Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding a pack for unwanted chrome extensions #3889

Merged
merged 3 commits into from
Oct 26, 2017
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 10 additions & 10 deletions packs/unwanted-chrome-extensions.conf
Original file line number Diff line number Diff line change
@@ -1,61 +1,61 @@
{
"platform": "windows,darwin",
"queries": {
"Unwanted_Chrome_Extension_BetternetVPN": {
"BetternetVPN": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='gjknjjomckknofjidppipffbpoekiipm';",
"interval": 86400,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just my 2-cents, but what about doing 3600 for the interval? I feel like for chrome extensions they could be installed pretty quick, and considering this query will likely be enumerating information on client user laptops this query will likely only run once every 3 business days. Thoughts?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agreed, just had 86400 to be safe :)

"description": "https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would you mind wrapping the URLs to additional information in parens similar to the mac attack packs?

"snapshot": true
},
"Unwanted_Chrome_Extension_Chrometana": {
"Chrometana": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='kaicbfmipfpfpjmlbpejaoaflfdnabnc';",
"interval": 86400,
"description": "https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/",
"snapshot": true
},
"Unwanted_Chrome_Extension_CopyFish": {
"CopyFish": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='eenjdnjldapjajjofmldgmkjaienebbj';",
"interval": 86400,
"description": "https://www.bleepingcomputer.com/news/security/copyfish-chrome-extension-hijacked-to-show-adware/",
"snapshot": true
},
"Unwanted_Chrome_Extension_Giphy": {
"Giphy": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='kaicbfmipfpfpjmlbpejaoaflfdnabnc';",
"interval": 86400,
"description": "https://www.reddit.com/r/chrome/comments/6htzan/psawarning_giphy_extension_6172017_is_now_malware/",
"snapshot": true
},
"Unwanted_Chrome_Extension_HolaVPN": {
"HolaVPN": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='gkojfkhlekighikafcpjkiklfbnlmeio';",
"interval": 86400,
"description": "http://adios-hola.org",
"snapshot": true
},
"Unwanted_Chrome_Extension_InfinityNewTab": {
"InfinityNewTab": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='dbfmnekepjoapopniengjbcpnbljalfg';",
"interval": 86400,
"description": "https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/",
"snapshot": true
},
"Unwanted_Chrome_Extension_SocialFixer": {
"SocialFixer": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='ifmhoabcaeehkljcfclfiieohkohdgbb';",
"interval": 86400,
"description": "https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/",
"snapshot": true
},
"Unwanted_Chrome_Extension_TouchVPN": {
"TouchVPN": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='bihmplhobchoageeokmgbdihknkjbknd';",
"interval": 86400,
"description": "https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/",
"snapshot": true
},
"Unwanted_Chrome_Extension_WebDeveloper": {
"WebDeveloper": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='bfbameneiokkgbdmiekhjnmfkcnldhhm';",
"interval": 86400,
"description": "https://www.bleepingcomputer.com/news/security/chrome-extension-with-over-one-million-users-hijacked-to-serve-adware/",
"snapshot": true
},
"Unwanted_Chrome_Extension_WebPaint": {
"WebPaint": {
"query": "SELECT * FROM users JOIN chrome_extensions USING (uid) WHERE identifier='emeokgokialpjadjaoeiplmnkjoaegng';",
"interval": 86400,
"description": "https://www.bleepingcomputer.com/news/security/eight-chrome-extensions-hijacked-to-deliver-malicious-code-to-4-8-million-users/",
Expand Down