Webmail and Online Banks Targeted By Phishing Proxies 50
An anonymous reader writes "Netcraft confirms a recent increase in the number of malicious proxy auto-config (PAC) scripts being used to sneakily route webmail and online banking traffic through rogue proxy servers. The scripts are designed to only proxy traffic destined for certain websites, while all other traffic is allowed to go direct. If the proxy can force the user to keep using HTTP instead of HTTPS, the fraudsters running these attacks can steal usernames, passwords, session cookies and other sensitive information from online banking sessions."
Why HTTP? (Score:5, Insightful)
Re:Why HTTP? (Score:5, Insightful)
Path of least resistance at this point. What's easier, getting a malicious PAC script installed, or getting the same PAC script installed as well as having a user sign off on an invalid certificate?
Admittedly, getting someone to blindly click "yes" to accept the bad certificate isn't difficult, but if it doesn't pop at all - all the better for the malicious person on the other end.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Insightful)
Why redirect the traffic at all? Why not just use a key logger and grab credentials that way? Most banks and webmail don't use two factor authentication.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Couldn't it just capture the screen when you click? That's how the old technique of making you pick from drop-down menus was circumvented.
Re: (Score:2)
Re: (Score:3)
Why redirect the traffic at all? Why not just use a key logger and grab credentials that way?
Because a keylogger would alert anti-virus Software, while a PAC script wouldn't.
Re: (Score:2)
password + TAN isn't two-factor?
Re:Why HTTP? (Score:4, Insightful)
Why bother with HTTP? Plenty of malware gets signed certs.
The attack described here does not involve malware. On WPAD requests seen on DHCP or DNS, just inject a WPAD reply with a malicious PAC script and you are done.
Netcraft confirms it?! (Score:1)
Oh my God. This is serious.
My problem with session cookies... (Score:2, Insightful)
I have an issue with the so called, "session cookies."
While they are a part of online the presence, non of their behavior would be stomached in actual day-to-day life.
So the issue is that we've got two set's of paradigms. An online one where you can be tracked by default and a real life
one where you have to be explicitly informed if one is to monitor your every activity.
Sad, indeed.
Re:My problem with session cookies... (Score:5, Informative)
A session cookie is just like a case number, it may be used to speed up communication between departments or sections of your website. Whenever I'm in a queue, there's always a ticket I hold to identify where I am in the queue, what my wait time is, possibly referenced by their third party SLA/QA company, and it could be tied to my Account Number when I get to the counter. It's stomached in real life, because it brings order to what could be chaos, and makes our lives that little bit simpler.
Secondly you must be rather naive to think permission is required to monitor your *every* activity. Through various laws, mutual sharing agreements, and straight greed, there's a wealth of information for people to gather and misuse. While they limit "personally identifiable" information, they gather everything they can and assign it their own ID. It then only takes a little homework to link the ID and your real ID together, and its just this last step which is prohibited in these privacy clauses.
Re: (Score:2)
" Whenever I'm in a queue, there's always a ticket I hold to identify where I am in the queue, "
In the US, we don't get into queues. Instead, we just stand in line. No numbers, please. We depend on our ferocious looks plus the possibility that we might be carrying a concealed weapon to hold our place in line. In some cases, people depend on their super great looks, plus the possibility that they might be carrying a concealed weapon. No other identification is needed, thank you.
As for tracking a person
Re: (Score:1)
Re: (Score:2)
thereby logging you out every time you want to make a forum post on the Web.
Why would that be? If you are logged in, you stay logged in, cookies or not. But then, if you are logged in you can already be tracked by your user credentials, so all this becomes moot...
Re: (Score:1)
In order to make a post, you need to be logged in, assuming anonymous/guest posts aren't allowed. How does the server keep track of the fact that you're logged in and who you are? Your time spent on that site is called a session, and the server sets a session cookie to say, "Okay, you've already logged in, so I'll save you the trouble of doing it again." Some sites use that information to reveal things like user preferences, which wouldn't ordinarily be available to a guest user.
The only alternative I ca
Re: (Score:2)
How does the server keep track of the fact that you're logged in and who you are?
By your user name and password.
Your time spent on that site is called a session, and the server sets a session cookie to say, "Okay, you've already logged in,
If you are logged in, the server sees your username and password, then why does it need anything else?
so I'll save you the trouble of doing it again."
Most (all?) browsers only prompt for a username/password a single time, and then keep in in memory for further requests from the same site and realm.
The only alternative I can think of is the server responding to your log-in action with "Okay, I got your IP address, so I'll just make a note in my database that you logged in from IP address [IPaddr].
Why not simply use your login and password?
