Skip to Content
Uncategorized

Chrome’s Security Crown Slips

A security firm claims to have found a way to use Google’s browser to attack web users.

Google’s browser Chrome may have just suffered its most serious security setback yet. Security firm VUPEN today announced that its researchers had found a way to have a webpage run any code or program it wants on a Chrome user’s Windows computer.

A video shows how visiting the attacking webpage enables it to download and then execute a calculator program–a standard method of demonstrating how an attack works. If the vulnerability were exploited in the wild it could be used to install programs that steal passwords, or make a computer part of a network of infected computers used to attack websites.

VUPEN hasn’t made the exact details of the hack public, saying only that it required “one of the most sophisticated codes we have seen” and that it will relay the details to government agencies on its customer list. According to the company’s statement:

“This code and the technical details of the underlying vulnerabilities will not be publicly disclosed. They are shared exclusively with our Government customers as part of our vulnerability research services.”

VUPEN provides law enforcement and intelligence agencies with what it dubs “weaponized” exploits for surveillance or other covert operations. The company has made no mention of whether Google was warned of today’s announcement, or how it will be helped to fix the exploit.

Google has promoted Chrome since its launch as offering superior security to other browsers. Chrome has never been defeated at the annual Pwn2Own contest that challenges the world’s best hackers to compromise popular software. At this year’s event in March, Firefox and Chrome were the only two popular browsers not defeated.

VUPEN’s attack is the first to beat a feature of Chrome called “sandboxing” that carefully isolates web code in different tabs from each other, and the rest of a person’s computer. The new attack is able to somehow bust out of the sandbox to download and execute any code it wishes. Another of Chrome’s security features will help it minimize the risk to users, though. Unlike most software, the browser silently upgrades itself to the most recent version without a person’s permission whenever possible. That habit will enable the fix to Google’s new security hole to spread fast, once it has been worked out.

Deep Dive

Uncategorized

Our best illustrations of 2022

Our artists’ thought-provoking, playful creations bring our stories to life, often saying more with an image than words ever could.

How CRISPR is making farmed animals bigger, stronger, and healthier

These gene-edited fish, pigs, and other animals could soon be on the menu.

The Download: the Saudi sci-fi megacity, and sleeping babies’ brains

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. These exclusive satellite images show Saudi Arabia’s sci-fi megacity is well underway In early 2021, Crown Prince Mohammed bin Salman of Saudi Arabia announced The Line: a “civilizational revolution” that would house up…

10 Breakthrough Technologies 2023

Every year, we pick the 10 technologies that matter the most right now. We look for advances that will have a big impact on our lives and break down why they matter.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.