{"id":286777,"date":"2017-01-21T13:14:26","date_gmt":"2017-01-21T19:14:26","guid":{"rendered":"http:\/\/itblog.lcisd.net\/?p=286777"},"modified":"2017-01-21T13:14:26","modified_gmt":"2017-01-21T19:14:26","slug":"wide-impact-highly-effective-gmail-phishing-technique-being-exploited","status":"publish","type":"post","link":"https:\/\/itblog.lcisd.net\/?p=286777","title":{"rendered":"Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited"},"content":{"rendered":"<p>From\u00a0 <a href=\"https:\/\/www.wordfence.com\/blog\/2017\/01\/gmail-phishing-data-uri\/\">www.wordfence.com<\/a><\/p>\n<p>This entry was posted on January 12, 2017 by <a href=\"https:\/\/www.wordfence.com\/blog\/author\/mark\/\">Mark Maunder<\/a><\/p>\n<p>As you know, at Wordfence we occasionally send out alerts about security issues outside of the WordPress universe\u00a0that are urgent and have a wide impact on our customers and readers. Unfortunately this is one of those alerts. There is a highly effective phishing technique stealing login credentials that is having a wide impact, even on experienced technical users.<\/p>\n<p>I have written this post to be as easy to read and understand as possible. I deliberately left out technical details and focused on what you need to know to protect yourself against this phishing attack and other attacks like it in the hope of getting the word out, particularly among less technical users. Please share this once you have read it to help create awareness and protect the community.<\/p>\n<h1>The\u00a0Phishing Attack: What you need to know<\/h1>\n<p>A new highly effective phishing technique targeting Gmail and other services has been gaining popularity during the past year among attackers. Over\u00a0the past few weeks there have been reports of experienced technical users being hit by this.<\/p>\n<p>This attack is\u00a0currently being used to target Gmail\u00a0customers and is also targeting other services.<\/p>\n<p>The way the attack\u00a0works is that an attacker will send an email to your Gmail account. That email may come from someone you know who has had their account hacked using this technique. It may also include something that looks like an image of an attachment you recognize from the sender.<\/p>\n<p>You click on the image, expecting Gmail to give you a preview of the attachment. Instead, a new tab opens up and you are prompted by Gmail\u00a0to sign in again. You glance at the location bar and you see\u00a0<strong>accounts.google.com<\/strong> in there. It looks like this\u2026.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16251\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png 526w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-150x14.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-300x28.png 300w\" alt=\"\" width=\"526\" height=\"49\" \/><\/p>\n<p>You go ahead and sign in on a fully functional sign-in page that looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16252\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page.png\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page.png 472w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page-129x150.png 129w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page-258x300.png 258w\" alt=\"GMail data URI phishing sign-in page\" width=\"472\" height=\"548\" \/><\/p>\n<p>Once you complete\u00a0sign-in, your account has been compromised.\u00a0A <a href=\"https:\/\/news.ycombinator.com\/item?id=13373327\" target=\"_blank\">commenter on Hacker News<\/a> describes in clear terms what they experienced over the holiday break once they signed in to the fake page:<\/p>\n<p>\u201c<em>The attackers log in to your account immediately once they get the credentials, and they use one of your actual attachments, along with one of your actual subject lines, and send it to people in your contact list.<\/em><\/p>\n<p><em>For example, they went into one student\u2019s account, pulled an attachment with an athletic team practice schedule, generated the screenshot, and then paired that with a subject line that was tangentially related, and emailed it to the other members of the athletic team.<\/em>\u201d<\/p>\n<p>The attackers signing into your account happens very quickly. It may be automated or they may have a team standing by to process accounts as they are compromised.<\/p>\n<p>Once they have access to your account, the\u00a0attacker also has full access to all your emails including sent and received at this point and may\u00a0download the whole lot.<\/p>\n<p>Now that they control your email address, they could also compromise a wide variety of other services that you use by using the password reset mechanism\u00a0including other email accounts, any SaaS services\u00a0you use and much more.