Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A new phishing techniques has emerged that tricks users into handing over credentials by mimicking popular website's user dashboards.
The phishing attacks were generated by a Python tool which produced custom webpages designed to mimic websites like online banking and social networking sites.
The developer of the tool, Australian researcher Jamieson O'Reilly, said the attacks exploit users who are accustomed to remaining signed into web sites via session cookies.
"The general user [finds] it normal to just open a browser and be already logged in which is where this vector takes advantage," O'Reilly said.
The Python-based tool, dubbed TSURT (trust in reverse) uses the open source web scrapy framework Scrapy to pull user information like logos or avatars from a target site which are then embedded in the phishing page.
This makes the phishing page appear as a legitimate logged in dashboard.
In a video demonstration, the tool pulls down a Facebook account profile picture which is then placed inside a fake Facebook dashboard screen featuring a fake private message.
Users tempted to click on the fake message are prompted to log into Facebook at which point their credentials are stolen.
O'Reilly says the Facebook template could be customised to suit a targeted attack on a variety of sites including online banking.
"The attack can be just as easily implemented to a banking site. If an attacker wants to do a targeted attack its not the hardest thing in the world to have access to basic creds like account number or BSB."
"If a victim saw this in a banking dashboard it would definitely raise less alarms alarms as opposed to usual phishing techniques which just rudely slap the user with a login page."
TSURT will be available on GitHub later today.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.