{"id":12234,"date":"2017-01-18T13:05:21","date_gmt":"2017-01-18T18:05:21","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=12234"},"modified":"2017-01-18T13:33:57","modified_gmt":"2017-01-18T18:33:57","slug":"new-phishing-scam-targeting-gmail-users","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/new-phishing-scam-targeting-gmail-users\/","title":{"rendered":"New Phishing Scam Targeting Gmail Users"},"content":{"rendered":"<h1>New Phishing Scam\u00a0Targeting Gmail Users<\/h1>\n<h2>No matter what you read, this is nothing like what happened to Yahoo users!<\/h2>\n<p>We are publishing this because the news is spreading like wildfire today about serious phishing scam\u00a0targeting Gmail users. And undoubtedly, you&#8217;re going to hear people who don&#8217;t know what they&#8217;re talking about comparing this to recent Yahoo troubles. This is not true. Yahoo user accounts were hacked do to basic security flaws in Yahoo&#8217;s infrastructure. The phishing scam\u00a0against Gmail users is not about security issues with Google&#8217;s infrastructure or negligence, it&#8217;s about Gmail users being tricked by a very sophisticated phishing scam.<\/p>\n<p>We&#8217;ve been invited to share the following non-technical article <a href=\"https:\/\/www.wordfence.com\/blog\/2017\/01\/gmail-phishing-data-uri\/\" target=\"_blank\">written by Mark Maunder, from Wordfence<\/a>, \u00a0about this new phishing scam targeting Gmail users, we hope you read it. Understanding how this phishing scam works will help you from becoming a victim &#8211; and keep everyone in your contacts list safe too:<\/p>\n<div class=\"post-title\">\n<h1>Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited<\/h1>\n<p class=\"small\">This entry was posted in <a href=\"https:\/\/www.wordfence.com\/blog\/category\/general-security\/\" rel=\"category tag\">General Security<\/a>, <a href=\"https:\/\/www.wordfence.com\/blog\/category\/miscellaneous\/\" rel=\"category tag\">Miscellaneous<\/a> on January 12, 2017 by <a href=\"https:\/\/www.wordfence.com\/blog\/author\/mark\/\">Mark Maunder<\/a>\u00a0\u00a0\u00a0<a href=\"https:\/\/www.wordfence.com\/blog\/2017\/01\/gmail-phishing-data-uri\/#respond\" data-scroll-nav=\"comments\">151 Replies<\/a><\/p>\n<\/div>\n<p><strong>Update at 11:30pm on Tuesday January 17th:\u00a0<\/strong>I have received an official statement from Google regarding this issue. You can find the <a href=\"https:\/\/www.wordfence.com\/blog\/2017\/01\/gmail-phishing-data-uri\/#officialupdate\">full update at the end of this post<\/a>.<\/p>\n<p>As you know, at Wordfence we occasionally send out alerts about security issues outside of the WordPress universe\u00a0that are urgent and have a wide impact on our customers and readers. Unfortunately this is one of those alerts. There is a highly effective phishing technique stealing login credentials that is having a wide impact, even on experienced technical users.<\/p>\n<p>I have written this post to be as easy to read and understand as possible. I deliberately left out technical details and focused on what you need to know to protect yourself against this phishing attack and other attacks like it in the hope of getting the word out, particularly among less technical users. Please share this once you have read it to help create awareness and protect the community.<\/p>\n<h1>The\u00a0Phishing Attack: What you need to know<\/h1>\n<p>A new highly effective phishing technique targeting Gmail and other services has been gaining popularity during the past year among attackers. Over\u00a0the past few weeks there have been reports of experienced technical users being hit by this.<\/p>\n<p>This attack is\u00a0currently being used to target Gmail\u00a0customers and is also targeting other services.<\/p>\n<p>The way the attack\u00a0works is that an attacker will send an email to your Gmail account. That email may come from someone you know who has had their account hacked using this technique. It may also include something that looks like an image of an attachment you recognize from the sender.<\/p>\n<p>You click on the image, expecting Gmail to give you a preview of the attachment. Instead, a new tab opens up and you are prompted by Gmail\u00a0to sign in again. You glance at the location bar and you see\u00a0<strong>accounts.google.com<\/strong> in there. It looks like this\u2026.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16251\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png\" sizes=\"(max-width: 526px) 100vw, 526px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png 526w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-150x14.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-300x28.png 300w\" alt=\"\" width=\"526\" height=\"49\" \/><\/p>\n<p>You go ahead and sign in on a fully functional sign-in page that looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16252\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page.png\" sizes=\"(max-width: 472px) 100vw, 472px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page.png 472w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page-129x150.png 129w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-data-URI-sign-in-page-258x300.png 258w\" alt=\"GMail data URI phishing sign-in page\" width=\"472\" height=\"548\" \/><\/p>\n<p>Once you complete\u00a0sign-in, your account has been compromised.