This document summarizes research into exploiting Google gadgets for malicious purposes. It describes how the researcher was able to build a basic botnet by taking advantage of vulnerabilities in how Google gadgets communicate and access browser data. They were able to perform man-in-the-middle attacks, harvest browser information, set up basic command and control, and create an anonymous browsing gadget. While not a full-fledged botnet, it demonstrated how Google gadgets meet some key requirements for being exploited in this way, like access to data and stealthy communication channels. The document recommends fixes like Google following standard web protocols and consumers blocking certain agents and cleaning browser histories.
2. Overview
油
р Basic
油goals
油of
油a
油Botnet
油
р Basic
油requirements
油for
油a
油Botnet
油
р Event
油that
油spawned
油this
油research
油
р Building
油the
油puzzle
油
р What
油we
油did?
油
р How
油we
油did
油it?
油
р The
油鍖x
油
3. Basic
油goals
油of
油a
油Botnet
油
р PROFIT
油
р Disruption
油
р Growth
油
р Hide
油in
油the
油masses
油
4. Requirements
油for
油Botnet
油
р Botnets
油need
油to
油be
油Viral
油
р Access
油to
油valuable
油Data
油or
油services
油
р They
油require
油C2
油to
油communicate
油
р Stealth
油