Research by Kaspersky Lab and B2B International shows that businesses don’t need to have external interfaces such as public websites, customer portals and transactional systems to be hit by a DDoS attack: internal web services, operations and connectivity are just as vulnerable.
Experts are warning of a new scam that uses Windows Live ID as a bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, Hotmail, Outlook, MSN, Messenger and OneDrive.
Users receive warnings by email saying that their Windows Live ID accounts are being used to distribute unsolicited emails, so their accounts will be blocked. To stop their accounts being suspended, users are asked to follow a link and update their details to comply with the service’s new security requirements. This sounds very much like a typical phishing email. Victims are expected to click on links that will take them to fake sites imitating the official Windows Live page. The data they enter there will be sent to the scammers. So our experts were surprised that the link from the scam email did indeed go to the Windows Live website and there was no apparent attempt to get the victims’ logins and passwords.
What’s the trick?
Having followed the link in the email and successfully authorized the account on the official live.com site, users received a curious prompt from the service: an application requested permission to automatically log into the account, view the profile information and contact list and access a list of the users’ personal and work e-mail addresses. Scammers gained access to this technique through security flaws in the open protocol for authorization, OAuth.
Users who click “Yes” don’t give away their login and password credentials, but they do provide their personal information, the email addresses of their contacts and the nicknames and real names of their friends. It’s also possible to gain permission to access other parameters, such as lists of appointments and important events. This information is most likely to be used for fraudulent purposes, such as sending spam to the contacts in the victim’s address book or launching spear phishing attacks.
“We’ve known about security flaws in the OAuth protocol for quite a while: in early 2014, a student from Singapore described possible ways of stealing user data after authentication. However, this is the first time we have come across fraudsters using a phishing email to put these techniques into practice. A scammer can use the information intercepted to create a detailed image of users, including information on what they do, who they meet and who their friends are, etc. This profile can then be used for criminal purposes,” said Andrey Kostin, Senior Web Content Analyst at Kaspersky Lab.
Developers of web applications for social networks which use the OAuth protocol are advised to:
- avoid using open redirects from your sites
- create a white list of trusted addresses for redirects performed using OAuth, because fraudsters can perform a hidden redirect to a malicious site by finding an application that can be successfully attacked and changing its “redirect_uri” parameter.
Recommendations to users:
- do not follow links received via email or in private messages on social networking sites
- do not give unknown applications the right to access your personal data
- make sure you fully understand the account access rights that each application receives
- if you discover that an application is already distributing spam or malicious links on your behalf, you can send a complaint to the administration of the social networking site or web service and the application will be blocked
- keep your antivirus software databases and integrated anti-phishing protection up to date
To learn more, please read the blog post available at Securelist.com.
Articles related to Virus News
Danti and Co.: Cyberespionage Groups Use a Single Vulnerability to Target Organizations Around the World
Kaspersky Lab’s Global Research and Analysis Team has spent the last few months observing a wave of cyberespionage attacks conducted by different groups across the Asia-Pacific (APAC) and Far East regions, all of which share one common feature: in order to infect their victims with malware, the attackers use an exploit for the CVE-2015-2545 vulnerability