Re: (Score:1)
I agree that's perfectly fine, aside from the whole bit about security of saving a password (store it in a secure manner and each time check it against the secure form stored in the user database). How does it save that information in a persistent way that uniquely identifies the computer you're using? That's the role sessions fill. Without the data persistence, refreshing the page would just show you the page as if you weren't logged in. Without the unique identifier (e.g. a session cookie), how does t
Re: (Score:2)
I agree that's perfectly fine, aside from the whole bit about security of saving a password (store it in a secure manner and each time check it against the secure form stored in the user database). How does it save that information in a persistent way that uniquely identifies the computer you're using?
I guess, in a hash table keyed by hostname and realm? Probably the first browser did it that way in any case, although nowadays it's probably in a more evolved data structure...
Without the data persistence, refreshing the page would just show you the page as if you weren't logged in.
That's why pages are sent with a Vary: Http-Authorization tag. This tell caches, including the one in the browser itself, that they should include authorization in the cache key for the page. This is to avoid that a cached unauthenticated page (or worse: authenticated for a different user...) would show up after the user has been aut
Re: (Score:2)
You use it to prove you're someone who's performed some kind of transaction in the past, and it's only valid for a short period of time.
I have a bigger problem with non-session cookies, and third-party cookies. Those you have to carry around for ever, and you have to accept them from and show them to who-the-hell-knows-whom.
Re: (Score:2)
Which cookies do you "have to accept"? And, which ones must you keep forever?
I accept few cookies, almost none of those infamous ever-cookies, and they are almost universally deleted when I close my browser.
https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/ [mozilla.org] One among several tools that are useful when preventing trackers from tracking you.
Re: (Score:2)
Netcraft confirms it! (Score:1)
With the introduction of LUA, Netcraft confirms that NETBSD is dead because it allows proxy auto-config scripts in the kernal!
Re: (Score:1)
I have poured hot grits down my pants. Thank you.
Re: (Score:3)
Get back to us when you've learnt how to spell "kernel".
Re: (Score:2)
Kernel Sanders is alive and well--here, go knock yourself out [mybrute.com].
Re: (Score:2)
Maybe you meant Colonel Sanders? I've little idea what a kernal is, and prior to the advent of computers, the only kernels I ever messed with was the corn on my plate at dinner. I guess there were other kernels back then, but I just didn't have much to do with any of them. Kernel of truth, maybe?
Warhol Billionaires (Score:5, Insightful)
Re: (Score:2)
Thanks for posting that here, where some unscrupulous writer might want to grab the idea to use for a novel. :)
Re: (Score:2)
DNSSEC would be nice (Score:4, Interesting)
It'd be nice if one could bypass the various CA's and enforce HTTP Strict Transport Security (HSTS) as well. I could then have an unlimited number of certificates for my domain and sub-domains. I would see that owning the .com or whatever domain would go up in price though since Verisign and others still want their money somehow and someone still signs the root somewhere.
It'd just be nice to be my own CA for my own domain anyway.
so what should i do? (Score:3)
avoid banking at work? i always figured that was more secure than at my own home (shared wifi with two room mates- neither seem tech savvy, but you never know.; WPA2 but short password)
it sounds like if my room mates computers are compromised, i can get phished with the method?
Re: (Score:2)
> Google the SHA1 fingerprints of the certs
next step of the malware: intercept google.
Re: (Score:3)
If you use Firefox or Chrome, install the HTTPS Everywhere addon by the EFF.
https://www.eff.org/https-everywhere [eff.org]
Re: (Score:2)
Re: (Score:2)
If you use Firefox or Chrome, install the HTTPS Everywhere addon by the EFF.
https://www.eff.org/https-everywhere [eff.org]
I also recommend HTTPS Finder, [google.com] which detects HTTPS-compatible sites and adds them to HTTPS Everywhere's rule-set.
Re: (Score:2)
I'd rather have the room mate's compromised computer on the same network, than to use my workplace network. The "IT" guy is clueless. But, he's a relative of one of the bosses, and as a result, he can only move up - not out. Nepotism is alive and well in the business world.
This why SSL was invented (Score:3)
SSL will, if correctly setup, will prevent this. Unless you click through all the warnings your browser shows regarding the sites certificate.
Re: (Score:3)
SSL will, if correctly setup, will prevent this. Unless you click through all the warnings your browser shows regarding the sites certificate.
You are aware, I'm sure, that your first sentence is handily negated by the second one?
Re: (Score:1)
As long as one of the hundreds of CAs your browser trusts doesn't make a mistake, sure. But we've seen that some CAs will sign anything. I expect inside jobs at CAs will also become more popular over time.
PGP.... duh (Score:1)
All this talk of SSL and signed certs. Band aids. If every person and corp used PGP none of this would even be a problem would it?