabling attackers to inject their malicious content into legitimate advertising networks. The technique utilized not only facilitated redirection to scam sites but also underscores the importance of understanding and potentially mitigating aspects of persistence and privilege escalation as attackers refine their methods.

For business owners, the implications of this incident are considerable. As digital advertising becomes a dominant means of outreach, understanding the vulnerabilities in web technologies is essential for safeguarding against such threats. Organizations must remain vigilant, continually reassessing their cybersecurity measures in light of new vulnerabilities and evolving attack strategies.

The emergence of threats like those posed by ScamClub should serve as a critical reminder of the importance of vigilance in online interactions. As attackers continue to exploit weaknesses in widely used technologies, collaborative efforts between businesses, security firms, and technology developers are crucial to enhance defenses and better protect users from the growing array of cyber threats.

Source link