HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
Loredana BOTEZATU @lbotezatu
13 Comments
    Share This!
  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • ReddIt
Alerts • E-Threats

Yahoo Accounts Hijacked via XSS-Type Attack

January 30, 2013
3 Min Read

Popular webmail provider Yahoo has been slammed with a new e-mail-based attack that seizes control of victims’ accounts. Bitdefender Labs discovered the ongoing campaign today and are once again warning users about the dangers of clicking spammy links.

The account hijacking begins with a spam message with a short link to an apparently harmless session of the reliable news channel MSNBC (hxxp://www.msnbc.msn.com-im9.net[removed]).

A closer look at the real link reveals that the true domain is not part of MSNBC, but a crafty domain composed of subdomains at hxxp://com-im9.net.

The domain was registered in Ukraine on Jan 27 and is hosted in a data center in Nicosia, Cyprus. This page contains a piece of malicious JavaScript, disguised as the popular Lightbox library that will perform the attack in stage 2.

Before we proceed, let’s see what cookie theft is all about: security on the web is based on what we call the same-origin policy, a complex mechanism that won’t allow Site A to access resources of Site B, such as cookies. Cookies are small snippets of text created when the user logs into a system, and they are used to (among other things) remember that the account holder has already passed the authentication once. Otherwise, the user will have to log in whenever they read another e-mail or when they navigate from one page to another. So, in this context, it is obvious that a piece of code running on Site A can’t steal a cookie set by Site B. However, a subdomain of Site B can access the resources of Site B, and this is what the attackers did.

The second stage of the attack is focused on the Yahoo Developers Blog (developers.yahoo.com), which conveniently uses a buggy version of WordPress . More to the point, they exploit the SWF Uploader of the WordPress platform at http://developer.yahoo.com/blogs/ydn/wp-includes/js/swfupload/swfupload.swf. It has a security flaw known as CVE-2012-3414 (by the way, it has been patched since WordPress version 3.3.2).

Since it is located on a sub-domain of the yahoo.com website, all the attackers need to do is trigger the bug and pass a command that steals the Yahoo cookie (with the login data, for instance), and then send it “home”.

At this point, miscreants have full access to the victim’s contact list until the current session expires or the user logs out. Crooks will either spam the contacts in the stolen lists (which may include friends, family, business contacts, professors) or use these contacts to send spam e-mails and/or malware in the name of the crook.

Why is your account important for crooks?

If you are asking yourselves why crooks take an interest in your e-mail accounts and harvest the e-mail addresses of your friends, the answer is simple. To send more spam on your behalf.

Miscreants cannot register accounts automatically on webmail providers such as Yahoo, Google, Hotmail and the like because registrants need to fill in CAPTCHA. It takes time, and real people, to type the signs in. That, in turn, costs money. Stealing active accounts is a cost-effective way for an operator to automate attacks and, at the same time, allows them to read your contacts and get more victims.

What’s to be done?

Log out from your e-mail accounts every time you’re done reading or writing your e-mails.

Never click on links in spam e-mails.

Keep your antivirus and software updated.

Attack description provided by malware researchers Razvan Benchea and Octavian Minea.

All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.

Tagsmalicious link MSNBC slider spam e-mail xss Yahoo account

You may also like

Cruise line operator Hurtigruten crippled in ransomware attack
E-Threats • Industry News

Cruise line operator Hurtigruten crippled in ransomware attack

4 hours ago
Alerts

‘Tis the season for online fraud: Cybercriminals are on the prowl as consumers aim to spend big this Christmas

1 day ago
Alerts • E-Threats

Spammers Get Better at Impersonating Banking Services, Use Lingo and Legit Layouts to Con Victims

5 days ago

About the author

View All Posts

Loredana BOTEZATU

A blend of teacher and technical journalist with a pinch of e-threat analysis, Loredana Botezatu writes mostly about malware and spam. She believes that most errors happen between the keyboard and the chair. Loredana has been writing about the IT world and e-security for well over five years and has made a personal goal out of educating computer users about the ins and outs of the cybercrime ecosystem.

13 Comments

Click here to post a comment
  • Why Yahoo Mail Accounts Are Being Hijacked | Gens News says:
    February 2, 2013 at 6:37 am

    […] detailed by Romanian security firm Bitdefender, it begins when a computer user gets an email or tweet with a link, sometimes shortened, to what […]

  • Why Yahoo Mail Accounts Are Being Hijacked | CodeBlue Technology says:
    February 2, 2013 at 11:26 am

    […] detailed by Romanian security firm Bitdefender, it begins when a computer user gets an email or tweet with a link, sometimes shortened, to what […]

  • Yahoo tapones de los orificios que permiten el secuestro de cuentas de correo electrónico - | Indagadores |Seguridad informatica |Seguridad en internet says:
    February 3, 2013 at 9:26 pm

