Web Trackers Exploit Flaw In Browser Login Managers To Steal Usernames (bleepingcomputer.com) 76
An anonymous reader writes: Princeton privacy experts are warning that advertising and analytics firms can secretly extract site usernames from browsers using hidden login fields and tie non-authenticated users visiting a site with their profiles or emails on that domain. This type of abusive behavior is possible because of a design flaw in the login managers included with all browsers. Experts say that web trackers can embed hidden login forms on sites where the tracking scripts are loaded. Because of the way the login managers work, the browser will fill these fields with the user's login information, such as username and passwords.
The trick is an old one, known for more than a decade but until now it's only been used by hackers trying to collect login information during XSS (cross-site scripting) attacks. Princeton researchers say they recently found two web tracking services that utilize hidden login forms to collect login information. The two services are Adthink (audienceinsights.net) and OnAudience (behavioralengine.com), and Princeton researchers said they identified scripts from these two that collected login info on 1,110 sites found on the Alexa Top 1 Million sites list. A demo page has been created to show how the tracking works.
The trick is an old one, known for more than a decade but until now it's only been used by hackers trying to collect login information during XSS (cross-site scripting) attacks. Princeton researchers say they recently found two web tracking services that utilize hidden login forms to collect login information. The two services are Adthink (audienceinsights.net) and OnAudience (behavioralengine.com), and Princeton researchers said they identified scripts from these two that collected login info on 1,110 sites found on the Alexa Top 1 Million sites list. A demo page has been created to show how the tracking works.
Re: (Score:1)
BORING.
This still works? (Score:2)
Re: (Score:2)
It should not be. For exactly the reason the article says, a sensible browser will only start autofilling once you start to interact with a field.
Re: (Score:2)
But nothing prevents a synthetic event from triggering the filling in any webkit based browser
Re: (Score:3)
If the browser lets the event that triggers the filling be automated, yes. This is the part that must not be possible.
Again, it's down to the browser, nothing else.
Re: (Score:2)
You mean like interacting with a keyword search or clicking on a preference tick box? The rest of the form would be invisible and auto-filled.
I never let browsers store any of my login information. I take my laptop out and about a lot so I assume that it'll get lost or stolen sooner or later (luckily hasn't happened yet). Imagine losing your laptop with easily find-able passwords on it?
I always use a separate, local, encrypted password manager and copy and paste the credentials across, then the paste-board
Firefox : pull-down menu (Score:2)
I remember reading about this years ago, and was under the impression that this had been fixed by browsers filling the form fields in the UI, but not in the DOM, until the user explicitly selected one of the fields in the same form.
That's the case in Firefox :
- you need to click on either the username or password field to get a pull-down menu that gives you information about the login, and gives you a selection of passwords saved in the manager.
Also, with most browsers you get extensions like Block Origin, AdBlock Plus, etc. which are going to block most common advertisers.
And extensions such as Privacy Badger which is going to block most common tracker.
And specifically in Firefox (because it requires to either have the new additiona
Re: (Score:2)
Re: (Score:2)
All the old flaws are coming back, because the younger generation of developers have in general much less of a clue than the ones that created the flaws originally. It is really incredible how utterly clueless many developers are today when it comes to security.
Want to take bets? (Score:2)
My crystal ball tells me we'll hear about a surefire way to block those ad services in no later than 10 postings, 20 tops.
Re: (Score:2, Funny)
turn off the computer ;)
Re: (Score:1)
I would, but it hasn't told me it is safe to do so yet.
Good news (Score:4, Informative)
Re: (Score:2)
Indeed. It however does work when you manually tell LastPass to fill a password. But nothing in the UI prompts you to do so, so I consider this safe behavior.
Re: (Score:2)
Indeed. It however does work when you manually tell LastPass to fill a password. But nothing in the UI prompts you to do so, so I consider this safe behavior.
The important thing is what happens if there is a real login field and the third party fields are hidden.
