Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Privacy The Almighty Buck

Webmail and Online Banks Targeted By Phishing Proxies 50

An anonymous reader writes "Netcraft confirms a recent increase in the number of malicious proxy auto-config (PAC) scripts being used to sneakily route webmail and online banking traffic through rogue proxy servers. The scripts are designed to only proxy traffic destined for certain websites, while all other traffic is allowed to go direct. If the proxy can force the user to keep using HTTP instead of HTTPS, the fraudsters running these attacks can steal usernames, passwords, session cookies and other sensitive information from online banking sessions."
This discussion has been archived. No new comments can be posted.

Webmail and Online Banks Targeted By Phishing Proxies

Comments Filter:
  • Why HTTP? (Score:5, Insightful)

    by AK Marc ( 707885 ) on Saturday February 16, 2013 @09:09PM (#42925133)
    Why bother with HTTP? Plenty of malware gets signed certs. If you are messing with malware, change the root certs on the machine (assuming your malware installing the proxy has root), and use HTTPS to www.citibank.com. The user won't know the difference. It'll show up as a valid cert to the right domain, and the proxy can re-encrypt it and use the unencrypted username and password submitted to it. Plenty of corporates do this and have the ability to sniff 100% of employee traffic, even encrypted, because it's all signed and trusted certs, there will be no warnings, though you can inspect the cert for trusted sites, and you'd have to verify DNS or certs for every secure site, which breaks all the usability models. If it takes root to get the malware on in the first place, the hackers screwed up big if they didn't make it work for HTTPS.
  • by bogaboga ( 793279 ) on Saturday February 16, 2013 @09:23PM (#42925179)

    I have an issue with the so called, "session cookies."

    While they are a part of online the presence, non of their behavior would be stomached in actual day-to-day life.
    So the issue is that we've got two set's of paradigms. An online one where you can be tracked by default and a real life
    one where you have to be explicitly informed if one is to monitor your every activity.

    Sad, indeed.

  • Re:Why HTTP? (Score:5, Insightful)

    by karnal ( 22275 ) on Saturday February 16, 2013 @09:34PM (#42925237)

    Path of least resistance at this point. What's easier, getting a malicious PAC script installed, or getting the same PAC script installed as well as having a user sign off on an invalid certificate?

    Admittedly, getting someone to blindly click "yes" to accept the bad certificate isn't difficult, but if it doesn't pop at all - all the better for the malicious person on the other end.

  • by retroworks ( 652802 ) on Saturday February 16, 2013 @09:46PM (#42925287) Homepage Journal
    In the future, everyone will be a billionaire for 15 minutes, until their ill-gained 15 minute life savings is phished by the next billionaire. The bank account hijack will rotate around and around, shared by everyone in the world, boosting all our credit ratings... momentarily.
  • Re:Why HTTP? (Score:2, Insightful)

    by Anonymous Coward on Saturday February 16, 2013 @10:20PM (#42925407)

    Why redirect the traffic at all? Why not just use a key logger and grab credentials that way? Most banks and webmail don't use two factor authentication.

  • Re:Why HTTP? (Score:4, Insightful)

    by manu0601 ( 2221348 ) on Saturday February 16, 2013 @10:45PM (#42925513)

    Why bother with HTTP? Plenty of malware gets signed certs.

    The attack described here does not involve malware. On WPAD requests seen on DHCP or DNS, just inject a WPAD reply with a malicious PAC script and you are done.

With your bare hands?!?

Working...