Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Lesson from latest Twitter attack: Don't hover?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Editorials & Other Articles Donate to DU
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 10:19 AM
Original message
Lesson from latest Twitter attack: Don't hover?
The choice for Internet users seems increasingly to be between usability and security
By Robert Lemos | InfoWorld

Users no longer have to click on a link to have their system hacked. Now they only have to hover over the link with their on-screen pointer.

The latest security vulnerability on Twitter's website highlights that some attacks don't require a user to do something questionable. All a user needs to do is hover over a specially crafted link to run an attacker's JavaScript. So far, security firms have not seen truly malicious attacks using the technique, but jokesters and miscreants were rampantly using the attack to send followers to porn sites or, more kindly, to pop up a message on their screen. Some links would propagate virally as well.

"This would definitely make you snarf your coffee the first thing in the morning," says Beth Jones, senior threat manager at security firm Sophos, which warned of the attack on Tuesday.
Twitter shut down the attack -- which exploited a cross-site scripting issue in how the site handled mouse-over events -- by midmorning on Tuesday with a fix to its servers. The security flaw only affected users who viewed their Twitter feeds using a Web browser, not with third-party apps.

Yet, the typical lesson for users -- summed up as "be careful" -- does not apply. Many security-minded users already mouse over links to see where they lead before clicking on them. Moreover, while a lot of the twitterati use third-party apps, many feeds are inserted into websites. A visitor that moused over one of the links would have fallen prey to the issue as well.

So what's a user to do?

"Pretty much, unless you have locked down your browser, you are owned," she said.
<snip>

http://www.infoworld.com/t/malware/lesson-latest-twitter-attack-dont-hover-137
Printer Friendly | Permalink |  | Top
Skink Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 10:22 AM
Response to Original message
1. No really I didn't click on that porn site.
Printer Friendly | Permalink |  | Top
 
tabatha Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Sep-23-10 12:57 PM
Response to Original message
2. That bug has been fixed.
http://www.guardian.co.uk/technology/blog/2010/sep/21/twitter-hack-explained-xss-javascript

I saved this page because there is a lot on it that I can learn about, being just an amateur web site creator.

It has to do with escaped characters.



Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu May 02nd 2024, 03:02 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Editorials & Other Articles Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC