{"id":1179,"date":"2017-05-24T14:48:44","date_gmt":"2017-05-24T14:48:44","guid":{"rendered":"http:\/\/www.gtechbooster.com\/?p=1179"},"modified":"2023-06-21T11:44:17","modified_gmt":"2023-06-21T11:44:17","slug":"hackers-malware-in-subtitle-files","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/hackers-malware-in-subtitle-files\/","title":{"rendered":"Hackers malware in subtitle files"},"content":{"rendered":"\n<p>An impressive new exploit gives hackers the ability to control your desktop through malware spread by fake movie subtitles. The exploit, which essentially dumps the malware onto your desktop and then notifies the attacker, affects users of video players like Popcorn Time and VLC.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-2756143712\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-2789293329\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p><a href=\"http:\/\/blog.checkpoint.com\/2017\/05\/23\/hacked-in-translation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Checkpoint<\/a> found that malformed subtitle files can give hackers the ability to embed code into subtitle files popular with pirated movies and TV. Because these subtitles are usually trusted by video players and users alike they were an oft-overlooked vector for hack attacks.<\/p>\n\n\n\n<p> Our research reveals a new possible attack vector, using a completely  overlooked technique in which the cyberattack is delivered when movie  subtitles are loaded by the user\u2019s media player. <\/p>\n\n\n\n<p>These subtitles  repositories are, in practice, treated as a trusted source by the user  or media player; our research also reveals that those repositories can  be manipulated and be made to award the attacker\u2019s malicious subtitles a  high score, which results in those specific subtitles being served to  the user. <\/p>\n\n\n\n<p>This method requires little or no deliberate action on the  part of the user, making it all the more dangerous.<\/p>\n\n\n\n<p> Unlike traditional attack vectors, which security firms and users are  widely aware of, movie subtitles are perceived as nothing more than  benign text files. <\/p>\n\n\n\n<p>If you\u2019re using Popcorn Time \u2013 and you know you shouldn\u2019t be \u2013 you can download a fix here. Otherwise VLC, Kodi, and Stremio should be patched automatically. <\/p>\n\n\n\n<p>In the demo below we see the subtitles essentially activating a TinyVNC connection with the attacker\u2019s machine, allowing full access for the desktop. It\u2019s a pretty steep price to pay just to watch Logan Noir.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube alignwide wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Hacking Demonstration | Popcorn Time Translation Malware Found\" width=\"1290\" height=\"968\" src=\"https:\/\/www.youtube.com\/embed\/vYT_EGty_6A?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><small>Featured Image: Bryce Durbin\/TechCrunch<\/small><\/p>\n<div class=\"gtech-end-cont\" id=\"gtech-3029251220\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-3464057023\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>An impressive new exploit gives hackers the ability to control your desktop through malware spread by fake movie subtitles. The exploit, which essentially dumps the malware onto your desktop and then notifies the attacker, affects users of video players like Popcorn Time and VLC. Checkpoint found that malformed subtitle files can give hackers the ability [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":1181,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[530],"class_list":["post-1179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-malware"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/1179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=1179"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/1179\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/1181"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=1179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=1179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=1179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}