Software that could be used to turn a Web browser into an unwitting hacker’s tool has been posted to the Internet, after it was downloaded by a quick-thinking attendee at last month’s Shmoocon hacker conference.The software, called Jikto, was written by Billy Hoffman, lead researcher at Spy Dynamics. Hoffman demonstrated the code on March 24 as part of a presentation on the dangers of JavaScript malware.Hoffman had discovered a way to write a Web vulnerability scanner in JavaScript, a Web language that can run in any browser. This technique circumvents JavaScript’s security restrictions and, concerned that his Jikto code could be misused, Hoffman said he took extra steps to prevent the code from getting out.However, in order for his demonstration to work, he had to post the Jikto code somewhere on the Internet. “Very briefly you could see the original URL of where the Jikto code got fetched,” Hoffman said. That was enough for show attendee Mike Schroll to snag a copy.“I was sitting pretty close to the front and had my laptop out already,” said Schroll, an information security consultant with Security Management Partners Inc. “The second I saw it I just started typing away.” Schroll posted the code to his website March 25, and submitted a link to the code on Digg.com. He removed the software several hours later at Hoffman’s request.Schroll said he posted the code because he thought it would be useful to other security professionals looking for ways to illustrate just how dangerous a scripting attack can be. “I was pretty interested in it because we do some engagements with clients where we do fake phishing sites,” he said. “I wasn’t trying to be nefarious or malicious.”The software was downloaded from his website about 100 times, Schroll said.Over the past weekend, the code surfaced again, this time on the Sla.ckers.org online discussion forum.With Jikto now public, security researchers worry it could be misused by criminals to scan internal networks for sensitive information, or to build a malicious botnet code. “This particular tool is designed to take control of the Web browser,” said Jeremiah Grossman, chief technology officer with WhiteHat Security. “It will crawl other websites and scan them, looking for vulnerabilities.”Hoffman was sanguine about the release of his tool, saying that criminals would probably have been able to develop something similar to his short, 800-line application. “It’s kind of a tragedy that this ended up getting released,” Hoffman said. “But in reality the bad guys probably knew this, and even if they didn’t have it they were probably a couple of months away.”He said he’s not angry at Schroll for snagging and releasing the Jikto code. “He probably did what any curious individual would have done,” he said. “I really can’t fault someone for being curious, because that’s what my job is.” -Robert McMillan, IDG News Service Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe