Trojan forces Firefox to secretly store passwords
The malware will, for instance, simply comment out Firefox's confirmation request in the nsLoginManagerPrompter.js file and add a line with automatic storage instructions. The H's associates at heise Security were able to reproduce the effect of the manipulations – manipulations which the malware author probably borrowed from a work around that has been in circulation since 2009.
The manipulation works on all platforms on which the Trojan has the rights to modify the nsLoginManagerPrompter.js file. In tests this worked on Windows XP, Windows 7 and Ubuntu 10.04. However on Windows 7 and Ubuntu the user is usually working with limited privileges by default and under these circumstances the malware is unable to manipulate the file.
Usually, Firefox will ask a user whether to store password data; for security reasons, many users choose not to store passwords, because attackers will first check a browser's password storage and retrieve any data saved there. PWS-Nslog also attempts to retrieve data from the password storage of Internet Explorer and Firefox and send it to a server.
According to Webroot, the malware author didn't put any effort into covering his tracks, as the malware contains a name as well as a Gmail address. Furthermore, Webroot soon found the Facebook page of the allegedly Iranian developer who claims he develops crimeware for fun.