The Devil’s in the Subtitles
Widespread malware affecting media players
On May 23rd, 2017, Checkpoint found a vulnerability in four popular media players that use a new attack vector by creating malicious subtitle files to infect computers, smartphones, and smart TVs. Once the files are downloaded, an attacker can potentially take complete control over the device. Over 200 million devices currently run this type of software across the world and are vulnerable to this attack.
This attack has a high likelihood of success due to the fact that subtitle repositories, such as OpenSubtitles.org, are typically seen as trusted sources by a user, or a user’s media player where subtitles are indexed and ranked. The subtitle supply train uses over 25 different formats with each one having its own unique features and capabilities. This fragmentation coupled with limited security means that there are multiple vulnerabilities that can be exploited.
How does it work?
The attackers are able to manipulate these repositories to give the malicious subtitles a higher score. Raising the scores can increase the likelihood that compromised subtitles are chosen by the user. This exploit requires little to no user interaction in order to be successful.
Current methods of endpoint protection treat subtitles as benign text files which means security firms, users and anti-virus software agents authorize them without assessing their real nature. This allows the malicious code to be undetected by standard security protocols.
Attackers exploiting this vulnerability are then able to do various amounts of damage. Potential impact can include but is not limited to:
- Theft of sensitive data
- Personal Identifiable Information (PII)
- Financial information
- Usernames and passwords
- Distributed Denial of Service activity
What Can Be Done About It?
Checkpoint has notified the developers of each application to the recent vulnerabilities. Each one has reported they patched the flaws and advise users to update their media players as soon as possible.
At this time, it is recommended to download the patches. As more information is gathered around this type of exploit we will update our blog with further details.
Vulnerable Platforms and Updates:
- PopcornTime – Software to watch Movies and TV shows instantly
- VLC – VideoLAN Media Player
- Kodi (XBMC) – Open-Source Media Software
- Link to the source code fix is available here: https://github.com/xbmc/xbmc/pull/12024
- Stremio – Video Streaming App for Videos, Movies, TV series, and TV channels
The following links contain information about the exploit and fixes:
- Checkpoint Write-Up
- The Hacker News
- Consumer Education(39)
- Consumer Stories(2)
- Cybersecurity Consulting(10)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(9)
- MDR Services(64)
- Penetration Testing(16)
- Press Release(61)
- Research Report(9)
- Security Assessments(16)
- Thought Leadership(17)
- Threat Hunting(9)
- Vulnerability Disclosure(3)