Visiting a booby-trapped website, the bogus webpage designed for phishing, means inviting cyber attackers to your home, a hacker turned security researcher has warned.
The attacker exploits the shortcomings in many routers -- the device which forwards data packets to their destinations -- to find out a key identification number that can reveal the victim's whereabout in minutes, noted hacker Samy Kamkar said.
Demonstrating such an attack at the recently concluded Black Hat hacker conference in Las Vegas, Kamkar described how web attacks that begin with making contact with the target (user) can be used to find a person's physical location.
After making contact, the target is convinced to visit a booby-trapped website designed by the attacker. Once the victim clicks the attacker's link, Kamkar showed how the attacker can manipulate geo location data from Google to pinpoint a victim's precise location, the BBC reported.
Many people go online via a router and typically only the computer directly connected to the device can interrogate it for ID information.
However, Kamkar found a way to booby-trap a webpage via a browser so the request for the ID information looks like it is coming from the PC on which that page is being viewed.
He then coupled the ID information, known as a MAC address, with a geo-location feature of the Firefox web browser. This interrogates a Google database created when its cars were carrying out surveys for its Street View service.
This database links Mac addresses of routers with GPS co-ordinates to help locate them.
"This is geo-location gone terrible," said Kamkar during his presentation. "Privacy is dead, people. I'm sorry."
Mikko Hypponen, senior researcher at security firm F Secure, attended the presentation and said it was "very interesting research".
"The thought that someone, somewhere on the net can find where you are is pretty creepy," he said.
"Scenarios where an attack like this would be used would be stalking or targeted attacks against an individual," he added.
"The fact that databases like Google Streetview's Mac-to-Location database or the Skyhook database can be used in these attacks just underlines how much responsibility companies that collect such data have to safeguard it correctly," said Mr Hypponen.
In 2005, Mr Kamkar created a worm that exploited security failings in web browsers to garner more than one million "friends" on the MySpace social network in one day.
Prosecuted for the hacking, Kamkar was given three years' probation and 90 days of community service and paid damages. He was also banned from using the net for personal purposes for an undisclosed amount of time.
Friday, August 13, 2010
Subscribe to:
Post Comments (Atom)
Popular Posts
-
more reasons to NEVER EVER do ONLINE DATING! or HOOK UP WITH ANYONE ONLINE! by Lou Sessinger A homeless man who used a phony investment sche...
-
Cyberpaths come from all walks of life. Seemingly the most inocuous and upstanding persons have secret lives where they feel powerful &...
-
Has your favorite dating site gotten complaints? are they a RIP OFF? Click any of the links below and find out!! ADULT SITES #1 ADULT SITES ...
-
Warning sounded over 'flirting robots' Those entering online dating forums risk having more than their hearts stolen. A program that...
-
We are publishing these; recieved from Stone's victims - as examples to our many readers of what these harassers will do and continue to...
-
Written by the Fighter Team (originally published December 02, 2005) Here's the question - is it LEGAL to expose a cheater or abuser onl...
-
Think you know who your real online friends are? You could be just a few hops away from a cybercriminal in today's social networks By Ke...
-
By Declan Harvey The government's top legal adviser has issued a new warning over abusive tweets and Facebook posts. Attorney General Do...
-
This summary is not available. Please click here to view the post.
-
By James Titcomb A jilted boyfriend was jailed today for taking revenge on his ex-lover - by putting their home-made sex videos onto the int...
Blog Archive
-
▼
2010
(242)
-
▼
August
(20)
- Ex Boyfriend Blogs, Breaks Restraining Order - Goe...
- Ex Boyfriend Blogs, Breaks Restraining Order - Goe...
- YOUR PERSONAL INFO - JUST A CLICK AWAY?
- YOUR PERSONAL INFO - JUST A CLICK AWAY?
- Puppetmaster Cyberpath Coerces Victims into Webcam...
- Puppetmaster Cyberpath Coerces Victims into Webcam...
- Meets Them on Craigslist, then Harasses Them
- Meets Them on Craigslist, then Harasses Them
- Couple Uses Online Dating to Extort Money
- Couple Uses Online Dating to Extort Money
- Online Harassment Getting Serious Legal Attention
- Online Harassment Getting Serious Legal Attention
- Web Attacks Can Find Out Where You Live
- Web Attacks Can Find Out Where You Live
- Internet Harassment & Revenge is a Crime
- Internet Harassment & Revenge is a Crime
- Ex-Girlfriend Smeared Online by Cop
- Ex-Girlfriend Smeared Online by Cop
- Harassment Pushed Victim to File Lawsuit
- Harassment Pushed Victim to File Lawsuit
-
▼
August
(20)
0 comments:
Post a Comment