[CGUYS] Gmail accounts hacked via unpatched hole

2009-04-23 Thread Richard P.
In today's Windows Secrets article:

http://WindowsSecrets.com/comp/090423

It looks like online storage isn't as safe as it's cracked up to be.

Richard P.


Gmail accounts hacked via unpatched hole

Scott Spanbauer By Scott Spanbauer

Exploits allowing hackers to break into Gmail accounts are likely to
occur, if they're not already circulating, after security researchers
released details of a hole that Google has reportedly declined to
patch.

There are steps you can take to reduce the risk of using a webmail
account, but it appears that the usual tricks won't solve the Gmail
problem until Google fixes the software.

The weakness that researchers say afflicts Gmail, a free e-mail
service hosted by Google, belongs to a class of attacks known as
cross-site request forgery (CSRF, pronounced sea surf).

Besides Gmail, CSRF holes affecting YouTube, Netflix, and NYTimes.com
have also been found and repaired in the past. CSRF attacks use
security flaws in cookies, password requests, and other interactive
Web components to intercept communications between your browser and a
Web site's server.

The first report of the Gmail problem within security circles was
written by Vicente Aguilera Díaz of Internet Security Auditors (ISA)
on July 30, 2007. The next day, ISA issued an alert and included a
proof of concept illustrating how the exploit could be used to change
a Gmail account password.

After more than a year during which, according to ISA, Google was
repeatedly contacted privately about the problem researchers publicly
released a detailed description of the exploit on March 3, 2009,
according to a Secure Computing article.

The magazine quoted an unnamed Google spokesman as saying, We've been
aware of this report for some time, and we do not consider this case
to be a significant vulnerability, since a successful exploit would
require correctly guessing a user's password within the period that
the user is visiting a potential attacker's site.

Considering that an automated attack can test thousands of passwords
in a matter of seconds, you might not be very reassured by Google's
position. Many PC users select weak passwords that consist of common
names or dictionary words, leaving them susceptible to brute-force
discovery. And the general release of the CSRF technique makes it easy
for hackers to write opportunistic code, if actual exploits aren't
already in the wild.

The March 3 public disclosure should not be confused with an earlier
Gmail CSRF flaw that was first reported on Jan. 1, 2007. Google
repaired that problem by the following day, according to a blog post
by software consultant Hari Gottipati.

CSRF attacks — which are also referred to as session-riding — are
different from the more-widely known cross-site scripting (XSS)
exploits. XSS holes allow a malicious Web site that's open in one
browser window to inject JavaScript into another site's page that's
open in a separate window or tab. Once the unwanted script is running
on a PC, the code can try to collect private data and passwords and
transmit them back to the attacker's server.

XSS vulnerabilities have recently been discovered and patched in many
browsers and on many sites, including Yahoo Mail and Hotmail as well
as Gmail.

Provide some protection for webmail with https

Google, Yahoo, and other Internet services cover themselves by stating
that you use the services at your own risk. A major threat of using
any webmail service is that a hacker could swipe or guess your
password and take over your account.

If your Google account includes such personal information as stored
credit card numbers (for Google Shopping, for instance), a contact
list, photos, and business or financial documents, having your account
hacked could be more than just an inconvenience.

One way for an attacker to steal passwords — especially given the
ubiquity of open, unencrypted Wi-Fi networks — is to use software that
sniffs Internet traffic. If you enter your username and password on
a Web page without encryption, your inputs are transmitted as plain
text, not just over a Wi-Fi connection but also through every router
that happens to be located between you and the service's machine.

Fortunately, the Big Three webmail services — Gmail, Yahoo Mail, and
Hotmail — and many other Web sites provide protection for their
sign-in sessions using Secure Sockets Layer (SSL) encryption. SSL
enables a Web browser to scramble any sign-in data before pumping it
out naked across the Internet's plumbing.

To determine whether a site encrypts its sign-in procedure, look in
your browser's address bar. The page's URL should begins with https
(Hypertext Transfer Protocol over SSL), as shown in Figure 1.
Unencrypted pages use the http protocol.

Secure https connection to Gmail
Figure 1. Look for the https protocol in a browser's address bar,
which indicates an encrypted connection.

Seeing the https protocol or the well-known lock icon in a browser's
status bar is no guarantee that a 

Re: [CGUYS] Gmail accounts hacked via unpatched hole

2009-04-23 Thread Tony B
Oh, I'm not sure that's the lesson here. Anyone with a great need for
security already understands hacks like XSS and CSRF. Throwing out the
baby with the bathwater and going back to POP or IMAP is hardly a
solution. Like suggesting that because cars are dangerous we should
all go back to horses.

What actually surprised me was the revelation that neither Hotmail nor
Yahoo have settings to always use https. My wife uses Yahoo and I've
just always sort of assumed it was using https.


On Thu, Apr 23, 2009 at 7:12 AM, Richard P. richs...@gmail.com wrote:
 In today's Windows Secrets article:

 http://WindowsSecrets.com/comp/090423

 It looks like online storage isn't as safe as it's cracked up to be.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*