Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a message from our sponsor. Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs. Yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Zscaler 0Trust AI stops attackers by hiding your attack surface, making apps and IPs invisible, eliminating lateral movement, Connecting users only to specific apps, not the entire network. Continuously verifying every request based on identity and context. Simplifying security management with AI powered automation and detecting threats using AI to analyze over 500 billion daily transactions. Hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more@Zscaler.com Security hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Buettner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
Nati Tal (1:59)
If you're already there under the hood of Chromium, you find some stuff that looks suspicious or look like vulnerable for exploitation. And one of those things was the use of private APIs. It's like a customization method in Chromium that a developer can use to integrate new capabilities for developers, the web applications.
Dave Bittner (2:23)
That's Nati Tal, head of Guardiolabs. The research we're discussing today is titled Cross Exploiting a Zero Day Opera Vulnerability with a Cross Browser Extension Store Attack.
Nati Tal (2:42)
So we see this type of customization and we already did think that, okay, it's something that needs to be handled extremely with care and as such we will probably find some vulnerabilities out there in those areas. So to make sure this is not the case and everything is safe, we started to dig deeper on different Chromium based browsers. One of those was Opera. And quite quickly we realized that there are many customizations over there and this is exactly what happened. We saw those customizations and the use of specific privileges on domains owned by Opera and we realized that okay, it works well, but there is a problem there because when you do such a customization, you need to be extra careful with protecting your own domains for misuse One of those kinds of misuse is actually what we found using other extensions, malicious extensions, in this case, to abuse or even exploit this type of permissive domains, inject your own code to those domains and in this method gain privilege escalation, basically on everything that Chromium can offer you.
![A cute cover for a dangerous vulnerability. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F58ab7ae0-def8-11ea-b34c-b35b208b0539%2Fimage%2Fdaily-podcast-cover-art-cw.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)