<\/p>\n<p>What I have described above is a phishing attack that is used to steal usernames and passwords on Gmail. It is being used right now with a high success rate. However, this technique can be used to steal credentials from many other platforms with many variations in the basic technique.<\/p>\n<h1>How to protect yourself against this phishing attack<\/h1>\n<p>You have always been told: \u201c<em>Check the location bar in your browser to make sure you are on the correct website before signing in. That will avoid phishing attacks that steal your username and password.\u201d<\/em><\/p>\n<p>In the attack above, you did exactly that and saw\u00a0\u2018<strong>accounts.google.com<\/strong>\u2018 in the location bar, so you went ahead and signed in.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16251\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png 526w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-150x14.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-300x28.png 300w\" alt=\"\" width=\"526\" height=\"49\" \/><\/p>\n<p>To protect yourself against this you need to <strong>change\u00a0what you are checking<\/strong> in the location bar.<\/p>\n<p>This phishing technique uses something called a \u2018data URI\u2019 to include a complete file in the browser location bar. When you glance up at the browser location bar and see \u2018data:text\/html\u2026..\u2019 that is actually a very long string of text. If you widen out the location bar it looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16254\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script.png\" sizes=\"auto, (max-width: 1764px) 100vw, 1764px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script.png 1764w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script-150x10.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script-300x20.png 300w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script-1024x70.png 1024w\" alt=\"GMail phishing data uri showing script\" width=\"1764\" height=\"120\" \/><\/p>\n<p>There is a lot of whitespace which I have removed. But on the far right you can see the beginning of what is a very large chunk of text. This is actually a file that opens in a new tab and creates a completely functional fake Gmail login page which sends your credentials to the attacker.<\/p>\n<p>As you can see on the far left of the browser location bar, instead of \u2018https\u2019 you have \u2018data:text\/html,\u2019 followed by the usual \u2018https:\/\/accounts.google.com\u2026.\u2019. If you aren\u2019t paying close attention you will ignore the \u2018data:text\/html\u2019 preamble and assume the URL is safe.<\/p>\n<p><strong>You are probably thinking you\u2019re too smart to fall for this<\/strong>. It turns out that this attack has caught, or almost caught several technical users who have either\u00a0<a href=\"https:\/\/twitter.com\/tomscott\/status\/812265182646927361\">tweeted<\/a>,\u00a0<a href=\"http:\/\/blog.greggman.com\/blog\/getting-phished\/\" target=\"_blank\">blogged<\/a>\u00a0or <a href=\"https:\/\/news.ycombinator.com\/item?id=13373327\" target=\"_blank\">commented<\/a> about it. \u00a0There is a specific reason why this is so effective that has to do with human perception. I describe that in the next section.<\/p>\n<h2>How to protect yourself<\/h2>\n<p>When you sign in to any service, check the browser location bar and <strong>verify the protocol, then verify the hostname.\u00a0<\/strong>It should look like this in Chrome when signing into Gmail or Google:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16255\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png 778w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-150x15.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-300x29.png 300w\" alt=\"Gmail phishing secure URI example\" width=\"778\" height=\"76\" \/><\/p>\n<p>Make sure there is nothing before the hostname \u2018accounts.google.com\u2019 other than \u2018https:\/\/\u2019 and the lock symbol. You should also take special note of the green color and lock symbol that appears on the left. <strong>If you can\u2019t verify the protocol and verify the hostname, stop<\/strong> and consider what you just clicked on to get to that sign-in page.<\/p>\n<p><strong>Enable two factor authentication\u00a0<\/strong>if it is available on every\u00a0service that you\u00a0use. GMail calls this \u201c2- step verification\u201d and you can <a href=\"https:\/\/www.google.com\/landing\/2step\/\" target=\"_blank\">find out how to enable it on this page<\/a>.<\/p>\n<p>Enabling two factor authentication makes it much more difficult for an attacker to\u00a0sign into a service that you use, even if they manage to steal your password using this technique. I would like to note that there <a href=\"https:\/\/news.ycombinator.com\/item?id=13373562\" target=\"_blank\">is some discussion<\/a> that indicates even two factor authentication may not protect against this attack. However I have not seen a proof of concept, so I can not confirm this.