A New Type of Phishing Attack

Bug reports and enhancement requests
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: A New Type of Phishing Attack

Post by Giorgio Maone »

Jojo999 wrote:I'm lost and don't understand what I am supposed to set/enable to block this problem in 1.9.9.81.
You don't need to do anything. It's enabled by default.
Jim Too wrote:I don't see any difference between 1.9.9.80 and 1.9.9.81
If I open http://www.azarask.in/blog/post/a-new-t ... ng-attack/
There's no difference on Aza's page.
Aviv Raff, however, had produced a PoC which doesn't need JavaScript, see the Update on the bottom of http://krebsonsecurity.com/2010/05/devi ... gets-tabs/.
1.9.9.81 block this scriptless technique as well.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
User avatar
GµårÐïåñ
Lieutenant Colonel
Posts: 3370
Joined: Fri Mar 20, 2009 5:19 am
Location: PST - USA
Contact:

Re: A New Type of Phishing Attack

Post by GµårÐïåñ »

As stated before, let me be more clear, it works just fine and blocks both types of attacks in the latest package right out of the box without the need to do anything special. If you allow a script on the site, then duh, its going to run and there isn't much responsibility on NoScript to block it when you have allowed it - so simply put, yeah its expected behavior. As for the non-script CSS one, again, if you pay attention, you will see the warning right on the top, very clear and gives you a choice to proceed or not - so simply put, don't click on "follow redirection" and you are fine. Anything still unclear?
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
xloko12
Posts: 1
Joined: Sat Aug 01, 2009 2:42 am

Re: A New Type of Phishing Attack

Post by xloko12 »

Ok, exercises:

1 go to http://www.azarask.in/blog/post/a-new-t ... ng-attack/
2 allow azarask.in
3 click a other tab or tabs, wait a few seconds.... ---- nothing happen
now
do this
click aza.., click in others tab or tabs, click aza..., click in others tab or tabs. well wait wait .. tatan magic :o
appears a fake gmail in tab.
what happens? noscript. :?
Mozilla/5.0 (Windows; U; Windows NT 5.1; es-AR; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
User avatar
GµårÐïåñ
Lieutenant Colonel
Posts: 3370
Joined: Fri Mar 20, 2009 5:19 am
Location: PST - USA
Contact:

Re: A New Type of Phishing Attack

Post by GµårÐïåñ »

I actually followed your steps, and once allowed, changing to another tap, shortly afterward it changes the tab title and makes the fake Gmail, so not sure what's going on with your installation and again allowing the script, the results are expected and correct. I strongly believe you are getting a different result because of something else at play.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
Jojo999
Senior Member
Posts: 147
Joined: Mon Jun 01, 2009 3:54 am

Re: A New Type of Phishing Attack

Post by Jojo999 »

GµårÐïåñ wrote:As stated before, let me be more clear, it works just fine and blocks both types of attacks in the latest package right out of the box without the need to do anything special. If you allow a script on the site, then duh, its going to run and there isn't much responsibility on NoScript to block it when you have allowed it - so simply put, yeah its expected behavior.
If I DON'T allow a script to run, then in many cases, I don't see any content on the page. So I am going to allow the script to run, otherwise, I would be staring at little or nothing.

What is needed (was hoped for) is for NS to recognize when a script like this is bad and whether certain parts or all of it should not be allowed. If this is not technically possible, then so be it. But then there is nothing that can be done about this type of attack other than for the user to pay attention to the Address line.
GµårÐïåñ wrote:As for the non-script CSS one, again, if you pay attention, you will see the warning right on the top, very clear and gives you a choice to proceed or not - so simply put, don't click on "follow redirection" and you are fine. Anything still unclear?
Same issue with the CSS mod. When I see one of those, I nearly always click allow unless if I am on what I think is a safe site. Most users have no way of knowing if these things are safe or not. This is also why so many users get in trouble with firewalls. Most don't understand what they should or should not allow, so they just click yes to everything.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 FlyPaper/RC1 (.NET CLR 3.5.30729)
User avatar
GµårÐïåñ
Lieutenant Colonel
Posts: 3370
Joined: Fri Mar 20, 2009 5:19 am
Location: PST - USA
Contact:

Re: A New Type of Phishing Attack

Post by GµårÐïåñ »

