A New Type of Phishing Attack
A New Type of Phishing Attack
Is there anything that NS can do about this new problem?
--------------
A New Type of Phishing Attack
http://www.azarask.in/blog/post/a-new-t ... ng-attack/
--------------
A New Type of Phishing Attack
http://www.azarask.in/blog/post/a-new-t ... ng-attack/
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 FlyPaper/RC1 (.NET CLR 3.5.30729)
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: A New Type of Phishing Attack
As pointed out by Brian Krebs, NoScript does block this kind of attack.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
Re: A New Type of Phishing Attack
NOT allowing Javascript to run wasn't what I was thinking.
When I go to a site, I choose what scripts to allow based on the list that NS presents. Often, I might not see anything displayed on the page, until I allow one or more scripts to run. But I am blind doing this as I have no easy way to tell WHICH script I should allow. So I generally try them one at a time until I see stuff displayed on the site.
Something more automatic than a script on/off toggle is needed (if at all possible).
When I go to a site, I choose what scripts to allow based on the list that NS presents. Often, I might not see anything displayed on the page, until I allow one or more scripts to run. But I am blind doing this as I have no easy way to tell WHICH script I should allow. So I generally try them one at a time until I see stuff displayed on the site.
Something more automatic than a script on/off toggle is needed (if at all possible).
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 FlyPaper/RC1 (.NET CLR 3.5.30729)
Re: A New Type of Phishing Attack
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.9) Gecko/20100317 SeaMonkey/2.0.4
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: A New Type of Phishing Attack
Oh well, you may for instance take advantage of the Script Surrogates feature in order to prevent the document's title from being changed:Jojo999 wrote:Something more automatic than a script on/off toggle is needed (if at all possible).
noscript.surrogate.stickyTitle.sources=
Code: Select all
@*
Code: Select all
var getTitle = document.__lookupGetter__("title"); var setTitle = document.__lookupSetter__("title"); document.__proto__.__defineSetter__("title", function() {}); document.addEventListener("DOMContentLoaded", function(ev) {var title = getTitle.call(document); setInterval(function() { if (title != getTitle.call(document)) setTitle.call(document, title) }, 250); }, false);
Really, with a bit of JavaScript knowledge, you can make surrogates almost for anything.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
Re: A New Type of Phishing Attack
"Really, with a bit of JavaScript knowledge, you can make surrogates almost for anything."
Ah, but I don't have even a bit of Javascript knowledge.
I will try to understand the link you refer to though.
Ah, but I don't have even a bit of Javascript knowledge.

I will try to understand the link you refer to though.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 FlyPaper/RC1 (.NET CLR 3.5.30729)
-
- Ambassador
- Posts: 1586
- Joined: Fri Mar 20, 2009 4:47 am
- Location: Colorado, USA
Re: A New Type of Phishing Attack
http://krebsonsecurity.com/2010/05/devi ... gets-tabs/Giorgio Maone wrote:As pointed out by Brian Krebs, NoScript does block this kind of attack.
The proof-of-concept works on my NoScript test profile with default NS settings.Update, May 25, 7:55 p.m. ET: Researcher Aviv Raff has posted an interesting proof-of-concept of his own that shows how this attack can work against Firefox even when users have the Noscript add-on installed and in full paranoid mode. Raff crafted his page, which is a mock up of this blog post, to morph into an image of the Gmail login page, and it will reload every 20 seconds but will only change to the sample phish page if you move to another tab with your mouse, or after 10 reloads (in case you moved with the keyboard). So it will change only after 3 minutes or so, unless you move to another tab with your mouse.
“I was trying to find a way to work around the javascript need for the [proof-of-concept],” Raff said in an instant message. “First I was able to do this without knowing if the user moved to a new tab. Now I can almost be sure of that.”
