Chrome tips users to dangerous Windows downloads
Google follows Microsoft's lead, will warn users of unsafe downloads before they reach the PC
Computerworld - Google on Tuesday said it will add malware download warnings to its Chrome browser.
The move has Google following the lead of rival Microsoft, whose Internet Explorer 9 also alerts users about questionable software downloads.
Google will use its Safe Browsing service to flag sketchy downloads, the company said in a post on a company blog. Chrome, Mozilla's Firefox and Apple's Safari already tap into Safe Browsing -- which identifies suspicious or unsafe sites and then adds them to a blacklist -- to warn users of dangerous sites before they actually visit those sites.
Safe Browsing will also provide the data for Chrome's download blocker, said Google.
When a Chrome user tries to download a Windows executable -- a file with the ".exe" suffix -- from a URL on the Safe Browsing blacklist, the browser will display a warning that reads, "This file appears to be malicious. Are you sure you want to continue?"
Extending Safe Browsing to downloads helps shut a malware door, Google argued.
"A separate attack vector exists, which is a social engineering mechanism that attempts to convince a user to download and run a file," Google said in an email reply to questions Wednesday. "This new feature is designed to protect against that type of attack."
Chet Wisniewski, a security researcher at Sophos, a U.K.-based security vendor, agreed.
"This fills in the other half of the puzzle," said Wisniewski, explaining that while Chrome already alerts users of dodgy sites that launch drive-by attacks, that's not enough. "There are millions of [malicious sites], more than Safe Browsing can track, but they all point to a smaller number, still in the tens of thousands but smaller, that contain downloads."
Malware distribution sites don't change at the same speed that sites redirecting to them do, and they're much more likely to be tagged by Safe Browsing. "The number of sites at the bottom [that distribute malware] is small enough that it's a heck of lot easier to track them," Wisniewski said.
Google's anti-download approach differs from Microsoft's. IE9, which launched last month, includes a feature called "SmartScreen Application Reputation" that uses a complex algorithm to rank the probability that a download is legitimate software.
Although Microsoft doesn't like to label Application Reputation, or "App Rep," as a "whitelist," App Rep does resemble a list of pre-approved apps. App Rep uses a file's hash -- which identifies its contents -- and the file's digital certificate to determine whether it's a known executable with an established reputation. If it's not, IE9 warns the user to beware.
Chrome's new warning will be tested with a small number of users running the "dev" channel of Chrome before being added to the "stable," or production-quality version, of Chrome 12, Google said.
Chrome's stable edition now stands at Version 10, which was released a month ago. Assuming Google keeps to its usual practice of rolling out a new version of Chrome every six to eight weeks, Chrome 12 should reach users sometime between the end of May and the end of June 2011.
Other browsers will also be able to tap Safe Browsing for comparable features.
"This is a new project, and we are still working out some of the finer details," Google said in its email on Wednesday. "[But] our goal with Safe Browsing has always been to make the Internet a safer place for all users, regardless of which browser they are using. We hope that others will be able to use this data shortly."
Mozilla did not reply to a request for comment on whether it would use Google's technology to add an anti-download alert tool to Firefox.
"I think this could have an impact," said Wisniewski. "More tracking of malicious sites and downloads only helps everyone."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
- Google quashes 31 vulnerabilities, restores Metro mode 'steppers' with Chrome 34
- Firefox's UI face-lift on track for April debut
- Ex-Mozilla engineer blames Microsoft's rules for Metro Firefox's death
- Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes
- Google reverses field, promises to restore Chrome's scrollbar arrows
- Update: Google ships Chrome 33, patches 28 bugs
- Mozilla's top exec defends in-Firefox ads, revenue search
- Mozilla taps in-Firefox ads as it searches for more revenue
- Mozilla ships Metro Firefox beta for Windows 8
- Mozilla defers Firefox's new 'Australis' UI to April
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts