new wave of phishing attacks against eBay

A new wave of phishing attacks against eBay is exploiting a clever combination of wildcard DNS records and cross-site scripting (XSS) vulnerabilities to use other people’s websites to help steal credentials from victims.

The first attacks using this combined method of wildcard DNS records and XSS were detected by Netcraft on February 10th, although the source code behind the attacks suggest that the planning had begun a day earlier. The attacks have continued to the present day, and the fraudulent eBay login form remains accessible through the wildcard domains.

Fraudsters launched the attack using a number of sites that host vulnerable versions of iRedirector Subdomain Edition. This PHP and MySQL based system allows website owners to use wildcard DNS records on their domains to forward subdomains like http://user.example.com to URLs like http://www.example.com/members/~username.

A cross-site scripting vulnerability on the affected iRedirector sites is allowing the fraudsters to inject framesets into specific pages. These framesets load content from one of the fraudsters’ websites hosted in France at http://df0x.54.pl, which in turn loads an iframe located at http://0xdc4bdd88:88/ws/eBayISAPI.dll/. This injected iframe presents a fraudulent eBay login page, which prompts the victim to submit their eBay User ID and Password to a site hosted by Sudokwonkangnambonbujang in South Korea.

Because the vulnerable sites can be accessed via wildcard DNS records, the fraudsters have made the attacks look all the more convincing by making the hostnames look similar to those used by the genuine eBay login page. For example, the attack has used many hostnames that are similar to this:

phishing

phishing address

The hostnames used in these attacks also contain a seemingly random string of hexadecimal digits. These are simply MD5 hashes of small integers. It is likely that this semi-random measure is being used to try and bypass simplistic firewalls or email filters, which may not recognise fraudulent URLs if part of the hostname changes.

The unobtrusive methods used in the current wave of attacks have obvious appeal to fraudsters — the wildcard DNS records mean that it’s easy to use arbitrary hostnames for each attack, allowing each vulnerable site to be convincingly used for many different targets. Furthermore, there is no need for the fraudsters to fully compromise a website, as the cross-site scripting vulnerability allows the fraudulent content to be placed on the sites without gaining internal access to the server. Finally, all it takes is a simple Google search to find additional sites with the same vulnerabilities. The combination of these factors makes it entirely feasible to automate the whole process.


Sursa
2009-02-18 15:15:52



Comenteaza





Ultimele 25 posturi adăugate

13:33:00Renato Usatîi. Karaoke cu Plahotniuc, plăcinte de la Filat, primii bani la Moscova și dictatura 💥🔥💲 —» Sandu GRECU
07:09:00Cum monitorizarea inteligentă a energiei transformă viața comunității din Micleușeni 🌞 —» Sandu GRECU
03:34:01RACURSIU —» Leo Butnaru
16:52:00MNLR (CHIȘINĂU), EXPOZIȚIE TEMATICĂ —» Leo Butnaru
13:02:39Prima femeie zboară spre Lună —» Curaj.TV | Media alternativă
06:10:00POEZIA FRANCEZĂ —» Leo Butnaru
13:52:24Inovație prin creativitate la bibliotecă. Cercetare biblioteconomică —» Biblioteca de Arte 'Tudor Arghezi'
19:10:00Cum au devenit gospodăriile din Fălești protagoniste ale tranziției verzi ☘️ —» Sandu GRECU
15:52:00din yes-euri —» Leo Butnaru
14:18:00Urgent! Modalitatea de finanțare a sportului trebuie revizuită! —» Sandu GRECU
13:53:47Cel de-al cinci-lea congres al compozitorilor din Moldova —» CHIŞINĂU MUZICAL | Blogul Bibliotecii de Arte "Tudor Arghezi"
12:47:00CNED LANSEAZĂ APEL DE IDENTIFICARE A NOILOR ASOCIAȚII DE PROPRIETARI DIN CONDOMINIU ELIGIBILE PENTRU FINANȚAREA MĂSURILOR DE EFICIENȚĂ ENERGETICĂ 🌞 —» Sandu GRECU
10:43:15Industria calului, pe creștere —» APort | "Pentru un român care știe citi, cel mai greu lucru e să nu scrie." I.L. Carag
09:37:00LA PRAGUL EDITURII NEUMA —» Leo Butnaru
20:55:00Stingem lumina? #oraPlanetei —» Curaj.TV | Media alternativă
08:18:44Agresorul se eschivează, victima e calomniată #Cahul —» Curaj.TV | Media alternativă
08:17:54Ucraina continuă campania de lovituri în adîncime —» Curaj.TV | Media alternativă
18:59:00Grupul de mobilizare comunitară din Nihoreni, Rîșcani – motorul schimbării în reducerea consumului de energie 🧩 —» Sandu GRECU
16:23:00Yes-Eu —» Leo Butnaru
13:50:0085 de ani de la fondarea ziarului ,,Florile Dalbe” —» Biblioteca Publică or.Rîşcani
07:48:11Rolul memoriei culturale în consolidarea identității românești —» Biblioteca de Arte 'Tudor Arghezi'
14:32:47Un primar cu brățară electronică, premieră?! —» Curaj.TV | Media alternativă
13:23:15Casa de pe strada Frunze —» Biblioteca de Arte 'Tudor Arghezi'
12:34:00Manolachi. Uluitor! Au distrus Universitatea de Sport pentru a lua pământul din centrul orașului 🔥🔥🔥 —» Sandu GRECU
13:54:25De Florii ,, Tocuri pe biciclete”dă startul Primăverii la Ploiești —» Curaj.TV | Media alternativă