Google Pins Gmail Bug On Phishing - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Applications
News
11/25/2008
06:17 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Pins Gmail Bug On Phishing

In response to reported security vulnerabilities in Gmail, Google puts the blame on some users who fell for a bogus e-mail scam.

Google on Tuesday reported that it has investigated recent reports of a Gmail vulnerability and found the flaw: users duped by phishing messages.

Google security engineer Chris Evans in a blog post explained that in response to speculation about an alleged security vulnerability in Gmail, Google has looked into the matter and found no evidence of a Gmail vulnerability.

On Sunday, in a post on the GeekCondition.com blog, Web developer Brandon Partridge warned that an attacker can force an unsuspecting Gmail user to create a malicious message filter without his or her knowledge.

This would enable an attacker to hijack messages sent to the victim without the victim's knowledge.

But the vulnerability turns out to be gullible users who fall for a phishing scam.

"Attackers sent customized e-mails encouraging Web domain owners to visit fraudulent Web sites such as 'google-hosts.com' that they set up purely to harvest usernames and passwords," explained Evans. "These fake sites had no affiliation with Google, and the ones we've seen are now offline. Once attackers gained the user credentials, they were free to modify the affected accounts as they desired. In this case, the attacker set up mail filters specifically designed to forward messages from Web domain providers."

Security researcher Petko D. Petkov of GNUCitizen.org, who identified a Gmail vulnerability last year, said the technique described by Partridge appeared to be some form of cross-site scripting (XSS), rather than the cross-site request forgery vulnerability he had found. Though his assessment may be misplaced in this instance, it would be unwise to believe that no further Gmail holes will be identified.

Evans recommends that Google users only enter Gmail sign-in credentials to Web addresses starting with https://www.google.com/accounts and that they "never click-through any warnings your browser may raise about certificates."

It might also be worth adding that one should be skeptical about the legitimacy of e-mail messages, particularly from unknown sources.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Reflections on Tech in 2019
James M. Connolly, Editorial Director, InformationWeek and Network Computing,  12/9/2019
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll