Account Login/Registration

Access KamloopsBCNow using your Facebook account, or by entering your information below.


Facebook


OR


Register

Privacy Policy

Tricky new Gmail hacking technique more effective than ever

A new phishing technique targeting Gmail and other services has been gaining popularity during the past year among attackers. Over the past few weeks there have been reports of experienced technical users being hit by this.

According to Mark Maunder of Wordfence, an attacker will send an email to your Gmail account that may come from someone you know who has had their account hacked using this technique. It may also include something that looks like an image of an attachment you recognize from the sender.

If you click on the image, expecting Gmail to give you a preview of the attachment, a new tab will open up and you will be prompted by Gmail to sign in again.

Once you complete sign-in, your account has been compromised.

“The attackers log in to your account immediately once they get the credentials, and they use one of your actual attachments, along with one of your actual subject lines, and send it to people in your contact list,” said a commenter on Hacker News.

“For example, they went into one student’s account, pulled an attachment with an athletic team practice schedule, generated the screenshot, and then paired that with a subject line that was tangentially related, and emailed it to the other members of the athletic team.”

Once they have access to your account, the attacker also has full access to all your emails including sent and received up to this point.

Now that they control your email address, and gain access to tons of other services using password retrieval.

<who> Photo Credit: Wiki Commons.

How to protect yourself against this phishing attack

This phishing technique uses something called a ‘data URI’ to include a complete file in the browser location bar. When you glance up at the browser location bar and see ‘data:text/html…..’ that is actually a very long string of text.

Instead of ‘https’ you have ‘data:text/html,’ followed by the usual ‘https://accounts.google.com….’. If you aren’t paying close attention you will ignore the ‘data:text/html’ preamble and assume the URL is safe.

<who> Photo Credit: WordFence.com. </who> This photo shows a link with proper protocol, insecure protocol and the link used in this hack.

When you sign in to any service, check the browser location bar and verify the protocol, then verify the hostname.

Make sure there is nothing before the hostname ‘accounts.google.com’ other than ‘https://’ and the lock symbol. You should also take special note of the green color and lock symbol that appears on the left.

Enable two factor authentication if it is available on every service that you use. Gmail calls this “2- step verification.” Enabling two factor authentication makes it much more difficult for an attacker to sign into a service that you use, even if they manage to steal your password using this technique.

There is no sure way to check if your account has been compromised. If in doubt, change your password immediately. Changing your password every few months is good practice in general.



Send your comments, news tips, typos, letter to the editor, photos and videos to [email protected].



Weather
webcam icon

weather-icon
Fri
13℃

weather-icon
Sat
13℃

weather-icon
Sun
17℃

weather-icon
Mon
18℃

weather-icon
Tue
20℃

weather-icon
Wed
13℃
current feed webcam icon

Top Stories

Follow Us

Follow us on Instagram Follow us on Twitter Like us on Facebook Follow us on Linkedin
Follow Our Newsletter
Privacy Policy