\u00a0A <a href=\"https:\/\/news.ycombinator.com\/item?id=13373327\" target=\"_blank\">commenter on Hacker News<\/a> describes in clear terms what they experienced over the holiday break once they signed in to the fake page:<\/p>\n<p>\u201c<em>The attackers log in to your account immediately once they get the credentials, and they use one of your actual attachments, along with one of your actual subject lines, and send it to people in your contact list.<\/em><\/p>\n<p><em>For example, they went into one student\u2019s account, pulled an attachment with an athletic team practice schedule, generated the screenshot, and then paired that with a subject line that was tangentially related, and emailed it to the other members of the athletic team.<\/em>\u201d<\/p>\n<p>The attackers signing into your account happens very quickly. It may be automated or they may have a team standing by to process accounts as they are compromised.<\/p>\n<p>Once they have access to your account, the\u00a0attacker also has full access to all your emails including sent and received at this point and may\u00a0download the whole lot.<\/p>\n<p>Now that they control your email address, they could also compromise a wide variety of other services that you use by using the password reset mechanism\u00a0including other email accounts, any SaaS services\u00a0you use and much more.<\/p>\n<p>What I have described above is a phishing attack that is used to steal usernames and passwords on Gmail. It is being used right now with a high success rate. However, this technique can be used to steal credentials from many other platforms with many variations in the basic technique.<\/p>\n<h1>How to protect yourself against this phishing attack<\/h1>\n<p>You have always been told: \u201c<em>Check the location bar in your browser to make sure you are on the correct website before signing in. That will avoid phishing attacks that steal your username and password.\u201d<\/em><\/p>\n<p>In the attack above, you did exactly that and saw\u00a0\u2018<strong>accounts.google.com<\/strong>\u2018 in the location bar, so you went ahead and signed in.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16251\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png\" sizes=\"(max-width: 526px) 100vw, 526px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png 526w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-150x14.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-300x28.png 300w\" alt=\"\" width=\"526\" height=\"49\" \/><\/p>\n<p>To protect yourself against this you need to <strong>change\u00a0what you are checking<\/strong> in the location bar.<\/p>\n<p>This phishing technique uses something called a \u2018data URI\u2019 to include a complete file in the browser location bar. When you glance up at the browser location bar and see \u2018data:text\/html\u2026..\u2019 that is actually a very long string of text. If you widen out the location bar it looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16254\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script.png\" sizes=\"(max-width: 1764px) 100vw, 1764px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script.png 1764w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script-150x10.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script-300x20.png 300w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/gmail-phishing-data-uri-showing-script-1024x70.png 1024w\" alt=\"GMail phishing data uri showing script\" width=\"624\" height=\"43\" \/><\/p>\n<p>There is a lot of whitespace which I have removed. But on the far right you can see the beginning of what is a very large chunk of text. This is actually a file that opens in a new tab and creates a completely functional fake Gmail login page which sends your credentials to the attacker.<\/p>\n<p>As you can see on the far left of the browser location bar, instead of \u2018https\u2019 you have \u2018data:text\/html,\u2019 followed by the usual \u2018https:\/\/accounts.google.com\u2026.\u2019. If you aren\u2019t paying close attention you will ignore the \u2018data:text\/html\u2019 preamble and assume the URL is safe.<\/p>\n<p><strong>You are probably thinking you\u2019re too smart to fall for this<\/strong>. It turns out that this attack has caught, or almost caught several technical users who have either\u00a0<a href=\"https:\/\/twitter.com\/tomscott\/status\/812265182646927361\">tweeted<\/a>,\u00a0<a href=\"http:\/\/blog.greggman.com\/blog\/getting-phished\/\" target=\"_blank\">blogged<\/a>\u00a0or <a href=\"https:\/\/news.ycombinator.com\/item?id=13373327\" target=\"_blank\">commented<\/a> about it. \u00a0There is a specific reason why this is so effective that has to do with human perception. I describe that in the next section.