New Phishing Attack Targets Online Banking Sessions With Phony Popups

LazyLion

King of de Jungle
Joined
Mar 17, 2005
Messages
105,605
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161

'In-session phishing' the latest Web-based method for phishers to steal users' banking credentials

Researchers have discovered a sophisticated, new method of phishing that targets users while they are banking online -- sending phony popup messages pretending to be from their banks.

The so-called "in-session phishing" attack prompts the victim to retype his username and password for the banking site because the online banking session "has expired," for instance, via a popup that purports to be from the victim's bank site, according to researchers at Trusteer, which today published an advisory (PDF) on their findings about the potential for such a phishing attack.

Amit Klein, CTO of Trusteer, says although he and his research team have not spotted full-blown attacks like this in the wild as yet, they have witnessed precursors to it. The attack goes like this: The phisher injects legitimate Websites with malicious JavaScript so that when an online banking customer visits one of those sites while banking online, he gets targeted. The malware exploits weaknesses in the browser that lets the attacker "see" the banking site URL where the victim is logged in, and then the phisher automatically generates a popup posing as that bank. If the user falls for the popup lure and enters his banking credentials, the phisher then gets those credentials.

"This is the next generation of sophisticated phishing attack," Klein says. "It combines an online vector -- the attacker waits for user to come to a genuine site that's hacked -- and browser shortcomings to detect which site the user is logged into in a different window or tab. This provides a very powerful avenue to conduct a sophisticated attack."

The popup message could take other forms, such as a customer satisfaction survey from the bank or a special promotion, according to the researchers -- anything that could dupe the user into handing over credentials.

Klein says placing a low-profile piece of malicious JavaScript on a high-profile Website isn't difficult to do, and the malware is basically invisible to the user. "Once the JavaScript is rendered, it does the job...and sees where you are logged in," he says. And the attack is possible without the attacker accessing the actual bank site at all, he notes.

The malware on the Website doesn't get downloaded to the victim's machine, so it's tougher to detect, according to Trusteer. And Internet Explorer, Firefox, Safari, and Chrome all contain a JavaScript vulnerability that lets a Website check if a user is currently logged onto another Website, leaving a temporary "footprint" that lets the attacker trace that site, including a bank.

For in-session phishing to be successful, the attacker has to maintain a list of bank Websites it will look for, and then it can send the phony popup to the victim.

Jeremiah Grossman, CTO and founder of WhiteHat Security, says the attack would be fairly simple to pull off. "There is no shortage of hacked Websites to piggyback on. And you'd probably use this method if you really don't want to be detected since there is no traditional malware as part of the attack," Grossman says. "You are just stealing some information from the browsers session and customizing a new page based upon it."

Grossman, who, along with Robert "RSnake" Hansen, had previously researched detecting users online, says the fact that there is no malware infecting the machine itself makes the in-session phishing attack especially dangerous. It would be difficult for antimalware tools to detect, he notes.

This new attack isn't as effective as traditional spear phishing, however, notes Joshua Perrymon, CEO of PacketFocus. "This just adds more timing and complexity to the attack. It also depends on the user clicking on the first link," Perrymon says.

Trusteer offered a few tips for users to protect themselves from an in-session phishing attack: deploy browser security tools; log out of banking and other sensitive online apps and accounts before going to other Websites; and be suspicious of any popups during a Web session if you haven't clicked on a hyperlink.

Wow... so now we must never enter our details into any page other than the main banking page! Kinda common sense... but still. They are getting more and more sophisticated. :(

I can see someone falling for the "session expired - please re-enter" trap... but who puts their password into a customer satisfaction survey???
 

Syph0n

Well-Known Member
Joined
Jan 9, 2009
Messages
132
Pretty ingenious, gotta admit. You'd just need your phishing malware to recognise when they logged onto the real <bank> site.
 

genetic

Honorary Master
Joined
Apr 26, 2008
Messages
37,598
I received an email in my inbox yesterday from Standard Bank. It's obviously fraudulent. What made me think, is how well the site is disguised as being legitimate. The email header indicated it came from service@standardbank.co.za, however the footer of the email gave it away, and the fact that I don't own a credit card.

Dear Standard Bank client
--------------------------------------------------------------------------------

Closing Accounts and Limiting Account Access
This is your official notification that your account has been Limited. We recently reviewed your credit card and it seems that you are using the same credit card for 2 accounts. As you can read in our User Agreement ( section 5.11 ) opening multiple accounts is strictly forbidden. You are now requested to provide information relevant to your account. Standard Bank will investigate the matter promptly and if the investigation is in your favor, we will restore your account.

Standard Bank Email ID PP812B22

--------------------------------------------------------------------------------

How can I restore my account access?

Click here and complete the steps to remove limitations.


Completing all of the checklist items will automatically restore your account access.

Thank you for using Standard Bank!
The Standard Bank Team

Copyright © 2007 Standard Bank Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners. Standard Bank is located at 2211 N. First St., San Jose, CA 95131. dead givaway... :rolleyes:

Please do not reply to this e-mail. Mail sent to this address cannot be answered. For assistance, log in to your Standard Bank account and choose the "Help" link in the footer of any page.

If you click on the link they provide (http://nb19-146.static.cytanet.com.cy/standardbank.co.za/index.php), it takes you to a Standard Bank page that looks almost identical to the legitimate bank website, even as far as having the accreddited FICA act accreditation slogan at the bottom of the page. They then ask you to enter your login details.
The address displayed in the address bar had http://standardbank.co.za displayed. :eek:

It's frightening to think how easily hackers can mimic legitimate services and extort information from registered users through deception.
 

genetic

Honorary Master
Joined
Apr 26, 2008
Messages
37,598
Firefox now detects the link posted above as "Reported Web Forgery" in under 24hrs of me receiving the email.
 
Top