Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: c2 bypass #28057

Open
wants to merge 2 commits into
base: develop
Choose a base branch
from
Open

fix: c2 bypass #28057

wants to merge 2 commits into from

Conversation

AugmentedMode
Copy link
Contributor

@AugmentedMode AugmentedMode commented Oct 24, 2024

Description

This update addresses a bypass that allowed scammers to bypass C2 detection by using alternative network request types to communicate with their Command and Control (C2) servers. Previously, we only listened for a limited set of request types (e.g., main_frame, sub_frame, xmlhttprequest), which left the system exposed to other methods of calling C2s.

With this fix, we now listen to all network request types and cross-check them against our client-side blocklist, ensuring better coverage and preventing these types of bypasses.

Changes:

Updated maybeDetectPhishing in background.js to listen for all network requests by removing restrictions on request types.

Open in GitHub Codespaces

Related issues

Fixes:

Manual testing steps

  1. Go to this page...

Screenshots/Recordings

Before

After

Pre-merge author checklist

Pre-merge reviewer checklist

  • I've manually tested the PR (e.g. pull and build branch, run the app, test code being changed).
  • I confirm that this PR addresses all acceptance criteria described in the ticket it closes and includes the necessary testing evidence such as recordings and or screenshots.

@AugmentedMode AugmentedMode requested a review from a team as a code owner October 24, 2024 02:56
Copy link
Contributor

CLA Signature Action: All authors have signed the CLA. You may need to manually re-run the blocking PR check if it doesn't pass in a few minutes.

@github-actions github-actions bot added the team-product-safety Push issues to Product Safety team label Oct 24, 2024
@AugmentedMode AugmentedMode self-assigned this Oct 24, 2024
@metamaskbot
Copy link
Collaborator

Builds ready [0bc93de]
Page Load Metrics (1784 ± 57 ms)
PlatformPageMetricMin (ms)Max (ms)Average (ms)StandardDeviation (ms)MarginOfError (ms)
ChromeHomefirstPaint15762140178511957
domContentLoaded15262064174611153
load15792146178411957
domInteractive17131492613
backgroundConnect1084362311
firstReactRender522031023718
getState572182110
initialActions00000
loadScripts1117149412908641
setupStore1276292311
uiStartup17142472200718890
Bundle size diffs [🚀 Bundle size reduced!]
  • background: -50 Bytes (-0.00%)
  • ui: 0 Bytes (0.00%)
  • common: 0 Bytes (0.00%)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
team-product-safety Push issues to Product Safety team
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants