Phishing attack from Shutterstock.com

A Chinese infosec researcher, Xudong Zheng, has discovered a new phishing attack that is ‘almost impossible to detect’, which could deceive even the most careful users on the Internet.
He wrote on his blog that Punycode makes it possible to register domains with foreign characters. It works by converting individual domain label to an alternative format using only ASCII characters. For example, the domain “xn--s7y.co” is equivalent to “短.co”.
From a security perspective, Unicode domains can be problematic because many Unicode characters are difficult to distinguish from common ASCII characters. It is possible to register domains such as “xn--pple-43d.com”, which is equivalent to “аpple.com”. It may not be obvious at first glance, but “аpple.com” uses the Cyrillic “а” (U+0430) rather than the ASCII “a” (U+0041). This is known as a homograph attack.
Fortunately modern browsers have mechanisms in place to limit IDN homograph attacks. The page IDN in Google Chrome highlights the conditions under which an IDN is displayed in its native Unicode form. In Chrome and Firefox, the Unicode form will be hidden if a domain label contains characters from multiple different languages. The “аpple.com” domain as described above will appear in its Punycode form as “xn--pple-43d.com” to limit confusion with the real “apple.com”.
Chrome’s (and Firefox’s) homograph protection mechanism unfortunately fails if every characters is replaced with a similar character from a single foreign language. The domain “аррӏе.com”, registered as “xn--80ak6aa92e.com”, bypasses the filter by only using Cyrillic characters.
“You can check this out yourself in the proof-of-concept using Chrome or Firefox. In many instances, the font in Chrome and Firefox makes the two domains visually indistinguishable,” Zheng wrote.
It becomes impossible to identify the site as fraudulent without carefully inspecting the site’s URL or SSL certificate. This program nicely demonstrates the difference between the two sets of characters. Internet Explorer and Safari are fortunately not vulnerable.
Chrome

Chrome / source: xudongz.com
Zheng explained that this bug had been reported to Chrome and Firefox on 20 January 2017 and was fixed in the trunk of Chrome 59 (currently in Canary) on 24 March. The Chrome team has since decided to include the fix in Chrome 58, which should be available around 25 April.
Firefox
Firefox / source: xudongz.com
Firefox SSL / source: xudongz.com
The problem remains unaddressed in Firefox as they remain undecided whether it is within their scope.
However, Firefox users can limit their exposure to this bug by going to about:config and setting network.IDN_show_punycode to true. This will force Firefox to always display IDN domains in its Punycode form, making it possible to identify malicious domains.
“Thanks to /u/MARKZILLA on reddit for this solution,” Zheng acknowleged.
Firefox users can follow below-mentioned steps to manually apply temporarily mitigation:

Type about:config in address bar and press enter.

Type Punycode in the search bar.

Browser settings will show parameter titled: network.IDN_show_punycode, double-click or right-click and select Toggle to change the value from false to true.

image source: xudongz.com
“I hope Firefox will consider implementing a fix to this problem since this can cause serious confusion even for those who are extremely mindful of phishing,” Zheng said in his blog.
Opera
Unfortunately, there is no similar setting available in Opera to disable Punycode URL conversions manually, Zheng said.
He adviced, a simple way to limit the damage from bugs such as this is to always use a password manager. In general, users must be very careful and pay attention to the URL when entering personal information.
You can also follow Zheng on Twitter @Xudong_Zheng
 

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

Khaw Boon Wan: Service levels improved as public bus industry fully transitioned to bus contracting model in Sept 2016

Minister for Transport Khaw Boon Wan stated that service levels have improved…

一次脸部护理4445元? 家属恐祖父被骗上门理论

广告宣传单上写脸部护理一次收38元,岂知一年长者在美容院进行面部护理后,却被征收4千445元!事件还惊动警方到场调查。 网民Ho向新闻与媒体网站《Stomp》指出,他87岁的祖父于上周四(9月17日)早上,到淡滨尼巴士转换站的E.Zone美容院,进行脸部护理。“我的祖父看到广告牌上写着,脸部护理只要38元,因此就进入店内。” “一名美容院女职员在脸部护理中途,告诉他每除去一个油包就要花费20元。” “作为一名老人,我爷爷所理解的是花费总额不会超过100元。但是在护理后,他却被要求缴付4445元!……该女职员甚至没有给他任何发票或收据。” 美容院指出,老人家去除220个油包,总计4440元,加上158元的脸部护理,所以总账单才打到4558元。而且他们澄清并没有“拉客”,更指老人家没有一次性付费,所以没有收据。 消协指涉事美容院被投诉多达四次 不过,根据消费者协会表示,有关美容院及它的分行,今年已被投诉多达四次。诉内容大多涉及该美容院使用高压推销手法,诱导顾客购买额外的美发或美容配套。 网友指出,他的祖父不想引起麻烦,所以通过星网电子付款(NETS)缴付了2000元,这也是他电子付款的顶限,因此他必须到银行提款,缴交剩余2445元。“女职员跟祖父到银行,银行出纳员在发现祖父曾进行2000元的交易后再次提款,就好言提醒他小心堕入骗局。” 网友重申,这只是一次脸部护理的费用,不是一个配套,也因此才令他们感到难以接受。 家属找上门理论 据周日(9月20日)的《新民日报》报导指出,Ho曾多次到该美容院索取收据,却都无济于事,于是周日再到美容院要求,却引起争执。 女职员表示已经向老人家分析有关的收费,且还分析给网民听,更对网民找上门的行为表示不了解。…

SRX figures: Condo units sold fell 27% as resale prices mildly increased by 1.7%

According to the flash data from real estate portal SRX Property on…

首宗中国境外死亡病例! 菲律宾一武汉男确诊病患不治

菲律宾出现首例新型冠状性病毒死亡病例,亦是在中国以外首例死亡病例。 世界卫生组织(WHO)昨日(2日)表示,该名患者为44岁男子,来自武汉,在入境菲律宾前已感染新型冠状性病毒。 与此同时,与这名武汉男性死者一同入境菲律宾的38岁中国女子,是菲律宾首例确诊武汉肺炎病例。  该名女子目前正在医院康复当中。 世卫组织驻菲律宾代表拉宾德拉·阿贝亚辛格(Rabindra Abeyasinghe) 表示,尽管是首宗中国境外的死亡案例,但同时也强调,该名病患并非在菲律宾境内感染,而是接受了外部疫情感染后入境到菲律宾。 当地卫生部指出,该名男子出现咳嗽、发烧、喉咙痛的症状,于1月25日入境政府医院,入院后逐渐严重,尽管在最后几天情况趋向稳定,并出现好转的迹象,但在死前24小时病情恶化,而不幸离世,成为首宗中国境外死亡病例。 菲律宾当局已与中国使馆展开合作,将尽速火化该名病患的遗体。 卫生部长杜克(Francisco Duque III)强调,该名患者与其他中国死亡病例相似,除了肺炎外,仍存在其他健康问题,同时也感染了B型流感与肺炎链球菌。…