<\/p>\n<h2>How to protect yourself<\/h2>\n<p>When you sign in to any service, check the browser location bar and <strong>verify the protocol, then verify the hostname.\u00a0<\/strong>It should look like this in Chrome when signing into Gmail or Google:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16255\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png\" sizes=\"(max-width: 778px) 100vw, 778px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png 778w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-150x15.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-300x29.png 300w\" alt=\"Gmail phishing secure URI example\" width=\"617\" height=\"60\" \/><\/p>\n<p>Make sure there is nothing before the hostname \u2018accounts.google.com\u2019 other than \u2018https:\/\/\u2019 and the lock symbol. You should also take special note of the green color and lock symbol that appears on the left. <strong>If you can\u2019t verify the protocol and verify the hostname, stop<\/strong> and consider what you just clicked on to get to that sign-in page.<\/p>\n<p><strong>Enable two factor authentication\u00a0<\/strong>if it is available on every\u00a0service that you\u00a0use. GMail calls this \u201c2- step verification\u201d and you can <a href=\"https:\/\/www.google.com\/landing\/2step\/\" target=\"_blank\">find out how to enable it on this page<\/a>.<\/p>\n<p>Enabling two factor authentication makes it much more difficult for an attacker to\u00a0sign into a service that you use, even if they manage to steal your password using this technique. I would like to note that there <a href=\"https:\/\/news.ycombinator.com\/item?id=13373562\" target=\"_blank\">is some discussion<\/a> that indicates even two factor authentication may not protect against this attack. However I have not seen a proof of concept, so I can not confirm this.<\/p>\n<h1>Why Google won\u2019t fix this and what they should do<\/h1>\n<p><a href=\"https:\/\/gist.github.com\/timruffles\/5c76d2b61c88188e77f6#gistcomment-1968194\" target=\"_blank\">Google\u2019s response<\/a> to a customer asking about this was as follows:<\/p>\n<p><em>\u201cThe address bar remains one of the few trusted UI components of the browsers and is the only one that can be relied upon as to what origin are the users currently visiting. If the users pay no attention to the address bar, phishing and spoofing attack are \u2013 obviously \u2013 trivial. Unfortunately that\u2019s how the web works, and any fix that would to try to e.g. detect phishing pages based on their look would be easily bypassable in hundreds of ways. The data: URL part here is not that important as you could have a phishing on any http[s] page just as well.\u201d<\/em><\/p>\n<p>This is likely a junior person within the organization based on the grammatical errors. I disagree with this response for a few reasons:<\/p>\n<p>Google have modified the behavior of the address bar in the past to show a green protocol color when a page is using HTTPS and a lock icon to indicate it is secure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16255\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png\" sizes=\"(max-width: 778px) 100vw, 778px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri.png 778w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-150x15.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/GMail-phishing-secure-accounts.google.com-data-uri-300x29.png 300w\" alt=\"Gmail phishing secure URI example\" width=\"586\" height=\"57\" \/><\/p>\n<p>They also use a different way of displaying the protocol\u00a0when a page is insecure, marking it red with a line through it:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16257\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning.png\" sizes=\"(max-width: 382px) 100vw, 382px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning.png 382w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning-150x29.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/phishing-chrome-certificate-warning-300x58.png 300w\" alt=\"\" width=\"382\" height=\"74\" \/><\/p>\n<p>During this attack, a user sees neither green nor red. They see ordinary black text:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16251\" src=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png\" sizes=\"(max-width: 526px) 100vw, 526px\" srcset=\"https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI.png 526w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-150x14.png 150w, https:\/\/www.wordfence.com\/wp-content\/uploads\/2017\/01\/dataURI-300x28.png 300w\" alt=\"\" width=\"526\" height=\"49\" \/><\/p>\n<p>That is why this attack is so effective.\u00a0In user interface design and in human perception, <em>elements that are connected by uniform visual properties are perceived as being more related than elements that are not connected.