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.4) Gecko/20100513 Firefox/3.6.4
Re: A New Type of Phishing Attack
Yes, mine also, which is why I initiated this thread.Alan Baxter wrote:The proof-of-concept works on my NoScript test profile with default NS settings.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 FlyPaper/RC1 (.NET CLR 3.5.30729)
Re: A New Type of Phishing Attack
Code: Select all
<html>
<head>
<title>
Gmail: Email from Google
</title><link REL="SHORTCUT ICON" HREF="https://mail.google.com/favicon.ico"></head>
<body style="margin:0px"><img src="http://img.skitch.com/20100524-b639xgwegpdej3cepch2387ene.png" />
</body>
</html>
I'm kind of confused as to what's going on.
Like after you get the "gmail" web page, if you reload, you're "redirected" back to a (bogus) Krebs on Security page, from where NoScript will then block a <META> redirection (a 404 at avivraff.com).
Code: Select all
onclick="javascript:ckratingKarma('6067', 'add', 'krebsonsecurity.com/wp-content/plugins/comment-rating/', '1_16_');
Looking further at the "Krebs on Security" page it makes a bit more sense. The kind of sense that it is all just a redirection from what is - which makes it confusing & so could ? be effective in the wrong hands.
(Think Mozilla <including Giorgio> are looking at this in locked Bugzilla reports?)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.3a5pre) Gecko/20100519 SeaMonkey/2.1a2pre
Re: A New Type of Phishing Attack
I tried to insert your code into USER.JS
// Experimental for NoScript to block changing the page title
user_pref("noscript.surrogate.stickyTitle.sources", "@*");
user pref("noscript.surrogate.stickyTitle.replacement", "var getTitle = document.__lookupGetter__("title"); var setTitle = document.__lookupSetter__("title"); document.__proto__.__defineSetter__("title", function() {}); document.addEventListener("DOMContentLoaded", function(ev) {var title = getTitle.call(document); setInterval(function() { if (title != getTitle.call(document)) setTitle.call(document, title) }, 250); }, false);");
This worked and shows up in about:config
user_pref("noscript.surrogate.stickyTitle.sources", "@*");
But this statement does not show up.
user pref("noscript.surrogate.stickyTitle.replacement", "var getTitle = document.__lookupGetter__("title"); var setTitle = document.__lookupSetter__("title"); document.__proto__.__defineSetter__("title", function() {}); document.addEventListener("DOMContentLoaded", function(ev) {var title = getTitle.call(document); setInterval(function() { if (title != getTitle.call(document)) setTitle.call(document, title) }, 250); }, false);");
Is there an error in it? Can a statement go across multiple lines in USER.JS?
// Experimental for NoScript to block changing the page title
user_pref("noscript.surrogate.stickyTitle.sources", "@*");
user pref("noscript.surrogate.stickyTitle.replacement", "var getTitle = document.__lookupGetter__("title"); var setTitle = document.__lookupSetter__("title"); document.__proto__.__defineSetter__("title", function() {}); document.addEventListener("DOMContentLoaded", function(ev) {var title = getTitle.call(document); setInterval(function() { if (title != getTitle.call(document)) setTitle.call(document, title) }, 250); }, false);");
This worked and shows up in about:config
user_pref("noscript.surrogate.stickyTitle.sources", "@*");
But this statement does not show up.
user pref("noscript.surrogate.stickyTitle.replacement", "var getTitle = document.__lookupGetter__("title"); var setTitle = document.__lookupSetter__("title"); document.__proto__.__defineSetter__("title", function() {}); document.addEventListener("DOMContentLoaded", function(ev) {var title = getTitle.call(document); setInterval(function() { if (title != getTitle.call(document)) setTitle.call(document, title) }, 250); }, false);");
Is there an error in it? Can a statement go across multiple lines in USER.JS?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 FlyPaper/RC1 (.NET CLR 3.5.30729)
Re: A New Type of Phishing Attack
Try these:
Appears you need to double-quote the quotes (except for the first & last each of the name & value).
