Posted on 10/30/2004 1:05:40 PM PDT by FreedomCalls
The flaw, which was posted to the Bugtraq mailing list by Benjamin Franz, is exploited by placing two URLs and a table within a single HTML href tag, producing a link that looks like this:
http://www.microsoft.com |
The technique, which can be executed by anyone with basic knowledge of HTML, can be used to construct convicing fake URLs for use in phishing scams. The flaw is possible because Internet Explorer has difficulty processing improperly formed HTML. The attack opens one href tag, and then leaves that tag open while enclosing a second URL within a table. The browser displays the first URL in the status bar, but sends users to the second URL.
The flaw affects versions of IE up to 6.0.2800.1106 - which includes systems that haven't yet installed Windows XP SP2, but are current on all other critical updates from Windows Update - as well as the Safari browser for Macs. Users running Windows XP SP2 (IE version 6.0.2900) and the open source Firefox and Mozilla browsers are not affected.
Phishing attacks seek to trick account holders into divulging sensitive account information through the use of e-mails which appear to come from trusted financial institutions and retailers. Several previous URL spoofing weaknesses in Internet Explorer have been widely used by phishing attacks. The ability to display a fraudulent URL in the status bar is especially useful, as security-conscious users would check the status bar before clicking through. The technique does not disguise the URL displayed in the address bar upon arrival at the destination page, meaning alert users will recognize the spoof at that point. But the tactic could be used to send e-mail recipients and web surfers to pages that attempt to download malware upon loading, a common tactic used by phishers to install trojans and keyloggers.
Netcraft has developed a service to help banks and other financial organizations identify sites which may be trying to construct frauds, identity theft and phishing attacks by pretending to be the bank, or are implying that the site has a relationship with the bank when in fact there is none.
It's a great article, really! ;-)
It's not working on my IBM Selectric II. Am I doing something wrong?
(It seemed funny when I typed it.)
When you open links this way you defeat all of the protections built into Mozilla/Firefox. I suggest that you always left click on links, as the best way to defeat spoofing.
Personally, I use Camino at home, which is a Mozilla version tailored as a high-speed low-overhead Firefox for Mac OS X (not suggesting you or anyone switch). I don't use tabs for browsing at all, on the theory that the more I let the computer do for me, the less secure the browser is.
Thanks to Mozilla, I no longer care about these kinds of stories.
A real developer would've linked the image to the site lol
However, it remains really annoying how many web sites specifically demand Internet Explorer even when they would probably run with another browser. Several hospitals that I long into permit ONLY IE, and both my bank and credit card demand it. Even using another browser ID setting will not work.
One major very expensive software package I must use uses IE components within the application, and as a result is now "broken" by any upgrade to WinXP SP2. So I have to run a less secure OS just to use one megaexpensive app that makes the mistake of being very dependent on MS Software.
Firefox freaking rules - I have been using it exclusively since I got it a month ago! Leaves MS Internet Explorer in the DUST!
Of course the first thing most smart IE users do if forced to use it is shut off unsigned AX and make signed work on a permission only basis.
Gee, my IE works fine. Sure, the text says the link goes somewhere else, but when I hover over it, the status bar shows the correct URL and after navigation the address bar also shows the correct URL.
Not seeing what the issue is here...
Did you RTFA? IE versions 6.0.2800 or less are affected. IE versions 6.0.2900 or later are not.
One financial institution I deal with allows users of its web site to set a "security phrase" which the Credit Union will include in all legitimate emails. So if you set your Security phrase to "FREEPERS RULE!" then any email you get which is supposedly from that financial institution that lacks those words is a phony.
The use of security phrase would not prevent someone from intercepting a real email to you and using it go generate a fake one. It would, however, stop a more common form of phishing which is to simply send out millions of phony emails without any degree of per-recipient interaction.
Given that such an approach is so simple, why don'y any of the "big" firms do it?
Thanks!
Anyone know the best anti-spam software? Recently I've been getting a lot more than usual... to the point where I feel willing to pay money to stop it...
www.google.com www.dogpile.com |
By the way, on Firefox, the "normal" text in the table appears as black with a link-colored underline except for the word "table" for which I requested [font color=red] (it appears as red text which with a red underline) and the word "these" for which I requested underlining (it appears as black with black underline).
There is an extension called SpoofStick that will display the real URL of whereever you're surfing.
For 1.0PR users.
IE6 goes to kerry
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.