\u00a0<\/em>[Read more:\u00a0<a href=\"http:\/\/www.andyrutledge.com\/gestalt-principles-3.php\" target=\"_blank\">Gestalt principles of human perception and \u2018uniform connectedness\u2019<\/a>\u00a0and <a href=\"https:\/\/www.cxpartners.co.uk\/our-thinking\/content_blind_spots_-_thoughts_from_a_usability_test\/\" target=\"_blank\">Content Blindspots<\/a>]<\/p>\n<p><em>\u00a0<\/em>In this case the \u2018data:text\/html\u2019 and the trusted hostname\u00a0are the same color. That suggests to our perception that they\u2019re related and the \u2018data:text\/html\u2019 part either doesn\u2019t matter or can be trusted.<\/p>\n<p>What Google needs to do in this case is change the way \u2018data:text\/html\u2019 is displayed in the browser. There may be scenarios where this is safe, so they could use an amber color with a unique icon. That would alert our perception to a difference and we would examine it more closely.<\/p>\n<h1>Update: How to check if your account is already compromised<\/h1>\n<p>I\u2019ve had two requests in the comments about this so I\u2019m adding this section now. (at 9:39am Pacific time, 12:39am EST).<\/p>\n<p>There is no sure way to check if your account has been compromised. If in doubt, change your password immediately. Changing your password every few months is good practice in general.<\/p>\n<p>If you use GMail, you can check your login activity to find out of someone else is signing into your account. Visit <a href=\"https:\/\/support.google.com\/mail\/answer\/45938?hl=en\" target=\"_blank\">https:\/\/support.google.com\/mail\/answer\/45938?hl=en<\/a> for info. To use this feature, scroll to the bottom of your inbox and click \u201cDetails\u201d (very small in the far lower right hand corner of the screen). This will show you all currently active sessions as well as your recent login history. If you see active logins from unknown sources, you can force close them. If you see any logins in your history from places you don\u2019t know, you may have been hacked. [Thanks <a href=\"https:\/\/www.wordfence.com\/blog\/2017\/01\/gmail-phishing-data-uri\/#comment-38409\">Ken<\/a>, I pasted your comment in here almost verbatim. Very helpful.]<\/p>\n<p>There is a trustworthy site run by Troy Hunt who is a well known security researcher where you can check if any of your email accounts have been part of a data leak. Troy\u2019s site is\u00a0<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\">https:\/\/haveibeenpwned.com\/<\/a>\u00a0and it is well known in security circles. Simply enter your email address and hit the button.<\/p>\n<p>Troy aggregates data leaks into a database and gives you a way to look up your own email in that database to see if you have been part of a data breach. He also does a good job of actually verifying the data breaches he is sent.<\/p>\n<h1>Spread the word<\/h1>\n<p>I\u2019ll be sharing this on Facebook to create awareness among my own family and friends. This attack is incredibly effective at fooling even technical users for the reasons I have explained above. I have the sense that most ordinary users will be easy pickings. Please share this with the community to help create awareness and prevent this from having a wider impact.<\/p>\n<p>Mark Maunder \u2013 Wordfence Founder\/CEO \u2013 <a href=\"https:\/\/twitter.com\/mmaunder\" target=\"_blank\">@mmaunder<\/a><br \/>\n<a name=\"officialupdate\"><\/a><\/p>\n<h1>Update: Official Statement from Google<\/h1>\n<p>This is an update at 11:30pm PST on Tuesday the 17th of January 2017. I was contacted by Aaron Stein from Google Communications. He has provided the following official statement from Google:<\/p>\n<p>\u201c<em>We\u2019re aware of this issue and continue to strengthen our defenses against it. We help protect users from phishing attacks in a variety of ways, including: machine learning based detection of phishing messages, Safe Browsing warnings that notify users of dangerous links in emails and browsers, preventing suspicious account sign-ins, and more. Users can also activate two-step verification for additional account protection.<\/em>\u201d &#8230;<\/p>\n<p><strong><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/contact-cloudeight\/\" target=\"_blank\">Read the entire article here.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New Phishing Scam\u00a0Targeting Gmail Users No matter what you read, this is nothing like what happened to Yahoo users! We are publishing this because the news is spreading like wildfire today about serious phishing scam\u00a0targeting Gmail users. And undoubtedly, you&#8217;re going to hear people who don&#8217;t know what they&#8217;re talking about comparing this to recent Yahoo troubles. This\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/new-phishing-scam-targeting-gmail-users\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1461,1433,1678,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/12234"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=12234"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/12234\/revisions"}],"predecessor-version":[{"id":12237,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/12234\/revisions\/12237"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=12234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=12234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=12234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}