Wrong! That's not it either? Tried escaping them, tried double-quoting them, but neither is working?
I've got no clue
Code: Select all
user_pref("noscript.surrogate.stickyTitle.sources", "@*");
Code: Select all
user pref("noscript.surrogate.stickyTitle.replacement", "var getTitle = document.__lookupGetter__("""title"""); var setTitle = document.__lookupSetter__("""title"""); document.__proto__.__defineSetter__("""title""", function() {}); document.addEventListener("""DOMContentLoaded""", function(ev) {var title = getTitle.call(document); setInterval(function() { if (title != getTitle.call(document)) setTitle.call(document, title) }, 250); }, false);");
Wrong! That's not it either? Tried escaping them, tried double-quoting them, but neither is working?
I've got no clue

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.3a5pre) Gecko/20100519 SeaMonkey/2.1a2pre
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: A New Type of Phishing Attack
Firefox Options|Advanced|Accessibility|Warn me when web sites try to redirect or reload the pageAlan Baxter wrote:http://krebsonsecurity.com/2010/05/devi ... gets-tabs/Giorgio Maone wrote:As pointed out by Brian Krebs, NoScript does block this kind of attack.The proof-of-concept works on my NoScript test profile with default NS settings.Update, May 25, 7:55 p.m. ET: Researcher Aviv Raff has posted an interesting proof-of-concept of his own that shows how this attack can work against Firefox even when users have the Noscript add-on installed and in full paranoid mode. Raff crafted his page, which is a mock up of this blog post, to morph into an image of the Gmail login page, and it will reload every 20 seconds but will only change to the sample phish page if you move to another tab with your mouse, or after 10 reloads (in case you moved with the keyboard). So it will change only after 3 minutes or so, unless you move to another tab with your mouse.
“I was trying to find a way to work around the javascript need for the [proof-of-concept],” Raff said in an instant message. “First I was able to do this without knowing if the user moved to a new tab. Now I can almost be sure of that.”
@therube:
JavaScript string literals escape double quotes by prepending a backslash. You can either do this or replace them with a single quote:
Code: Select all
user pref("noscript.surrogate.stickyTitle.replacement", "var getTitle = document.__lookupGetter__(\"title\"); var setTitle = document.__lookupSetter__(\"title\"); document.__proto__.__defineSetter__(\"title\", function() {}); document.addEventListener(\"DOMContentLoaded\", function(ev) {var title = getTitle.call(document); setInterval(function() { if (title != getTitle.call(document)) setTitle.call(document, title) }, 250); }, false);");
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: A New Type of Phishing Attack
On a side note, as I just said in a commend I dropped on Brian's blog, in next version I'll probably implement a feature to block meta refreshes which are about to happen in hidden tabs.
This will prevent Aviv's variant from working, while keeping meta refresh functionality where needed.
This will prevent Aviv's variant from working, while keeping meta refresh functionality where needed.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
Re: A New Type of Phishing Attack
This doesn't work for me. I changed the setting to WARN on, restarted FF. DID NOT get any warning when the sample page was switched to GMail overlay.Giorgio Maone wrote: Firefox Options|Advanced|Accessibility|Warn me when web sites try to redirect or reload the page
EDIT:
But what I did get is a warning when after making this post, you wanted to redirect me back to the original thread!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 FlyPaper/RC1 (.NET CLR 3.5.30729)
Re: A New Type of Phishing Attack
Yes I tried that first, doing it just as you, preserving the quotes that shouldn't be escaped.JavaScript string literals escape double quotes by prepending a backslash.
But ... it does not work when entered into user.js.
I tried removing the "__"
AHHH!
I KNEW there had to be a typo. And I looked & I looked & I compared & I ...
Code: Select all
user_pref(
Code: Select all
user pref(
(You wouldn't believe how many times I looked at it, & how many different scenarios I tried, & I KNEW it had to be a typo!)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.9) Gecko/20100317 SeaMonkey/2.0.4