Malvertisers Exploit WebKit 0-Day to Redirect Users to Fraudulent Schemes
On February 17, 2021, security researchers revealed a significant cybersecurity threat posed by a malvertising group dubbed “ScamClub.” This group has taken advantage of a zero-day vulnerability within WebKit-based browsers, enabling them to inject malicious payloads that redirect unsuspecting users to scam websites, particularly involving fraudulent gift card schemes.
The vulnerability, identified as CVE-2021–1801, was first detected by the ad security firm Confiant in late June 2020. This critical flaw allows attackers to circumvent the iframe sandboxing policy inherent in browsers like Safari and Google Chrome for iOS, thus facilitating the execution of malicious code. By exploiting weaknesses in how WebKit manages JavaScript event listeners, the attackers were able to escape the confinement typically enforced on ad inline frames. This occurred despite the capability provided by the “allow-top-navigation-by-user-activation” attribute, which is designed to restrict redirection outside of an iframe unless triggered by a user click.
To explore this vulnerability further, researchers constructed a straightforward HTML file that included a cross-origin sandboxed iframe alongside a button positioned outside the iframe. Their investigation underscored how the manipulation of event listeners allowed attackers to perform seemingly unauthorized actions, effectively bypassing established security barriers.
The targets of these fraudulent schemes are primarily users of WebKit browsers, which have a significant user base in the United States. The ease with which attackers can exploit such vulnerabilities highlights the pressing need for heightened cybersecurity awareness among users and businesses alike. As more users interact with digital advertisements, the risks of falling victim to such tactics increase.
In the context of the MITRE ATT&CK framework, this attack aligns with various adversary tactics and techniques. Initial access was achieved through the exploitation of the WebKit vulnerability, enabling attackers to inject their malicious content into legitimate advertising networks. The technique utilized not only facilitated redirection to scam sites but also underscores the importance of understanding and potentially mitigating aspects of persistence and privilege escalation as attackers refine their methods.
For business owners, the implications of this incident are considerable. As digital advertising becomes a dominant means of outreach, understanding the vulnerabilities in web technologies is essential for safeguarding against such threats. Organizations must remain vigilant, continually reassessing their cybersecurity measures in light of new vulnerabilities and evolving attack strategies.
The emergence of threats like those posed by ScamClub should serve as a critical reminder of the importance of vigilance in online interactions. As attackers continue to exploit weaknesses in widely used technologies, collaborative efforts between businesses, security firms, and technology developers are crucial to enhance defenses and better protect users from the growing array of cyber threats.