Interesting Phishing Concept Tabjacking

Here’s another thing to be on the lookout for …

By now most Internet users know what phishing stands for, or so they think. If you ask them to define phishing most will likely mention that it is about fake emails links that lead to look-a-like copies of popular websites. What most users do not know that their definition of phishing is not entirely correct. Phishing, which stands for Password fISHING, is not exclusive to email. The term hints at that little known fact. Phishing can occur everywhere including Instant Messengers, forums, by social engineering and on plain websites.

Aza Raskin just posted an interesting article on his blog detailing a new phishing attack that he calls Tabjacking. The concept of this new attack is ingenious.

It basically refers to a website that is changing its look and feels to a fake website after some time of inactivity. Here is how it works.

The web user visits a harmless looking site and decides to keep it open in a tab for now. A JavaScript code on the page notices that and replaces the site’s favicon and title with a popular site. This could be Facebook, Gmail or any other popular website that the user likely uses.

The website itself will also change its contents so that it looks like the website that the attacker wants to steal login credentials for.

Many users identify websites in tabs by their favicon and title. This could lead to the user believing that the site is indeed the real website. Clicking on the tab displays what the user expects to see as the copy looks exactly like the original.

For Gmail it would for instance be the Gmail login form. Users who enter their login credentials into the form will send them right to the attacker. The script on the website will redirect the user to the real website in the end.

A New Type of Phishing Attack from Aza Raskin on Vimeo.

There are obviously a few aspects where users can identify the attack. The url for instance will not reflect the website that is displayed to the user. It is also likely that the site will not make use of https.

Take a look at Aza’s blog post for additional information about the attack including codes, fixes and lots of user comments.

© Martin for gHacks technology news, 2010. | Permalink | Add to, digg, facebook, reddit, twitter
Post tags: , , , , ,

Link to Original Content

Western Telematic, Inc. (WTI) designs and manufactures remote device management products for IT applications. WTI’s Serial Console Server products, Remote Reboot products, Switched PDU products and A/B Fallback products are engineered to allow you to securely manage and troubleshoot rack equipment in remote locations.

Tags: , , ,

Comments are closed.