Skip to content

Kashif Ali

Surfeit and Blasé Security

Posted on November 22, 2013 by arstechnica.com

Google squashes nasty bugs that led to perfect-storm account hijacking

Oren Hafif

Google engineers have squashed several high-impact security vulnerabilities in the company's account recovery system that enabled attackers to hijack user accounts.

A proof-of-concept attack that exploited the bugs required a victim to click a booby-trapped link leading to Google.com contained in a spear phishing e-mail. Behind the scenes, the link briefly redirected to an attacker's website even as it opened a legitimate password-reset page on Google. When a victim clicked on the link while logged in to the targeted Gmail account, the attacker site also performed a cross-site scripting attack. The Web application equivalent of a Jedi mind trick, the two exploits sent both the password entered by the victim and the authentication cookie used to access the account to the attacker's website.

"It's a clever attack," Jeremiah Grossman, CTO of Web-application security firm WhiteHat Security, told Ars. "There's elegance and simplicity." The exploit developer "did a lot of work behind the scenes to make the attack simple. This is what we're meant to do in a browser on Gmail. When we see links, we're meant to click on them."

Read 6 remaining paragraphs | Comments


    






Categoriesaccount hijacking, Google, Naked Security, Risk Assessment, Security, Technology Lab, web-application-security

Post navigation

Previous PostPrevious Intimate Images & Cyberbullying – Assessing the Canadian Response
Next PostNext Report: NSA-planted malware spans five continents, 50,000 computer networks
November 2013
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  
« Oct   Dec »

Tags

  • Adobe
  • Android
  • anonymous
  • Apple
  • Biz & IT
  • censorship
  • Crime
  • Cybercrime
  • Cybersecurity
  • Data loss
  • data protection
  • DDoS
  • Exploit
  • Facebook
  • FBI
  • Featured
  • hack
  • hacking
  • Hacks and Cracks
  • https
  • intellectual property
  • iphone
  • Law & order
  • Malware
  • Mobile
  • NEWS & INDUSTRY
  • OS X
  • passwords
  • phishing
  • politics
  • privacy
  • Scam
  • Social networks
  • Spam
  • SSL
  • Stuxnet
  • Surveillance
  • Tech
  • The Courts
  • The Ridiculous
  • Twitter
  • Uncategorized
  • Vulnerability
  • Windows
  • Zero Day
About Proudly powered by WordPress