This was forwarded to me by a friend in my office. Just one more thing to look 
out for:
 
This is an honest serious threat and it happened to me last night on my home 
computer. I clicked on one of my "favorite" sites - Bank of America - to check 
if a check had cleared. I used that favorite just a couple of hours earlier. 
Everything went right until they said it did not recognize my computer and I 
had the wrong password. It then asked me to answer a security question. I could 
not so it referred me to a page to change my password. I did that but then it 
asked for a whole lot more information that I knew Bank of America would not 
ask for - account number, security code, etc. I backed out of it and went to 
the real Bank of America site via another method. Then went back to see if the 
book mark was still compromised and it was not. So this is another thing we 
really do have to keep an eye out for when on line.The article is a bit long 
but important if you do much on line. Web Surfers Face Dangerous New Threat: 
'Clickjacking'  Frederick Lane, newsfactor.comWed Oct 8, 4:47 PM ETInternet and 
Web browser security experts are sounding the alarm about a new type of 
malicious attack called "clickjacking," a technique that can be used to dupe 
Web surfers into revealing confidential information while clicking on seemingly 
innocuous Web pages. Among other things, a clickjacking attack can be used to 
take control of a computer's Webcam and microphone without the knowledge of the 
user. Clickjacking has been identified as a vulnerability for the Adobe Flash 
player, as well as for every major browser, including Firefox, Internet 
Explorer, Opera, Safari and even the newly released Google Chrome."It is a very 
serious problem," said Giorgio Maone, the author of a widely praised free 
Firefox extension called NoScript, which blocks potentially malicious scripts 
from running in the Firefox browser."Clickjacking is a very simple attack to 
build, and now that the details are out, any script kid can try it 
successfully," Maone warned. "There's no estimate to the number of trap sites, 
and it's unlikely that we will see any credible report about the number of 
sites using this technique, because there are literally infinite ways to 
implement such an attack, therefore no signature-based scanning can detect it 
automatically."Unauthorized Access to InformationThe growing severity of the 
clickjacking problem was identified by Robert Hansen, CEO of SecTheory, and 
Jeremiah Grossman, CTO of WhiteHat Security. The two were scheduled to speak 
publicly about their discovery last month at the Open Web Application Security 
Project NYC AppSec conference in New York, but postponed their talk in order to 
give Adobe and browser companies a chance to come up with a solution.Reacting 
quickly to the announcement, Adobe released a security advisory Tuesday, 
describing the threat as "critical" and instructing users on how to turn off 
Flash access to cameras and microphones."We have just posted a Security 
Advisory for Flash Player," wrote David Lenoe, Adobe's security program 
manager, on the Adobe security blog, "in response to recently published reports 
of a 'clickjacking' issue in multiple Web browsers that could allow an attacker 
to lure a Web browser user into unknowingly clicking on a link or dialog. This 
potential 'clickjacking' browser issue affects Adobe Flash Player's microphone 
and camera access dialog." Lenoe said a patch for Flash would be ready by the 
end of October.Unfortunately, as Hansen and other researchers have pointed out 
repeatedly, Flash clickjacking is only one of the variants of this problem. In 
a lengthy blog posting about the issue, Hansen said that "there are multiple 
variants of clickjacking. Some of it requires cross-domain access, some don't. 
Some overlay entire pages over a page, some use iframes to get you to click on 
one spot. Some require JavaScript, some don't. Some variants use CSRF to 
preload data in forms, some don't. Clickjacking does not cover any one of these 
use cases, but rather all of them."A Structural Problem of the WebHansen warned 
that it will be challenging to come up with a comprehensive solution to prevent 
the clickjack threat because of the nature of the code that underlies the 
Internet.Maone agreed. "This problem comes from features which are integral to 
the modern Web as we know it," he said, "and especially from the ability of Web 
pages to embed arbitrary content from different sites, or to host little 
applications (applets) through plug-ins like Adobe Flash, Java or Microsoft 
Silverlight."Maone predicted that a general browser fix won't be developed any 
time soon, since the real solution lies in developing a general consensus about 
changing existing Web standards in the various Internet standardization groups.

Reply via email to