An exploit in Mozilla's Firefox browser has been found that can hijack the software and monitor submit-and-click events.
The Infostealer.Snifula, which is based on XPCOMs (cross-platform component object models) that developers use to create extensions for the Firefox browser, installs malicious Trojans that are loaded at startup. The Trojan captures contents of form-submission events, including passwords, and forwards them to its main process where it is sent to the remote attacker.
"When an infected user submits a web form on a website, [JS.Ffsniff] will parse the site and steal all information that is submitted by the web form, including passwords," Wuest said. "The JS.Ffsniff script then sends this information to a predefined email address using XPCOM objects."
Joji Hamada, Symantec senior security response manager, said the exploit has had a limited impact locally and recommended downloads from trusted sites only.
"Our intelligence indicates the threat has been noticed in Australia; however, the impact of the attack overall is minimal at this stage," Hamada said. "To protect themselves from this type of threats, users should ensure they only download software from reputable, trusted sites."
Wuest predicts the attacks will increase with the browser's popularity and recommended users install current browser patches.
"With the steady increase of the number of Firefox users we will see the number of malicious extensions created for Firefox grow," he said. "Unfortunately, as soon as something becomes popular, it also becomes a popular target."