Membership is FREE, giving all registered users unlimited access to every Acorn Domains feature, resource, and tool! Optional membership upgrades unlock exclusive benefits like profile signatures with links, banner placements, appearances in the weekly newsletter, and much more - customized to your membership level!

New type of phishing scam

Status
Not open for further replies.
Boo hoo, I was going to reg that on Saturday coming up :(

I knew you would go for it because you use to do the 412 scam sites :)

I going to dev it ?

Google don't help with their ever changing backgrounds :mad:
 
I allways turn tabs off on my browsers, not for security, I just hate the things!
 
Sorry Doodle, saw the term and thought it would fit with my other fraud advice sites, stuck a little 2 pager of basic info on it for now www.tabnapping.co.uk

NP mate, you already have scam sites so you can give it TLC

Good news for you, Yahoo trends yesterday had tab napping at number 6 :cool:

ps, how about domain napping :lol:
 
Tab Napping is nonsense.

For it to happen you must have a trojan already, its just something a few people who have had trojans have fallen for.

Obviously a low news day for the scare mongering fools on the news desks.

Great domain though :)
 
@ Caz, it's doesnt require the user to have downloaded a trojan or other virus, it works on javascript injected in to web pages:

Several industry reports this week have uncovered a so-called tab-napping attack – which works by using JavaScript to switch the destination page in a tab after a few seconds of inactivity, according to a report in the U.K.’s The Register.

“This might be done using attack script planted in an otherwise legitimate website, for example,” the report said.

“The potential attack might be customized using a surfer's browser history file,” Mozilla’s Aza Raskin warns on video clip.

“Using my CSS history miner you can detect which site a visitor uses and then attack that. For example, you can detect if a visitor is a Facebook user, Citibank user, Twitter user, etc, and then switch the page to the appropriate login screen and favicon on demand,” he explained.

Computerworld dubs the scam as a “new, incredibly sneaky identity-theft tactic.”

As an example, if you attempt to open a tab categorized as “Citibank” or “Facebook” – they may be fakes, Raskin told Computerworld. However, unbeknownst to the user, “they may not know that... so you enter your username and password to, you think, log in again.”

However, the same report also says that the scam is not in “active circulation,” but warns what to do to avoid becoming “tabnapped,” including the most fundamental tip: don't log-in on a tab that you haven't opened yourself.
 
Tab Napping is nonsense.

For it to happen you must have a trojan already, its just something a few people who have had trojans have fallen for.

Obviously a low news day for the scare mongering fools on the news desks.

Great domain though :)

Er ... no, and I'm not saying how it works, but it nearly happened to me a couple of months ago. I survived because it is a lot easier to apply the method on broadband, and I'm on a crummy (but more secure) dial-up connection.

You only need to leave a computer connected and unattended for about 15min and the blighters can steal your soul ...
 
Pleas explain how this works then crabfoot, as it does not seem plausable from what the so called industry reports are saying.

I see what systreg is saying, but the report contradicts itself.

If a new tab pops up then of course its a risk, but some reports say your own inactive tabs can be changed, and there is no simple way to do this. They seem to be saying one thing then another.

Or am I missing something?
 
@ Caz, there is a longer explanation about it in the post here:

http://www.techkings.org/computer-s...ser-tab-napping-phishing-tactic-surfaces.html

A Mozilla employee yesterday outlined a sly new attack tactic dubbed "tabnapping" that can dupe users into giving up passwords by secretly changing already-open browser tabs.

All of the major browsers on Windows and Mac OS X are vulnerable to the attack.

Aza Raskin, Firefox's creative lead, spelled out the scenario, which is striking in its assumption: Most people keep multiple tabs open, often for long periods.

Raskin's technique requires that identity thieves trick users into visiting a malicious or compromised site -- no problem in today's spam- and scam-infected online world. They can then use JavaScript to quietly change the contents and label of an open-but-not-active tab to resemble the log-in screen of a bank or credit card company or Amazon.com or Gmail.

"As the user scans their many open tabs, the favicon and title act as a strong visual cue -- memory is malleable and moldable and the user will most likely simply think they left a Gmail tab open," said Raskin, referring to his example of a spoofed Google Gmail log-in. "When they click back to the fake Gmail tab, they'll see the standard Gmail log-in page, assume they've been logged out, and provide their credentials to log in."

There's no need for the attacker to change the actual URL that shows in the browser's address bar, since the tactic banks on the trust that tabs can't suddenly mutate. "The attack preys on the perceived immutability of tabs," Raskin said.

Raskin also laid out several ways hackers could boost tabnapping's sneakiness, ranging from sniffing out sites that the victim actually visits -- put up a fake Facebook log-in, say, rather than simply betting that the user opens Gmail -- to changing the text on the bogus page. "You can mention that the session has timed out and the user needs to re-authenticate," Raskin said. "This happens often on bank Web sites, which makes them even more susceptible to this kind of attack."

Computerworld ran Raskin's proof-of-concept -- his blog post explaining the attack includes the necessary code -- and found that Chrome, Firefox, Opera and Safari in Mac OS X 10.6 all showed the fake Gmail tab and contents. In Windows XP, Chrome, Firefox, Internet Explorer and Opera did the same.

But some browsers were more susceptible than others. In both Windows and Mac OS X, for instance, Raskin's code changed only Firefox's "favicon," the small icon that typically shows a miniature site logo. In other browsers, the favicon for Raskin's blog remained, though the label and content was that of Gmail.

