Cloud

10/25/2018
03:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Side-Channel Attack Exposes User Accounts on Facebook, XBox, Other Social Sites

Researcher will demonstrate at Black Hat Europe his team's recent discovery: a way to exploit popular user-blocking feature on social media and other sites.

Blocking people on social media and other sites is a popular privacy and security option for online users, but security researchers in Japan have discovered a way to abuse that feature and access sensitive information about users who deploy it.

At least a dozen social media and other online sites – including Facebook, Instagram, Tumblr, Google+, Twitter, eBay, PornHub, Medium, Xbox Live, Ashley Madison, Roblox, and Xvideos – were vulnerable to the side-channel attack found by researchers at NTT Secure Platform Laboratories and Waseda University. So far, Twitter and eBay have updated their platforms to prevent the attack, and some browsers, including Microsoft Edge, Microsoft Internet Explorer, and Mozilla Firefox, have added a feature to thwart the attack, according to Takuya Watanabe, who will present his team's findings in December at Black Hat Europe in London.

Watanabe and fellow researchers Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, and Tatsuya Mori disclosed their initial research earlier this year at the IEEE European Symposium on Security and Privacy. They also provided suggestions to social media, platform, and browser vendors on how to thwart the attack.

"No matter how robust the security algorithm is, attackers will look for ways to bypass it. The side-channel attack we introduce is one of its practical cases," Watanabe said in an email interview. "Service providers need to design a robust service while recognizing such risk."

At Black Hat Europe, Watanabe plans to detail the attack as well as countermeasures recently adopted by vendors. "Furthermore, I will show whether services will be affected by functions other than user blocks," he said.

The Attack
The side-channel attack exploits the user-blocking function of a social media or other platform by taking advantage of its feature that requires certain Web pages to return specific Web content. If the victim is logged into the social media platform, the attacker can wage an attack on that user when he or she visits the attacker's site. The attacker can surreptitiously communicate with the victim's social media platform and steal personal information from his or her account.

"We generalize this property as 'visibility control,' which we consider to be the fundamental assumption of our attack. Building on this primitive, an attacker with a set of controlled accounts can gain a flexible control over the data leaked through the side channel. Using this mechanism, it is possible to design a robust, large-scale user identification attack on social web services," the researchers wrote in their paper on the attack. 

Such an attack basically exposes the social media account of a user – including name, activities, and posts – who visits the attacker's website. "By exploiting the blocking function, an attacker can identify the social web service account of a visitor to an attacker's website. That is, an attacker or a malicious marketer can grasp the visitor's real name and daily posts," Watanabe told Dark Reading.

The user-blocking function allowing the user to control visibility of his or her profile to other users is basically exploited, he said. "I believe that this social nature is the cause," Watanabe said.

An attacker first would need to phish the user via an email or use other means to lure him or her to the malicious website. Or "if an attacker is a malicious marketer who wants to collect the visitor's personal information: just wait for the user's visit" to its website, he said.

[See Takuya Watanabe give his talk at Black Hat Europe on the social media side-channel attack, "I Block You Because I Love You: Social Account Identification Attack Against a Website Visitor."]

The attack, which targets Windows users, employs a combination of cross-site request forgery (CSRF) and timing attacks. This allows the attacker to bypass the same-origin policy on a website to grab information about the target's view of other sites – namely, the social media or other platform. The attack measures via JavaScript code the round-trip times of the website visitors, which allows the attacker to identify social media accounts and determine user-blocking status.

Watanabe says while the underlying security weaknesses exploited in the attack are "deep-rooted," there are ways to defend against it. The SameSite feature that removes cookies from cross-site requests is one defense. Microsoft and Mozilla have adopted SameSite in their browsers, he noted.

"It is a function that can comprehensively prevent CSRF attacks including our attack. Based on our attack demonstration, it was installed in most major browsers," he said.

Social media users can protect themselves either via private browsing mode or by signing out of their social media accounts when browsing elsewhere.

Related Content:

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.
CVE-2018-20727
PUBLISHED: 2019-01-17
Multiple command injection vulnerabilities in NeDi before 1.7Cp3 allow authenticated users to execute code on the server side via the flt parameter to Nodes-Traffic.php, the dv parameter to Devices-Graph.php, or the tit parameter to drawmap.php.