123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Professional Identifies New Cookiejacking Threat

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, an Italian security researcher identified vulnerability in Internet Explorer (IE), which attackers may exploit to extract sensitive information related to Internet users. Rosario Valotta, identified a new cookiejacking technique, which he used to hijack cookies by bypassing the protection on IE. However, the attack requires user action to be successful. The researcher has termed the cookiejacking technique as an advanced clickjacking approach, which exploits zero day vulnerability. Attackers need to extract victim's username on Windows, identify the operating system in use. This helps attackers to determine the folders, which store the cookies. Attackers may then use clickjacking technique to place cookie text behind a picture. Again, fraudsters need to target cookie related to the website logged in by the user at the time of the attack. Attackers may exploit the vulnerability on all versions of IE including IE9 on any Windows operating system such as XP, Vista and even Windows 7. In this case, security researcher enticed Facebook users to play a game, which involves clicking, dragging and dropping. When users drag ...
... an object in the game to a picture, they inadvertently also send cookies to the fraudsters. Valotta was able to extract cookies of around 80 of his friends on Facebook within three days.

While the attack looks sophisticated, cybercriminals may extract the requisite information through browser exploits, javascript detection tools, and use social engineering techniques to make user perform a specific action. Web browsers use cookies to store site preferences and login credentials. Unwary Internet users often do not clear the cookies on the web browser. Some Internet users also check 'Remember my password' option or 'keep me logged in' option. Attackers may exploit the popularity of games on social networking sites to trick users into revealing sensitive information, without being aware of the malicious activity. Attackers may also attempt to steal confidential user information related to e-mail accounts, and online banking and shopping sites. Organizations must encourage employees to undertake e-learning and online degree programs on cyber security to avoid falling prey to social engineering attacks directed at stealing privileged business information. Cybercriminals may use the collected information to impersonate a legitimate user, conduct fraudulent transactions, and steal further personally identifiable information. Attackers may also leverage the victim's user name on Windows to gain remote access to a computer system.

Microsoft has reportedly described the latest security threat as not a high risk threat as successful attack requires high user interaction, visit to a malicious webpage, lured to drag and drop objects, and knowledge of the website, which the user is logged on to. However, security researchers at Trend Micro have argued that attackers may take advantage of negligence, and lack of security awareness among non-technical users to extract sensitive information through social engineering techniques. According to the Internet security firm, they block on an average around 13 million attempts by users to access malicious sites.

Developers must constantly identify the security flaws and initiate remediating measures to prevent their exploitation by attackers. The prevailing IT security scenario requires professionals to constantly enhance their skill sets and awareness through online university degree programs, and security conferences.

Internet users must refrain from clicking on links send by strangers, and be cautious while clicking links on websites. Deleting cookies, avoid clicking on 'remember my password' option, clearing browsing history may help protect Internet users from securing sensitive information. Internet users must avoid falling prey to playing enticing games and puzzles. Usually, professionals qualified in masters of security science and IT security certifications identify and warn users on latest security threats. Internet users must follow security blogs and advisories to abreast themselves of latest cyber threats.

Total Views: 224Word Count: 609See All articles From Author

Add Comment

Computers Articles

1. Employee Attendance System | 1 Sgd Mobile Attendance
Author: knani

2. Employee Mobile App For Time Attendance In Singapore
Author: knani

3. Malaysia Website Design – Rm499 For Unlimited Pages
Author: chinni rishi

4. Budget Website Design Malaysia | Rm499 & Unlimited Pages
Author: chinni rishi

5. Streamlined Attendance Tracking | Free Payroll
Author: kayakakula rishi

6. Singapore Employee App | Free Payroll | Just 1sgd
Author: kayakakula rishi

7. Biometric Fingerprint Attendance System | Free Payroll | Starting At 1sgd/mo
Author: kayakakula rishi

8. Top Web Design Agency Sg | 499sgd Unlimited Pages
Author: kayakakula rishi

9. Best Cms Web Design | Sgd 499 Nett Singapore
Author: kayakakula rishi

10. Your Web Project | Singapore | 499sgd Unlimited Pages
Author: kayakakula parvathi

11. Create Your Web Solution | Singapore | 499sgd Unlimited
Author: kayakakula parvathi

12. Tailored Virtual Security Guard Sg Plans From 30sgd
Author: chinni parvathi

13. Confined Space Management Best Practices | Free Payroll
Author: chinni parvathi

14. Zuckerberg’s Bold Ai Initiative: 5 Big Moves Unveiled
Author: Impaakt Magazine

15. Trending Technologies In Frontend Development
Author: davidjohansen

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: