Mozilla has removed two Firefox extensions called ‘Bypass’ and ‘Bypass XM’ from the Add-ons store.
Both of these add-ons were caught abusing Firefox’s proxy API that enables developers to intercept web requests and determine whether and how to proxy them. The addons blocked access to the latest web browser updates, up-to-date access lists, and content:
“In early June, we discovered add-ons that were misusing the proxy API, which is used by add-ons to control how Firefox connects to the internet. These add-ons interfered with Firefox in a way that prevented users who had installed them from downloading updates, accessing updated blocklists, and updating remotely configured content,” explain Mozilla engineering managers Rachel Tublitz and Stuart Colville in a blog post.
Both ‘Bypass’ and ‘Bypass XM’ were seen to be in use by 455,000 Firefox users.
Additional reporting by BleepingComputer revealed that the extensions were possibly “using a reverse proxy to bypass paywalled sites,” although Mozilla didn’t share any additional insights into the malicious nature of addons. “The add-ons also had Mozilla’s domain in the paywall list which inadvertently also blocked browser updates,” states the same report.
Fortunately, the add-ons are no longer on the Firefox Add-ons store. And, to deter the possibility of any mischievous ones from popping up, Mozilla has temporarily suspended accepting extensions that make use of Firefox’s proxy API.
At this time, Microsoft Defender appears to be the only antivirus solution detecting the add-ons.
If you’re using the up-to-date Firefox version 93, add-ons that misuse the proxy API are already blocked. If you are not, follow the update instructions to get the latest version of Firefox.
“Starting with Firefox 91.1, Firefox now includes changes to fall back to direct connections when Firefox makes an important request (such as those for updates) via a proxy configuration that fails. Ensuring these requests are completed successfully helps us deliver the latest important updates and protections to our users. We also deployed a system add-on named ‘Proxy Failover’ (ID: proxy-failover@mozilla.com) with additional mitigations that has been shipped to both current and older Firefox versions,” states Mozilla’s blog post.
The system addon ‘Proxy Failover’ deployed in Firefox releases will ensure that access to browser updates and essential content (like blocklists) is not hampered or deliberately halted by a malicious add-on.
To check if you are impacted, navigate to the Troubleshooting Information section by entering “about:support” in the Mozilla Firefox address bar.
Scroll down to the “Add-ons” section, and see if either of the following entries appear:
The presence of either or both of these entries indicates you are affected. If updating your browser to the latest version isn’t feasible, you may manually remove these add-ons. Users should also consider refreshing Firefox and resetting all add-ons.
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the…
Rogue WordPress Plugin Found to Steal Credit Card Information in Magecart Campaign Threat hunters have…
The Assembly of the Republic of Albania and telecom company One Albania have recently fallen…
The banking malware Carbanak has resurfaced with updated tactics, incorporating attack vendors and techniques to…
One of the world's largest theme park operators, Parques Reunidos has disclosed a cybersecurity incident.…
Phishing kit used by multiple hacked sites generates a log in page on the fly…
This website uses cookies.