Feed on
Posts
Comments

 

Editor Note: Something bad happened to my blog… probably because I didn’t keep WordPress up-to-date.  The content of this article had been deleted. But I managed to find it on the WayBackMachine Internet Archive.  So this article, originally written Aug 18th 2008 was recovered from a snapshot on the WayBackMachine taken March 2, 2009.

The internet is abuzz with news about the “flash clipboard virus”.  I’ve observed it myself!  It’s interesting, annoying, and if you fall for it, it’s dangerous.  There’s a lot of information out there, not all of it completely correct.  This article is not all-encompassing either, but I’ve got a pretty good handle on the clipboard aspect of the attack.

Background:  There’s a piece of malware out there (I’m not sure if it’s a virus, trojan, or what – Dammit Jim, I’m a clipboard expert, not a security specialist!) called “AntiVirus 2009″. It’s very nasty, and you get it by visiting a site that delivers it via a relentless series of popups.  The popups make it look like you’re infected with something (you’re not, at least not yet). Then they offer to fix your PC, and start downloading their fake virus scanner.  Don’t let it.  The only way out is to shut down your browser.  This type of attack is nothing new, right?

The new part is the way they trick people into visiting infected sites.  They are trying to get you, me, and everyone else to paste their URL into whatever you may be pasting into – perhaps a blog post (like this one), blog comments, e-mail, instant messaging, etc…   So these malware guys are sitting around one day, and one says “hey, wouldn’t it be great if everyone started randomly pasting our URL into whatever they’re pasting stuff into?”  And apparently, a devious scheme was born….

Clipboard Attack From Digg Someone wrote a little piece of Adobe Flash code to copy text to the clipboard (like this one, from Digg). Then they put it in a loop, to do it once a second. Then they put it in an innocent-looking flash-based banner ad, with their harmful URL as the payload.  Then they signed up for some advertising networks, and submitted their bad ad, presumably paying considerable $$$ to get it featured on sites that you and I visit regularly, such as MSNBC and Digg.  And when someone has this ad loaded, they can copy all they want, but everything they paste will be just that URL.   So if you are writing an e-mail to Aunt Millie, telling her to look at your eBay auction located at (paste), or to download Picasa to organize her photos – download here (paste), she’s going to get the virus when she visits the bad site.

If you are viewing a page with one of these bad ads, your clipboard is overwritten about once per second, with their bad ad.  The URL that hit me was:
h x x p : / / xp-vista-update.net/?id=91873534231   (DO NOT CLICK THIS!!!!!!)  I added spaces and changed http to hxxp to protect you.

I noticed it one night when ClipMate (the world’s leading clipboard extender for Windows, which I wrote myself) unexpectedly captured a clip, then started rejecting duplicates.  The duplicates make a “boing” sound, so my PC was going boing, boing, boing….. I then noticed the unexpected URL showing as my top clip, with a date/time of (a minute ago), and a “creator” showing “FireFox”.   Somehow, without any action from me, FireFox was copying data to the clipboard.  An apparent “clipboard attack”!  So I started shutting down tabs in Firefox, and the clipboard attack stopped.

So I searched around a bit, and found that this is happening to lots of people – either by people complaining about this thing, or the xp-vista-update URL showing up in unexpected places, like blog posts.  One thing I noticed was that the number in the URL changes, and that some people said it’s harmless, and just re-directs to google.  Huh. It DOES re-direct to Google. Presumably, they’re trying to stay under the radar by controlling the attack.  Maybe they only have it re-direct to the virus site when the number is fresh? Maybe you have to be one if the first 100 “lucky customers”?  Maybe they’re going change the re-direct on a certain date?  Maybe it’ll re-direct to something even worse?  Who knows?  It’s pretty devious, any way you look at it.

Here are things that we know now:

  • It seems to be flash-based.  Update: Confirmed – it uses System.setClipboard, which has been around since Flash Player v7.  See Avi Raff’s proof-of-concept listed below.
  • It’s browser and platform-independent – the clipboard attack will happen on IE, FireFox, XP, Vista, Mac, Linux.
  • The affected ads have been appearing on MSNBC and Digg (I have been attacked by both).  Users also report MSN, Facebook, MySpace.
  • Some ads have been captured and are on display at SpywareSucks - they look like “Nielsen Ratings”.
  • There is some sample code in the comments at the article onTheRegister.
  • Here is how the business end of this works - discussion at SunBelt(Update: I fixed the broken link…)
  • My original discussion is  posted in the ClipMate support forum.
  • As of this writing, McAfee SiteAdvisor rates the xp-vista-update site as GREEN!  LOL!! If you have a SiteAdvisor account, add some comments.
  • The xp-vista-update site is registered on ESTDomains, documented rogue registrar (cited from comments found at SiteAdvisor and other blog posts).
  • Adobe is working on a solution.
  • The”NoScripts”FireFox extension will block this if you set it to block flash. (from PCMag  blog)
  • Avi Raff has written a proof-of-concept that  you can use to play with this.  It will overwrite the clipboard with an URL containing “evil.com”.  The proof-of-concept is here:http://raffon.net/research/flash/cb/test.html
  • There is a setting in IE7/IE8 to disable “programmatic clipboard access” (Tools | Internet Options | Security Tab | select “Internet Zone”, Custom Level.  In the “scripting” section, there is an option for “allow programmatic clipboard access”. If set to “Prompt” or even “Disabled”, the flash applet can still hammer the clipboard.
  • OpenDNS.Com (I use it, I like it) doesn’t see anything wrong with “xp-vista-update dot net”.  I’ve submitted it for review.  They need a better end-user reporting system for malware.  The two guys that reported it before me had to pick between “porn” and “adware”.  Didn’t have any “nasty malware site” designation. Huh.  Update: It’s now listed as adware, and that should protect users who block adware via OpenDNS.

