Security risk: The trick behind camouflaged links
-
Little John
- Addict

- Posts: 4805
- Joined: Thu Jun 07, 2007 3:25 pm
- Location: Berlin, Germany
Security risk: The trick behind camouflaged links
News: The trick behind camouflaged links
http://www.h-online.com/security/news/i ... 28927.html
http://www.h-online.com/security/news/i ... 28927.html
Re: Security risk: The trick behind camouflaged links
I came across a more informative article a few weeks ago
http://css.dzone.com/articles/htmls-black-sheep-element
http://css.dzone.com/articles/htmls-black-sheep-element
HP Z800 Workstation
CPU : Dual Xeon 5690 3.46GHz
RAM : 192GB RAM
GPU : NVIDIA QUADRO P5000 16GB
CPU : Dual Xeon 5690 3.46GHz
RAM : 192GB RAM
GPU : NVIDIA QUADRO P5000 16GB
Re: Security risk: The trick behind camouflaged links
Nice.
anyway from the test page -> http://bilaw.al/2013/03/17/hacking-the- ... cters.html
selecting "open the link in a new window" or "new tab" you end up on the page referenced in the link, PayPal, bypassing the OnClick() and its javascript.
anyway from the test page -> http://bilaw.al/2013/03/17/hacking-the- ... cters.html
selecting "open the link in a new window" or "new tab" you end up on the page referenced in the link, PayPal, bypassing the OnClick() and its javascript.
"Have you tried turning it off and on again ?"
-
Little John
- Addict

- Posts: 4805
- Joined: Thu Jun 07, 2007 3:25 pm
- Location: Berlin, Germany
Re: Security risk: The trick behind camouflaged links
Oh well, there are so many "more informative articles" about different topics on the web ...Mohawk70 wrote:I came across a more informative article a few weeks ago
But the topic in this thread is the vulnerability that was recently discovered by Bilawal Hameed.
-
Little John
- Addict

- Posts: 4805
- Joined: Thu Jun 07, 2007 3:25 pm
- Location: Berlin, Germany
Re: Security risk: The trick behind camouflaged links
Interesting, thanks for the tip!luis wrote:Nice.
anyway from the test page -> http://bilaw.al/2013/03/17/hacking-the- ... cters.html
selecting "open the link in a new window" or "new tab" you end up on the page referenced in the link, PayPal, bypassing the OnClick() and its javascript.
However, a malicious web page could additionally just disallow right-click, couldn't it?
-
MachineCode
- Addict

- Posts: 1482
- Joined: Tue Feb 22, 2011 1:16 pm
Re: Security risk: The trick behind camouflaged links
The original article (http://bilaw.al/2013/03/17/hacking-the- ... cters.html) has this link in it -> "This link should take you to PayPal." When I hover the mouse over it, Firefox's status bar shows "www.paypal.co.uk". But when I click the link, it does indeed take me to PayPal, as expected. The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0). IE 9 fails and redirects to a non-PayPal site.
The problem with this sort of exploit is that the browser is expected to parse every line of JavaScript to mind-read (or second guess) the intended destination. Just because the DESCRIPTION says it's going to PayPal, doesn't mean the LINK actually has to! So we end up with browsers becoming bloated and acting like virus-scanners, constantly trying to read the link's mind when it shouldn't. We, as end users, are the ones that suffer.
The problem with this sort of exploit is that the browser is expected to parse every line of JavaScript to mind-read (or second guess) the intended destination. Just because the DESCRIPTION says it's going to PayPal, doesn't mean the LINK actually has to! So we end up with browsers becoming bloated and acting like virus-scanners, constantly trying to read the link's mind when it shouldn't. We, as end users, are the ones that suffer.
Microsoft Visual Basic only lasted 7 short years: 1991 to 1998.
PureBasic: Born in 1998 and still going strong to this very day!
PureBasic: Born in 1998 and still going strong to this very day!
Re: Security risk: The trick behind camouflaged links
Also from the same articleMachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0). IE 9 fails and redirects to a non-PayPal site.
Embedding the script is child's play. Hameed has therefore informed Mozilla (and other browser makers) of his discovery, but has yet to receive a response. Google is, according to "internet rumours", already working on a fix. Opera is currently the only browser where this trick doesn't work.
Last edited by Mohawk70 on Wed Mar 27, 2013 1:46 am, edited 1 time in total.
HP Z800 Workstation
CPU : Dual Xeon 5690 3.46GHz
RAM : 192GB RAM
GPU : NVIDIA QUADRO P5000 16GB
CPU : Dual Xeon 5690 3.46GHz
RAM : 192GB RAM
GPU : NVIDIA QUADRO P5000 16GB
-
Little John
- Addict

- Posts: 4805
- Joined: Thu Jun 07, 2007 3:25 pm
- Location: Berlin, Germany
Re: Security risk: The trick behind camouflaged links
This is interesting. The current Firefox version 19.0.2 is not immune (tested on Windows XP).MachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0).
Re: Security risk: The trick behind camouflaged links
Just disable JavaScript.Little John wrote:This is interesting. The current Firefox version 19.0.2 is not immune (tested on Windows XP).MachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0).
As I run NoScript, I always explore a web site with JavaScript off
and switch Script on only if really needed.