Google's Chrome seemed especially resilient to the tactic. On the Mac, Raskin's trick sometimes changed the tab, often did not. Computerworld was not able to nail down the specific situations when Chrome fell victim, however.

Raskin did not reply to questions about what steps Firefox and other browser makers might take to stymie such attacks. In his blog, Raskin touted ongoing work on a new username/password tool called "Account Manager" that is tentatively slated to show up in Firefox 4 , the ambitious upgrade Mozilla plans to release this November.

Andrew Storms, director of security operations at nCircle Security, doubted whether there is an easy fix. "I can't think of anything off hand that could be done," Storms said via instant message. "That's the part of the new dynamic nature of Web browsing. You can alter the look/feel of the experience for both good and bad."

Jerry Bryant, a group manager with the Microsoft Security Response Center (MSRC), said his team is looking into Raskin's claims, but hinted that Microsoft wouldn't be patching IE anytime soon. "I wouldn't classify this as a 'vulnerability' though," Bryant said in an e-mail answer to questions.

When Microsoft declines to name an issue a security vulnerability, it generally means that if a fix does come, it won't appear until a service pack or next major upgrade is released. In the case of Internet Explorer, that would be fffffIE9 , which remains in the early development stage.
 
Thanks systreg, but after reading it, I would still say its all hype.

So where does crabfoots especially on broadband come into it, sounded like there was some super port hack out there.

With things like TRUSTEER RAPPORT its highly unlikely that the sensible internet user will fall for these problems.

Probably a smaller threat and easier to handle than someone calling you up with a nigerian accent pretending he is ' Calling from your baaank'

Looking at who said it in that report, sounds like more scare mongering in the browser wars
 
Thanks systreg, but after reading it, I would still say its all hype.

So where does crabfoots especially on broadband come into it, sounded like there was some super port hack out there.

With things like TRUSTEER RAPPORT its highly unlikely that the sensible internet user will fall for these problems.

Probably a smaller threat and easier to handle than someone calling you up with a nigerian accent pretending he is ' Calling from your baaank'

Looking at who said it in that report, sounds like more scare mongering in the browser wars

This is a public forum. For every active member who reads a thread, there are ten others who cruise round picking up info for their own benefit, which is not always in the public interest. Just look at the number of "reads" on threads compared to the number of posts. Any one can join, you just need a valid email address, even if you are the bloke who wrote the Dark Invader virus and the world hates you.

That's why I'm not going to say any more about it, except that there are serious holes in some recent versions of Firefox.
Go ask your questions on the Black Hat Forum and see what they say.

LOL another brain picker!
 
Hi Crabfoot

yeah I see what your saying, was just hoping to find out a little more with little effort lol

Lets hope it gets a gazillion searches for the domain reg sake, but no one falls for the cheating buggers :)
 
"

Looky, no one that's aware falls for it, but (unlike your average grandad) this Silver Surfer has been trained to postgrad level in computing and speaks fluent Assembler.

Metaphorically, the average computer user "drives" the thing and asks a "mechanic" if there's a "funny noise from under the bonnet". Joe Public is a turkey waiting to be plucked ... and as a mate of mine once said, "any creature that goes round saying "gobble, gobble" deserves to be eaten"!

Attacks are programmed and automated. If infiltration occurs in 30/1000 cases, and 1/1000 is successful, the labour needed to write the attack software and the equipment required can be justified on cost grounds. It is not labour intensive.

In reality, the effort of committing a rather annoying crime against a very small minority of people pays big time money, because the cost of getting a successful attack is about 5p ...

Here's some hard facts -
About 8% of pound coins in circulation are forgeries.

If you have the approx. £870k to get "bent" plates engraved for printing banknotes, the net profit for working a currency fraud is about £1.5m before it gets picked up by the authorities.

That's why the world is moving to using "plastic" for major transactions ...

Crime is big business, and it hits us all in the wallet because the National Exchequer foots the bill for it in the end.
 
870k for a 1.5M return with a risk of getting 10 years, doesn't seem worth it to me :-|

As for tab napping , all it needs is a little bit of sotware, maybe a browser plug in or something which either alerts you when an inactive tab as had it's URL changed or better still it disallows inactive tabs from having the URL changed.

I'm not a software developer but that's my suggestions :cool:
 
Doodle, that's £1.5M NET for the minchia from Sicily that puts up the front money, and they never get caught...
 
Status
Not open for further replies.

The Rule #1

Do not insult any other member. Be polite and do business. Thank you!

Members online

No members online now.

Premium Members

Acorn Domains Merch
MariaBuy Marketplace

New Threads

Our Mods' Businesses

Laskos
*the exceptional businesses of our esteemed moderators
General chit-chat
Help Users
  • No one is chatting at the moment.
  • Admin @ Admin:
    Hello. So, do anyone happen to know anything about Whois and how it can be accessed?
  • BrandFlu AcornBot:
    BrandFlu has joined the room.
  • BrandFlu AcornBot:
    BrandFlu has left the room.
  • Helmuts @ Helmuts:
    Admin said:
    Hello. So, do anyone happen to know anything about Whois and how it can be accessed?
    ;) you are leaking info ;) :D :D
    • Funny
    Reactions: Admin
  • D AcornBot:
    Darren has left the room.
      D AcornBot: Darren has left the room.
      Top Bottom