It looks like the only safe way to use LastPass is copy-and-paste. Which, in retrospect, makes sense.
Re: (Score:2)
In OSes and individual applications that might be in focus : clipboard stealing attacks commonly keep getting found, published, occasionally fixed. So you need to track a lot of vulnerabilities if you use copy and paste.
Re: Good news (Score:1)
Chrome FIX
enable chrome://flags/#fill-on-account-select
Re: (Score:1)
Indeed it does :)
Re: (Score:2)
Re: (Score:2)
Doesn't work in Chrome full stop. Chrome doesn't auto-fill if any script on the page can read the login form, it waits for the user to start typing in the field. Same with credit card auto fill.
It does so work against Chrome... (Score:2)
Re: (Score:2)
Not sure you actually tried it. I just did with Version 63.0.3239.84 (Official Build) (64-bit), and it immediately pulled the username, and as soon as I clicked on anything on the page it also grabbed the password.
Re: (Score:1)
Russians are evil (Score:2)
So are advertisers. They have no morals, just like marketing graduates...
advertising is a crime (Score:2)
Go to Kinkos, laminate and hang it in your all.
This is not "abuse" (Score:5, Insightful)
This is simply outright what is colloquially known as "hacking". Which is why the CFAA needs to be applied. Why haven't these researchers told their AG?
After all, when normal users find a unsecured database by some corporation and access it, they get sued too. Same standard here applies, and this time the culprits even use a documented security hole, meaning the crime is wholly willful.
Re: (Score:1)
And the corporations even being located where they can be held responsible. Nice.
NoScript (Score:2)
for the win! :)
Re: (Score:2)
iOS with Purify blocking scripts by default (Score:2)
Seems to prevent it from working. But another browser (Safari on OS X) which doesn’t block scripts by default gave up the credentials.
So I guess the solution is NoScript or the equivalent.
Re: (Score:1)
unless you actively tell it to populate the web page.
So, like, wiggle your leg at the same time you tell it to populate the web page?
Pi-hole or ublock when travelling FTW (Score:2)
pi-hole that shit.
all i want to know is ... (Score:2, Interesting)
are the CEO's arrested yet?
company assets seized?
if not, when will this happen?
Re: all i want to know is ... (Score:2)
Came here to say this, If these ad companies were harvesting passwords, the punishments need to be dire. People need to go to jail, people at the top.
Also, I've always thought that browser-integrated password managers were an inherently terrible idea due to the potential for exploits like this, so it's good to be proven right again.
Who uses autocomplete? (Score:2)
Safari affected, too (Score:2)
So I wonder how the companies can justify this? I can't think of any compelling legal reason to get users' login information.
Re: (Score:2)
I'm not sure you know the meaning of the word "compelling". Or perhaps "legal". It may not seem ethical, but what they're doing is using another bit of data you are voluntarily (by virtue of your chosen browser settings) providing to "fingerprint" you. It is a bit worse than IP Address or cookie tracking, or way back when mobile phones included a device identifier in the header, but only barely.
So why is it compelling? Because their revenue is based on tracking and monetizing your interests.
Why is it le
Hosts files ftw (Score:1)
0.0.0.0 audienceinsights.net
0.0.0.0 behavioralengine.com
Re: (Score:2)
The problem is when you accidentally miss click and the dam thing then remembers your password. Then you have to mess about making it forget that you put a password in.
Why does the first-party need this? (Score:2)
Fortunately, we haven’t found password theft on the 50,000 sites that we analyzed. Instead, we found tracking scripts embedded by the first party abusing the same technique to extract emails addresses for building tracking identifiers.
Why would the first party need to steal my email address / username? I just used it to log in to their site!
Re: (Score:2)
Firefox not vulnerable? (Score:2)
I don't think Firefox is vulnerable to this because it requires you to click in the field to fill your credentials first.
Yet another reason... (Score:2)
I'll just add this as yet another reason to use an ad blocker, a JavaScript blocker and not use a login manager.