Things I think I know:

  • The “xp vista update dot net” site tries to fly under the radar by using an ever-changing ID.  ex:  id=91873534231  When viewed in real life, the URL always has this ID at the end.  Many people report simply being redirected to the Google home page when visiting the link. My theory is that they use the ID to determine how many times an URL has been used, or how old it is. Whatever the critieria, it’s only “live” for a while (tries to infect you), and then it “expires” (harmless re-direct to Google).  Maybe this is why SiteAdvisor still lists it as Green?  It’s like babysitting a naughty kid and having him turn into an angel when the parents show up.
  • To build on the above theory, they may be planning some sort of massive re-awakening of the “retired” links in the future.
  • Adobe has a tricky situation here. This isn’t really a bug.  Should they remove the clipboard API from flash?  I wouldn’t miss it.  But then again, I’m not a flash developer. I can see how it would be useful, for example, if someone wanted to write a WYSIWYG editor in Flash.  I suspect that the majority of the flash apps out there (ads, banners, games, slideshows, video players, etc..) do not need, and should not have access to resources like your disk drive, network connection, and clipboard.  Maybe there could be a “trusted flash app” designation for apps that need it, such as flash-based editors, word processors, spreadsheets, etc..  I think that’s the only way out of this.

Things I don’t know:

  • Will the regular “turn off clipboard” setting in IE7 work for this type of attack?  I don’t know, but suspect that only applies to Javascript.  Update: Confirmed – moved to “Things I know”.
  • Will this be the death of Flash?  I hope not.  I hope they take clipboard support out though, and make it safe.  Update: Adobe is aware, and is working on something.
  • Would Vista’s UAC protect you against the drive-by payload delivered by the “xp vista update dot net” site?  I know that with IE7 set to block popups, my XP laptop was unable to repell the attack. I wonder if Vista would have held up. Thank goodness for Macrium Reflect!

Other mentions of this phenomenon:

Bottom Line:  If you are allowing flash to load in your browser, you can get hit with the “clipboard attack”.  It doesn’t matter what platform you’re on, or what browser you use.  It will simply keep overwriting your clipboard with the nasty URL, about once per second.  It may seem like you can’t delete it – that’s not the case. You can delete it by copying something else. But unless you’re Batman or that Bolt guy from Jamaica, it will be overwritten again before you can paste it anywhere.  Closing the tab with the offending ad will stop the behavior.  The real danger is visiting the web site that the flash ad is trying to spread – so please look at what you’re pasting.  This whole scheme depends on people being careless.  If you send a virus link to your mother, you’re going to have to fix her PC!

Comments? Add your comments. Please, no dangerous URLS without saying what they are and altering by munging the http:// into hxxp:  / / or similar.

Digg This! Digg needs to know that some of their ads are poison!

Vista includes a program: clip.exe which will direct standard command prompt (DOS prompt) output to the clipboard.  Just “pipe” or “here document” to clip.exe and the result goes to the clipboard.

  • ex:  echo “hello, world!” | clip
  • ex: dir | clip
  • ex: clip < readme.txt

Again, this is available on Vista.  If you are using older versions of Windows, you can use our Dos2Clip program, which will do the same thing, but only with one line.  You can get it here, and it’s free to use.


You can easily clear the clipboard to remove sensitive information.  Just copy something else, and it’ll overwrite the clipboard.  By default, windows has no “clipboard history”. Unless you’re running a clipboard manager (such as ClipMate), you can clear the clipboard by copying something else on top of it. If you are worried about a co-worker pasting your password, or some rogue internet site pasting your credit card number, just clear the clipboard as follows:

1) Copy something benign – just highlight any harmless text from any program, press Ctrl+C, and you’ve just overwritten the clipboard with that benign word. 

2) Press the PrintScreen key – this puts a bitmap onto the clipboard, overwriting whatever was there previously.  Web sites can’t paste an image, and if a co-worker is sitting at your desktop, they can see what’s on your screen anyway.  You CAN paste the image into an image editor such as Microsoft Paint, but unless you’ve got sensitive or “naughty” stuff on the screen, this is probably the quickest way.

If your goal is to save memory, use option #1.  Any program that claims to “clear your clipboard, thereby saving memory) is going to use more memory than whatever little thing you’re copying to overwrite what was there.

This tip brought to you by the people who make ClipMate!


Older Posts »