<\/p>\n<h1>Why Google won\u2019t fix this and what they should do<\/h1>\n<p><a href=\"https:\/\/gist.github.com\/timruffles\/5c76d2b61c88188e77f6#gistcomment-1968194\" target=\"_blank\">Google\u2019s response<\/a> to a customer asking about this was as follows:<\/p>\n<p><em>\u201cThe address bar remains one of the few trusted UI components of the browsers and is the only one that can be relied upon as to what origin are the users currently visiting. If the users pay no attention to the address bar, phishing and spoofing attack are \u2013 obviously \u2013 trivial. Unfortunately that\u2019s how the web works, and any fix that would to try to e.g. detect phishing pages based on their look would be easily bypassable in hundreds of ways. The data: URL part here is not that important as you could have a phishing on any http[s] page just as well.\u201d<\/em><\/p>\n<p>This is likely a junior person within the organization based on the grammatical errors. I disagree with this response for a few reasons:<\/p>\n<p>Google have modified the behavior of the address bar in the past to show a green protocol color when a page is using HTTPS and a lock icon to indicate it is secure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16255\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png 778w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-150x15.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-300x29.png 300w\" alt=\"Gmail phishing secure URI example\" width=\"778\" height=\"76\" \/><\/p>\n<p>They also use a different way of displaying the protocol\u00a0when a page is insecure, marking it red with a line through it:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16257\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning.png\" sizes=\"auto, (max-width: 382px) 100vw, 382px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning.png 382w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning-150x29.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning-300x58.png 300w\" alt=\"\" width=\"382\" height=\"74\" \/><\/p>\n<p>During this attack, a user sees neither green nor red. They see ordinary black text:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16251\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png 526w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-150x14.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-300x28.png 300w\" alt=\"\" width=\"526\" height=\"49\" \/><\/p>\n<p>That is why this attack is so effective.\u00a0In user interface design and in human perception, <em>elements that are connected by uniform visual properties are perceived as being more related than elements that are not connected.\u00a0<\/em>[Read more:\u00a0<a href=\"http:\/\/www.andyrutledge.com\/gestalt-principles-3.php\" target=\"_blank\">Gestalt principles of human perception and \u2018uniform connectedness\u2019<\/a>\u00a0and <a href=\"https:\/\/www.cxpartners.co.uk\/our-thinking\/content_blind_spots_-_thoughts_from_a_usability_test\/\" target=\"_blank\">Content Blindspots<\/a>]<\/p>\n<p><em>\u00a0<\/em>In this case the \u2018data:text\/html\u2019 and the trusted hostname\u00a0are the same color. That suggests to our perception that they\u2019re related and the \u2018data:text\/html\u2019 part either doesn\u2019t matter or can be trusted.<\/p>\n<p>What Google needs to do in this case is change the way \u2018data:text\/html\u2019 is displayed in the browser. There may be scenarios where this is safe, so they could use an amber color with a unique icon. That would alert our perception to a difference and we would examine it more closely.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From\u00a0 www.wordfence.com This entry was posted on January 12, 2017 by Mark Maunder As you know, at Wordfence we occasionally send out alerts about security issues outside of the WordPress universe\u00a0that are urgent and have a wide impact on our<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,13,6,37],"tags":[],"class_list":["post-286777","post","type-post","status-publish","format-standard","hentry","category-browsers","category-email","category-security","category-social-networking"],"_links":{"self":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/286777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=286777"}],"version-history":[{"count":3,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/286777\/revisions"}],"predecessor-version":[{"id":286780,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/posts\/286777\/revisions\/286780"}],"wp:attachment":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=286777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=286777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=286777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}