Re: Security risk: The trick behind camouflaged links
You can also open it via middle-click. I'm used to open every link that way.Little John wrote:However, a malicious web page could additionally just disallow right-click, couldn't it?
I can confirm that... Previous versions aren't immune either. It most likely works because in that case JavaScript was disabled.Little John wrote:The current Firefox version 19.0.2 is not immune (tested on Windows XP).
What a bad idea. Nowadays JavaScript isn't something to play around with as it used to be years ago: Nearly every "up to date" website depends on it for styling purposes, to allow certain functionality etc.Lord wrote:Just disable JavaScript. [...]
If any of you native English speakers have any suggestions for the above text, please let me know (via PM). Thanks!
Re: Security risk: The trick behind camouflaged links
It works for me. I decide which site I can trust.c4s wrote:...What a bad idea. Nowadays JavaScript isn't something to play around with as it used to be years ago: Nearly every "up to date" website depends on it for styling purposes, to allow certain functionality etc.Lord wrote:Just disable JavaScript. [...]
If you trust all sites: leave script on.

Re: Security risk: The trick behind camouflaged links
I'm amazed you folks, and others on the 'net, are just finding out about this. I warned about this months ago when we finished our testing here, and its been all over the internet for months. The long and short of it is if you have java installed you are vulnerable, no matter the browser used even if it does seem to not be affected by the very simple unsophisticated 'test' in the link given.
Actually, no browser is immune. That simple test is no where near the sophistication of the exploits of Java out there. Chances are most of you have actually visited a Java exploit link just by viewing a web page with an exploited link on it, or a web page with a link on it that pointed to another web page with an exploited link on it, without even clicking the exploited link or the link to the other web page and did not even realize it. It may not have installed any malware silently without you being aware of it, but you probably added to some clicks for pay somewhere at the very minimum for a bot net without realizing it.Little John wrote:This is interesting. The current Firefox version 19.0.2 is not immune (tested on Windows XP).MachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0).
Last edited by SFSxOI on Sun Mar 24, 2013 12:36 pm, edited 2 times in total.
The advantage of a 64 bit operating system over a 32 bit operating system comes down to only being twice the headache.
-
Little John
- Addict

- Posts: 4805
- Joined: Thu Jun 07, 2007 3:25 pm
- Location: Berlin, Germany
Re: Security risk: The trick behind camouflaged links
SFSxOI wrote:The long and short of it is if you have java installed you are vulnerable, no matter the browser used
The problem here is caused by JavaScript, not by Java.
Re: Security risk: The trick behind camouflaged links
Little John wrote:SFSxOI wrote:The long and short of it is if you have java installed you are vulnerable, no matter the browser used
The problem here is caused by JavaScript, not by Java.
Hmmm... no....the problem is caused by Java being installed, period. You are just seeing one aspect of how it can be exploited that's all.
We do this professionally, contract to investigate these things for major companies and governments and develop counter measures. The counter measure here is to uninstall Java or at least turn it off. Even with the 'security fixes' for java that have been put out it still remains vulnerable. The internet is a very hostile environment, if its something that touches the internet that can be exploited its a pretty good chance it has been exploited even if not made public yet. For example, Oracle knew about this almost a year ago but said nothing.
Last edited by SFSxOI on Sun Mar 24, 2013 12:49 pm, edited 2 times in total.
The advantage of a 64 bit operating system over a 32 bit operating system comes down to only being twice the headache.
Re: Security risk: The trick behind camouflaged links
Certainly, you see that often in "normal" web sites when they fear you can stole something from them using "save as".Little John wrote: Interesting, thanks for the tip!
However, a malicious web page could additionally just disallow right-click, couldn't it?
A site which does that with the clear intention of limit the browser functionality is no better then a malware IMO. And rub me the wrong way.
So, if the "open in another tab/window" does not work, this should ring a small alarm bell and you can leave the site in disgust or if you are really curios you can disable javascript and continue for what it's possible.
The idea should be: you browse relaxed (never completely, this is the real world) on a well known site you trust, and when visiting a dubious site you switch mind and start to double check what you do, inspect the links, inspect the source and so on.
Anyway, the "open in another tab/window" is something even a normal user without any particular knowledge can keep in his back of tricks, and can help in this case. So it's nice to know I think.
"Have you tried turning it off and on again ?"
