NOTICE: Please be informed that this wonderful blog has been moved from www.audiencegist.us to www.audiencegist.com.ng .
Own A Blog Like This
For Questions, Inquiries, Click Here
Page | Group - Follow us - Call us -
Hire Us - info.dhraysblog@gmail.com



Thursday 31 August 2017

Browser AutoFill Feature Can Leak Your Personal Information to Hackers

Just like most of you, I too really hate filling out web forms, especially on mobile devices.


To help make this whole process faster, Google Chrome and other major browsers offer “Autofill” feature that automatically fills out web form based on data you have previously entered in similar fields.

However, it turns out that an attacker can use this autofill feature against you and trick you into spilling your private information to hackers or malicious third parties.
Finnish web developer and whitehat hacker Viljami Kuosmanen published a demo on GitHubthat shows how an attacker could take advantage of the autofill feature provided by most browsers, plugins, and tools such as Password Managers.
Although, this trick was first discovered by Ricardo Martin Rodriguez, Security Analyst at ElevenPaths, in the year 2013, but it seems Google haven’t done anything to address weakness in Autofill feature.
The proof-of-concept demo website consists of a simple online web form with just two fields: Name and Email. But what’s not visible are many hidden (out of sight) fields, including the phone number, organization, address, postal code, city, and country.
Giving away all your Personal Information Unknowingly
So, if users with an autofill profile configured in their browsers fill out this simple form and click on submit button, they’ll send all the fields unaware of the fact that the six fields that are hidden to them but present on the page also get filled out and sent to unscrupulous phishers.

You can also test your browser and extension autofill feature using Kuosmanen’s PoC site.
Kuosmanen can make this attack even worse by adding more personal fields out of user’s sight, including the user’s address, credit card number, expiration date, and CVV, although auto-filling financial data forms will trigger warnings on Chrome when sites do not offer HTTPS.
Kuosmanen attack works against a variety of major browsers and autofill tools, including Google Chrome, Apple Safari, Opera, and even the popular cloud security vault LastPass.

Mozilla’s Firefox users do not need to worry about this particular attack as the browser currently, does not have a multi-box autofill system and forces users to select pre-fill data for each box manually.
Therefore, the Firefox browser can’t be tricked into filling text boxes by programmatic means, Mozilla principal security engineer Daniel Veditz says.
Here’s How to Turn Autofill Feature Off
The simplest way to protect yourself against such phishing attacks is to disable form autofill feature in your browser, password manager or extension settings.
Autofill feature is turned on by default. Here’s how to turn this feature off in Chrome:
Go to Settings → Show Advanced Settings at the bottom, and under the Passwords and Formssection uncheck Enable Autofill box to fill out web forms with a single click.
In Opera, go to Settings → Autofill and turn it off.
In Safari, go to Preferences and click on AutoFill to turn it off.
 
Thanks for visiting NaijaDoe i hope you find this post useful and helpful, do comment below

No comments:

Post a Comment

If you enjoy reading this article, feel free to share with other. Sharing is caring!