Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

languagetool is used by malware to exfiltrate credit cards #11091

Open
mitar opened this issue Dec 8, 2024 · 8 comments
Open

languagetool is used by malware to exfiltrate credit cards #11091

mitar opened this issue Dec 8, 2024 · 8 comments
Assignees

Comments

@mitar
Copy link

mitar commented Dec 8, 2024

TLDR: I think it would be useful to write somewhere that if you find this extension installed on your computer and you didn't install it, you probably have malware installed.

Alternatively, this extension could stop prevent itself from sending credit-card-number-looking data to organization-operated servers.


So I found an extension (added to all browsers, Firefox, Chrome, Edge) that I have not installed: A Grammar Checker & Paraphraser LanguageTool. It seems unchanged.

browser-extension

I wanted to remove it, but I could not. The browser was also configured to be managed by an organization:

browser-is-managed

And of course it is not. It is a personal device. But malware is making hard to remove it.

So I investigated this further and this extension has a feature that it can be managed and that organization can configure it so that it calls into organization-operated server and not a cloud server managed by the author of the extension. Seems reasonable, organization can prevent leaking company data this way.

On my computer this is configured to localhost. It is also configured to do this for all websites.

extension-sends-data-to-localhost

Who listens there? netstat says a Canon printer driver executable? Strange again. That executable seems legitimate (CNAB4RPD.EXE). I suspect it can be exploited so that it runs something else in memory. Opening the port in the browser loads the error that URI handler does not exit for /. It seems to be made with oatpp C++ web framework.

One other sign that your computer is compromised with this malware is that it disables (using managed computer feature) automatic submission to Windows Defender:

automatic-sample-submission-disabled

So malware compromises a legitimate printer driver to run a port to which the extension sends all web site form data (including credit card data entered into any web site), which is then send further to their servers. Pretty smart to hide malware this way.

I think this extension could help here a bit by not sending data from password fields and data which looks like a credit card number.

If anyone wants to explore this further, here is a Google Drive folder with all the files, including the CNAB4RPD.EXE and a memory dump of the running process.

@tiff
Copy link
Member

tiff commented Dec 9, 2024

Thanks so much for reporting this. We (LanguageTool) are investigating this now. I'll keep you posted.

@tiff tiff self-assigned this Dec 9, 2024
@tiff
Copy link
Member

tiff commented Dec 9, 2024

Investigation is ongoing.

However, the title is a bit misleading: LanguageTool only sends texts from multi-line text fields to servers. Password fields and credit card fields are intentionally not handled by the LanguageTool browser extension.

@mitar
Copy link
Author

mitar commented Dec 9, 2024

That is interesting. So I investigated this after a credit card number was stolen, so I then started investigating how it happened. It might be that also some other fields are sent? Or that a particular website was using a multi-line text field? But I would doubt that malware writers would limit themselves only to such cases? So it might be that more than just multi-line text is send?

@tiff
Copy link
Member

tiff commented Dec 9, 2024

Might be that someone put their credit card number on a multiline text field. We definitely don't send the value of single-line input fields to our servers (except for some hardcoded cases, e.g. subject line on Gmail).

@mitar
Copy link
Author

mitar commented Dec 9, 2024

I doubt malware would rely on people accidentally copying values? In Google folder you can see the copy of the extension I made from the computer with malware. Maybe it is somehow patched/modified?

@stefanb
Copy link

stefanb commented Dec 9, 2024

FYI, the provided Canon printer driver CNAB4RPD.EXE has a long history with @VirusTotal, dating back to 2009/2010:
https://www.virustotal.com/gui/file/58b20cdfe8175005c4174892d9f3811411a7316fe435e3f0ae09ffe52c361831/behavior

@mitar
Copy link
Author

mitar commented Dec 10, 2024

@stefanb Thanks for the link, but I I am not sure where can I find that long history? I see only that it was analyzed, but I do not see that much has been found? To me it looks like a non-malicious driver which can be compromised (given that it is signed)? Or is it a malicious program just under this name? It does look strange that it is opening ports and connecting to the Internet.

@stefanb
Copy link

stefanb commented Dec 10, 2024

@mitar long history just means, that due to behaviour other people have also found it suspicious, worth checking for viruses.

It could be, that a legit feature (network traffic relaying or high driver privilege) is sometimes abused for malicious purposes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants