thewayne: (Default)
[personal profile] thewayne
There's something called 0Auth. It was designed to allow you to sign on to your Google/Apple/Microsoft account - which could be secured with 2FA - and that would pass a security token upstream to whatever account that you're on saying "Hey, this person is A-Okay!" and you'd be in. Or you create another set of web site credentials to maintain specific to that site.

A security researcher has figured out a very clever attack that negates 0Auth called BitB: Browser in the Browser. It uses a series of Cascading Styles Sheets (CSS) that presents a window that looks just like the 0Auth window that does a credential intercept, simulates a login fail, then produces a real login window. A lot of people will fall for that. And you can compromise your entire Google/whatever ecosystem.

The conventional protection methods of looking to see that you're on a HTTPS site and that the site is actually amazon.com instead of amazon.suspiciouswebsite.biz doesn't work. The thing that does is that the imposter 0Auth cannot be moved to on top of the address bar! A true 0Auth address display is an actual web page and can be moved on top of the page that you are logging on to, so if you have any questions or suspicions, move the form and drag it on top of the address bar to make sure: an imposter site won't pass that test.

I don't think this jeopardizes your computer's security, any more than any suspicious web site or download would, it's a way of stealing computer credentials, which is always a concern.

This isn't just a thought exercise, demonstration, or proof of concept: this has been found in the wild. It will be interesting to see how the 0Auth world responds to this. A friend and I wrote something like this to suck account credentials on a mini computer that students weren't logging out of back in the '80s. Simplicity itself. This is much more complicated to implement. There should be some way to trace where the stolen credentials go if an implementation is found.

https://arstechnica.com/information-technology/2022/03/behold-a-password-phishing-site-that-can-trick-even-savvy-users/

Date: 2022-03-23 12:38 am (UTC)
disneydream06: (Disney Shocked)
From: [personal profile] disneydream06
Is it safe to say, there really isn't much safe on our computers? :o :o :o
Hugs, Jon

Date: 2022-03-25 12:22 am (UTC)
disneydream06: (Disney Shocked)
From: [personal profile] disneydream06
Hopefully I am boring enough that nobody would be desperate enough to come for me. :o

Date: 2022-03-23 01:37 am (UTC)
kathmandu: Close-up of pussywillow catkins. (Default)
From: [personal profile] kathmandu
One of the thinks I liked best about Windows 98 and XP was that you could change many aspects of the user interface, including things like 'active window's title bar color'. Ads designed to look like a standard dialogue box were easy to identify when all of my real windows and dialogue boxes had non-standard title bars.

Date: 2022-03-24 05:27 am (UTC)
From: [personal profile] acelightning73
I got called for jury duty. I was supposed to go online and fill out a form. But the URL they gave me for the form was bogus. It took me to PayPal to pay for an "expert service" which was supposed to provide me with a lawyer who would help me fill out the form. Instead it took me to a service which wanted me to authorize PayPal to bill me monthly for the advice service. I got them to undo the monthly payments. And then I got several emails wanting me to sign up for other completely fictional service. I have to re-upload my userpics - I don't think the mugshot I used was that gullible-looking.

Date: 2022-03-27 03:23 am (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
This makes sense, in a twisted way - since services are encouraging everyone to log in everywhere with one set of credentials (since that makes it easier to track and market to them), spoofing the single sign-on is more likely to net you useful credentials (and then give access to a greater amount of things).

It's not like the "check the URI" bit works particularly well in any case, because all of the marketing newsletters from everywhere runs all your clicks in their newsletter through a third party service to register that you clicked on something in the newsletter, and they don't provide you with bare URIs to copy and paste in, so I guess we're all hoping that the ad servers and services never get compromised and used to serve malware.

July 2025

S M T W T F S
   1 2345
6789101112
13141516171819
20212223242526
2728293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 2nd, 2025 08:14 pm
Powered by Dreamwidth Studios