123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Professional Identifies New Cookiejacking Threat

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, an Italian security researcher identified vulnerability in Internet Explorer (IE), which attackers may exploit to extract sensitive information related to Internet users. Rosario Valotta, identified a new cookiejacking technique, which he used to hijack cookies by bypassing the protection on IE. However, the attack requires user action to be successful. The researcher has termed the cookiejacking technique as an advanced clickjacking approach, which exploits zero day vulnerability. Attackers need to extract victim's username on Windows, identify the operating system in use. This helps attackers to determine the folders, which store the cookies. Attackers may then use clickjacking technique to place cookie text behind a picture. Again, fraudsters need to target cookie related to the website logged in by the user at the time of the attack. Attackers may exploit the vulnerability on all versions of IE including IE9 on any Windows operating system such as XP, Vista and even Windows 7. In this case, security researcher enticed Facebook users to play a game, which involves clicking, dragging and dropping. When users drag ...
... an object in the game to a picture, they inadvertently also send cookies to the fraudsters. Valotta was able to extract cookies of around 80 of his friends on Facebook within three days.

While the attack looks sophisticated, cybercriminals may extract the requisite information through browser exploits, javascript detection tools, and use social engineering techniques to make user perform a specific action. Web browsers use cookies to store site preferences and login credentials. Unwary Internet users often do not clear the cookies on the web browser. Some Internet users also check 'Remember my password' option or 'keep me logged in' option. Attackers may exploit the popularity of games on social networking sites to trick users into revealing sensitive information, without being aware of the malicious activity. Attackers may also attempt to steal confidential user information related to e-mail accounts, and online banking and shopping sites. Organizations must encourage employees to undertake e-learning and online degree programs on cyber security to avoid falling prey to social engineering attacks directed at stealing privileged business information. Cybercriminals may use the collected information to impersonate a legitimate user, conduct fraudulent transactions, and steal further personally identifiable information. Attackers may also leverage the victim's user name on Windows to gain remote access to a computer system.

Microsoft has reportedly described the latest security threat as not a high risk threat as successful attack requires high user interaction, visit to a malicious webpage, lured to drag and drop objects, and knowledge of the website, which the user is logged on to. However, security researchers at Trend Micro have argued that attackers may take advantage of negligence, and lack of security awareness among non-technical users to extract sensitive information through social engineering techniques. According to the Internet security firm, they block on an average around 13 million attempts by users to access malicious sites.

Developers must constantly identify the security flaws and initiate remediating measures to prevent their exploitation by attackers. The prevailing IT security scenario requires professionals to constantly enhance their skill sets and awareness through online university degree programs, and security conferences.

Internet users must refrain from clicking on links send by strangers, and be cautious while clicking links on websites. Deleting cookies, avoid clicking on 'remember my password' option, clearing browsing history may help protect Internet users from securing sensitive information. Internet users must avoid falling prey to playing enticing games and puzzles. Usually, professionals qualified in masters of security science and IT security certifications identify and warn users on latest security threats. Internet users must follow security blogs and advisories to abreast themselves of latest cyber threats.

Total Views: 211Word Count: 609See All articles From Author

Add Comment

Computers Articles

1. How A Free Seo Checker Can Help You Understand And Improve Your Website
Author: Mahesh

2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill

3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong

4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos

5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape

6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia

7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong

8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders

9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape

10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong

11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal

12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong

13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams

14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders

15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: