"I know your customers’ passwords"

Discussion in 'ESP Discussion' started by roundabout, Feb 15, 2012.

  1. roundabout

    roundabout VIP

    Joined:
    Feb 17, 2011
    Messages:
    2,713
    Likes Received:
    154
    Trophy Points:
    63
    I know your customers’ passwords

    Word To The Wise
    By steve in Best Practices, Technical.


    Go to your ESP customer login page and use “View Source” to look at the HTML (under “Page” on Internet Explorer, “Tools->Web Developer” on Firefox, and “View” on Safari).

    Go on, I’ll wait.

    Search for the word autocomplete. If it says something like autocomplete=”off” then your web developers have already thought about this security issue. If it doesn’t, then you might have a serious security problem.

    What’s going on here? You’ve probably noticed that when you’re filling in a web form your browser will often offer to fill in data for you once you start typing. This feature is supported by most modern browsers and it’s very convenient for users – but it works by recording the contents of the form in the browser, including the username and password.

    As a bad guy that’s very interesting data. I can take some off-the-shelf malware and configure it with the URLs of a bunch of ESP login pages. Then I just need to get that malware installed on your customers desktops somehow. A targeted web drive-by malware attack, maybe based on targeted hostile banner ads is one approach, but sending email to people likely to be ESP customers is probably more effective. Maybe I’ll use hostile email that infects the machine automatically, or – most likely – I’ll use a phishing attack, sending a plausible looking email with an attachment I’m hoping recipients will open.

    Once the malware is installed it can rummage through the users browser files, looking for any data that matches the list of login pages I gave it. I just need to sit back and wait for the malware to phone home and give me a nicely packaged list of ESPs, usernames and passwords. Then I can steal that customer’s email lists and send my next phishing run through that ESP.

    This isn’t a new issue – it’s been discussed since browsers started implementing autocompletion over a decade ago, and it’s been a best practice to include autocomplete=”off” for password fields or login forms for years.

    How serious a risk is this for ESPs? Well, I looked at the customer login pages at several ESPs that have a history of being compromised and none of them are using autocomplete=”off”. I looked at several that haven’t been compromised that I know of, and they’re all using either autocomplete=”off” or a complex (and reasonably secure-looking) javascript approach to login. Correlation isn’t causation, but it’s fairly strong circumstantial evidence.

    ESPs should fix this hole if they haven’t already. If any customers are upset about having to actually type in their password (really?) they can take a look at secure password management tools (e.g. 1Password, LastPass or KeePass).

    Thanks to Tim at Silverpop for reminding me that this is a serious security hole that many ESPs haven’t plugged yet and pointing me at some of these resources.

    More on passwords and application security tomorrow.

    Source:
    http://blog.wordtothewise.com/2012/02/i-know-your-customers-passwords
     
  2. VelocitySoftware

    VelocitySoftware Member

    Joined:
    Sep 2, 2011
    Messages:
    66
    Likes Received:
    2
    Trophy Points:
    8
    Home Page:
    Nice tip added. Did not there was a way to disable autocomplete for a field.
    But if malware is installed as an application on a computer they would have complete control over the computer and would just log the keystrokes to gain access that way.
     
  3. Fun4uoc

    Fun4uoc VIP

    Joined:
    Apr 22, 2011
    Messages:
    605
    Likes Received:
    23
    Trophy Points:
    28
    Yeah most banks have autocomplete disabled, and your right, if someone is able to get malware on your machine, then autocomplete is the least of your worries.
     

Share This Page