In response to reported security vulnerabilities in Gmail, Google puts the blame on some users who fell for a bogus e-mail scam.
Google on Tuesday reported that it has investigated recent reports of a Gmail vulnerability and found the flaw: users duped by phishing messages.
Google security engineer Chris Evans in a blog post explained that in response to speculation about an alleged security vulnerability in Gmail, Google has looked into the matter and found no evidence of a Gmail vulnerability.
On Sunday, in a post on the GeekCondition.com blog, Web developer Brandon Partridge warned that an attacker can force an unsuspecting Gmail user to create a malicious message filter without his or her knowledge.
This would enable an attacker to hijack messages sent to the victim without the victim's knowledge.
But the vulnerability turns out to be gullible users who fall for a phishing scam.
"Attackers sent customized e-mails encouraging Web domain owners to visit fraudulent Web sites such as 'google-hosts.com' that they set up purely to harvest usernames and passwords," explained Evans. "These fake sites had no affiliation with Google, and the ones we've seen are now offline. Once attackers gained the user credentials, they were free to modify the affected accounts as they desired. In this case, the attacker set up mail filters specifically designed to forward messages from Web domain providers."
Security researcher Petko D. Petkov of GNUCitizen.org, who identified a Gmail vulnerability last year, said the technique described by Partridge appeared to be some form of cross-site scripting (XSS), rather than the cross-site request forgery vulnerability he had found. Though his assessment may be misplaced in this instance, it would be unwise to believe that no further Gmail holes will be identified.
Evans recommends that Google users only enter Gmail sign-in credentials to Web addresses starting with https://www.google.com/accounts and that they "never click-through any warnings your browser may raise about certificates."
It might also be worth adding that one should be skeptical about the legitimacy of e-mail messages, particularly from unknown sources.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.