Firefox Relay: Mozilla’s Solution to Tracking and Email Spam

Firefox, the popular web browser of Mozilla gets a new feature, Firefox Relay, to prevent tracking and email spam. Mozilla hopes for ending the email spamming and online tracking of its users.”

Firefox, the popular web browser of Mozilla gets a new feature, Firefox Relay, to prevent tracking and email spam. Mozilla hopes for ending the email spamming and online tracking of its users.

Also Read, Cloudflare cites an increase in “specific, targeted threats”

This new feature, Firefox Relay was first unrolled in the beta version in August 202 as an extension. Firefox Relay can mask the email addresses of users when they sign up for new accounts on websites, disabling third parties to get direct access to their real email accounts.

With this new feature, Firefox users now don’t need to have access to the management dashboard to generate these email aliases. Rather than this, Firefox Relay will encourage users of the browser to use an existing mask to make a new one while creating an account on a webpage.

Masking Your Email

These aliases that the new Firefox feature makes forward messages to the user’s real email address, which means users remain anonymous while still being able to get advantages from various websites, and services online. 

By having different aliases for different sites, users can easily delete and create new ones if they get spam messages without changing their actual email account address.

And in case your email is exposed to data breaches, then all the threat actors have is your alias instead of your actual email address, protecting their privacy and anonymity.

Till today, Mozilla claims that the new feature has prevented more than two million spam and unwanted emails from appearing in actual email accounts of users.

Unlike other similar features from other tech giants, Firefox Relay also removes trackers from emails before moving them forward to the user’s real email account.

Users need to first sign up for using this feature in Firefox, which includes free and paid tiers.

Hackers in Order to Install Frebniis Malware Hacks IIS Feature

“Frebniis, the malware uses a method that injects harmful code into iisfreb.dll’s memory. Iisfreb.dll is a DLL file attached with an IIS feature used for checking unsuccessful web page requests.”

“Frebniss” is a new sort of malware that recently posed a threat to Microsoft’s Internet Information Services (IIS). 

Also Read, What is the ‘North Korean Hacking’ fiasco in the cryptocurrency fiasco?

The malware is being employed by hackers to help them carry out stealthy commands using web requests that are transmitted through the internet.

Microsoft IIS is a robust software app platform uses for web application hosting and web server functionality. Among its multiple uses, the software application platform serves crucial services of Microsoft such as Outlook.

Microsoft IIS is a trusted platform and enables users to get easy access to services and web applications, making it a preferred choice for businesses and individuals simultaneously.

Frebniis Corrupts IIS Feature

Frebniis, the malware uses a method that injects harmful code into iisfreb.dll’s memory. Iisfreb.dll is a DLL file attached with an IIS feature uses for checking unsuccessful web page requests. 

With the help of the IIS feature, all HTTP requests are stealthily tracked by Frebniis and detect particular formats of requests from the hacker, leading to the possibility of executing remote code.

frebniis-malware

The hacker must get access to the Windows system operating the IIS server utilizing another method to apply this trick. But, how the hacker got this access in this instance remains uncertain.

frebniis

The injected .NET backdoor allows C# code execution and helps in proxying without doing disk interaction which makes it undetectable. A particular password is checked when default[.]aspx or logon[.]aspx are requested. 

frebniis-malware-attack-microsoft-iis-internet-information-services

Frebniis can command and link with other systems via compromised IIS, utilizing a base64 encoded string as a second HTTP parameter, accessing secured internal systems which are publicly unavailable.