Jojo999 wrote:If I DON'T allow a script to run, then in many cases, I don't see any content on the page. So I am going to allow the script to run, otherwise, I would be staring at little or nothing.
That's when you need to use either sandbox and try it and see or better yet, add RequestPolicy to the mix and a nifty ABE rule that will keep you isolated and safe in case something makes it past you. There is no magic bullet here and any product that promises you that, you should truly be suspicious of it, because its a snake oil. The fact is that NoScript goes as far as possible using code logic, human adapted logic and a dedicated person like Giorgio who busts his ass to keep it as up to date as possible and nabbing anything in the works, however minor, to make it as safe as possible. hell several times while the world was caught with their pants down, the NS users were just fine, because Giorgio already implemented it when he was made aware of it and didn't wait for the rest of the world to fix it.
What is needed (was hoped for) is for NS to recognize when a script like this is bad and whether certain parts or all of it should not be allowed. If this is not technically possible, then so be it. But then there is nothing that can be done about this type of attack other than for the user to pay attention to the Address line.
How do you propose that NoScript make that very human and very subjective diagnosis for you? Think about it, have you ever seen TWO programmers writing their crap the same way? let alone the entire web? How is a program supposed to evaluate a code for being "bad". There is nothing more than a code logic (logic AI) and what you are asking requires more than that. What you are asking for at this time is pure fiction. 20+ years on the internet (before it was even the shiny crap it is today) and I have NEVER EVER been pawnd, or phished, or hacked, or anything, its ridiculous how complacent and incapable most of the user base really is. The reason I have not been affected is because I never "set it and forget it" as most of the solutions out there advertise and people buy into it hook line and sinker until they are screwed then they whine. I do intrusion and malware testing for a living and I do all that on my OWN computer, on the SAME profile I use for the rest of my web access, even my banking and all that, not once had an issue. I mean does it kill anyone to check? I went to the link and even when I did allow it and it showed up with the fake Gmail page, nothing and I mean NOTHING showed up because my RequestPolicy nailed the cross domain reference that was allowed to slip through because the script was allowed. Now is it a pain in the ass to browse the web, hell yah, but consider the alternative and decide what's more important to you, form or function? NoScript is as close to BOTH as you are going to get, so if you find a better solution, please by all means enlighten us.
Same issue with the CSS mod. When I see one of those, I nearly always click allow unless if I am on what I think is a safe site. Most users have no way of knowing if these things are safe or not. This is also why so many users get in trouble with firewalls. Most don't understand what they should or should not allow, so they just click yes to everything.
Well those who take the time and learn, do well and those who sit back and say its too hard to understand and difficult this and that, are the ones who get pawnd, what's new? I say take a day, a week, a month and put your system through rigorous and step by step processing and THEN what you do normally will be fine and what suddenly jumps out at you, you know to take a second look at. There is no magic here people, its called being vigilant.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
tlu
Senior Member
Posts: 129
Joined: Fri Jun 05, 2009 8:01 pm

Re: A New Type of Phishing Attack

Post by tlu »

xloko12 wrote:Ok, exercises:

1 go to http://www.azarask.in/blog/post/a-new-t ... ng-attack/
2 allow azarask.in
3 click a other tab or tabs, wait a few seconds.... ---- nothing happen
now
do this
click aza.., click in others tab or tabs, click aza..., click in others tab or tabs. well wait wait .. tatan magic :o
appears a fake gmail in tab.
Same here. If scripts for azarask.in are blocked nothing happens. If I allow them and click another tab, the fake GMail appears regardless if noscript.forbidBGRefresh is set to 1 or 3. Using 1.9.9.81.
Mozilla/5.0 (X11; U; Linux i686; de-DE; rv:1.9.2.5pre) Gecko/20100527 Linux Mint/9 (Isadora) Namoroka/3.6.5pre
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: A New Type of Phishing Attack

Post by Giorgio Maone »

tlu wrote: Same here. If scripts for azarask.in are blocked nothing happens. If I allow them and click another tab, the fake GMail appears regardless if noscript.forbidBGRefresh is set to 1 or 3. Using 1.9.9.81.
This is totally expected.
Aza's JavaScript-based "attack" doesn't use page refreshes (it changes the page content, the title and the favicon dynamically with no reload).
1.9.9.81 gives protection against the scriptless variants, which use page refreshes.
Once you allow JavaScript on a page, given the infinite ways you can morph or redirect a page using scripts, it's game over anyway.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
tlu
Senior Member
Posts: 129
Joined: Fri Jun 05, 2009 8:01 pm

Re: A New Type of Phishing Attack

Post by tlu »

Giorgio Maone wrote:
tlu wrote: Same here. If scripts for azarask.in are blocked nothing happens. If I allow them and click another tab, the fake GMail appears regardless if noscript.forbidBGRefresh is set to 1 or 3. Using 1.9.9.81.
This is totally expected.
Aza's JavaScript-based "attack" doesn't use page refreshes (it changes the page content, the title and the favicon dynamically with no reload).
1.9.9.81 gives protection against the scriptless variants, which use page refreshes.
Once you allow JavaScript on a page, given the infinite ways you can morph or redirect a page using scripts, it's game over anyway.
Ah, sorry, this must have escaped my attention. :oops: Now understood.
Mozilla/5.0 (X11; U; Linux i686; de-DE; rv:1.9.2.5pre) Gecko/20100528 Linux Mint/9 (Isadora) Namoroka/3.6.5pre
User avatar
GµårÐïåñ
Lieutenant Colonel
Posts: 3370
Joined: Fri Mar 20, 2009 5:19 am
Location: PST - USA
Contact:

Re: A New Type of Phishing Attack

Post by GµårÐïåñ »

tlu wrote:Ah, sorry, this must have escaped my attention. :oops: Now understood.
It happens. I stated it earlier and several times but still I guess I wasn't clear.
GµårÐïåñ wrote:... and again allowing the script, the results are expected and correct. ...
GµårÐïåñ wrote:... If you allow a script on the site, then duh, its going to run and there isn't much responsibility on NoScript to block it when you have allowed it - so simply put, yeah its expected behavior. ...
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
polonus
Posts: 1
Joined: Thu Sep 06, 2012 1:36 pm

Re: A New Type of Phishing Attack

Post by polonus »

Hi Giorgio Maone,

Couldn't there be brought in a kind of uri sanitizing into NoScript like

Code: Select all

 >>> sanitizer = HTMLSanitizer()
>>> sanitizer.is_safe_uri('http://example.org/')
True
>>> sanitizer.is_safe_uri('javascript:alert(document.cookie)')
False 
I think here of an implementation of data stream filters,

polonus
Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
Post Reply