    […] El ataque comienza con los usuarios reciben un mensaje de spam con su nombre en la línea de asunto y un breve “echa un vistazo a esta página” mensaje seguido de un enlace bit.ly acortado. Al hacer clic en el enlace lleva a los usuarios a un sitio web hace pasar por el sitio de noticias de MSNBC que contiene un artículo acerca de cómo hacer dinero trabajando desde casa, los investigadores de BitDefender, dijo el miércoles en un entrada del blog . […]

  • Yahoo plugs hole that allowed hijacking of email accounts » Nottingham PC Repair says:
    February 3, 2013 at 9:29 pm

    […] The attack begins with users receiving a spam email with their name in the subject line and a short “check out this page” message followed by a bit.ly shortened link. Clicking on the link takes users to a website masquerading as the MSNBC news site that contains an article about how to make money while working from home, the Bitdefender researchers said Wednesday in a blog post. […]

  • Yahoo plugs hole that allowed hijacking of email accounts | Daily News! Blogger International says:
    February 3, 2013 at 9:31 pm

    […] The attack begins with users receiving a spam email with their name in the subject line and a short “check out this page” message followed by a bit.ly shortened link. Clicking on the link takes users to a website masquerading as the MSNBC news site that contains an article about how to make money while working from home, the Bitdefender researchers said Wednesday in a blog post. […]

  • Yahoo plugs hole that allowed hijacking of email accounts- Tech Support by RAN Services in Augusta, GA says:
    February 3, 2013 at 9:40 pm

    […] The attack begins with users receiving a spam email with their name in the subject line and a short “check out this page” message followed by a bit.ly shortened link. Clicking on the link takes users to a website masquerading as the MSNBC news site that contains an article about how to make money while working from home, the Bitdefender researchers said Wednesday in a blog post. […]

  • Yahoo plugs hole that allowed hijacking of email accounts | how to get the most from your gaming console says:
    February 3, 2013 at 10:07 pm

    […] The attack begins with users receiving a spam email with their name in the subject line and a short “check out this page” message followed by a bit.ly shortened link. Clicking on the link takes users to a website masquerading as the MSNBC news site that contains an article about how to make money while working from home, the Bitdefender researchers said Wednesday in a blog post. […]

  • Old Click » Yahoo plugs hole that allowed hijacking of email accounts says:
    February 3, 2013 at 10:33 pm

    […] The conflict starts with users receiving a spam email with their name in a theme line and a brief “check out this page” summary followed by a bit.ly condensed link. Clicking on a couple takes users to a website masquerading as a MSNBC news site that contains an essay about how to make income while operative from home, a Bitdefender researchers pronounced Wednesday in a blog post. […]

  • Yahoo plugs hole that allowed hijacking of email accounts | Online Games says:
    February 3, 2013 at 11:02 pm

    […] The attack begins with users receiving a spam email with their name in the subject line and a short “check out this page” message followed by a bit.ly shortened link. Clicking on the link takes users to a website masquerading as the MSNBC news site that contains an article about how to make money while working from home, the Bitdefender researchers said Wednesday in a blog post. […]

  • Cross-Site Scripting (XSS) | Technical Diary says:
    August 29, 2014 at 6:51 am

    […] http://www.hotforsecurity.com/blog/yahoo-accounts-hijacked-via-xss-type-attack-5172.html Share this:TwitterFacebookGoogleLike this:Like Loading… […]

  • How Finding a Fun Little Bug Can Avert Disaster | Cesar Vela says:
    January 13, 2016 at 1:47 am

    […] use it to mess with classmates, but it couldn’t be use to steal important information or hijack accounts like other notable cross site scripting bugs. I figured that the Business School professor who […]

  • How Finding a Fun Little Bug Can Avert Disaster - AltoSky - AltoSky says:
    January 13, 2016 at 3:15 am

    […] use it to mess with classmates, but it couldn’t be use to steal important information or hijack accounts like other notable cross site scripting bugs. I figured that the Business School professor who […]

  • xvoda tech | How Finding a Fun Little Bug Can Avert Disaster says:
    January 13, 2016 at 3:53 am

    […] use it to mess with classmates, but it couldn’t be use to steal important information or hijack accounts like other notable cross site scripting bugs. I figured that the Business School professor who […]

Phishers Steal German E-Mail Passwords, Full Mailbox Scam Goes International
New Wave of BBB Scam Spreads Downloader of ZBot
    Share This!
  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • ReddIt

Promo

1.3m
Fans
Like
105.5k
Followers
Follow
2.7k
Subscribers
Subscribe
▲ 1
19
Subscribers
subscribe
1.4m
Fans Love us

Recent shouts

  • Meurig Parri on Microsoft Ends Support for Windows 7. What You Need to Know
  • Kevin on Cable Haunt vulnerability affects millions of Broadcom cable modems
  • Terry on Ransomware attack forces Arkansas CEO to fire 300 employees days before Christmas
  • Martin on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre
  • Xander on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre

Time Machine

December 2020
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Nov    

ANTIVIRUS SOFTWARE FOR HOME USERS

Bitdefender Cybersecurity for Smart Home
Bitdefender Complete Protection
Bitdefender PC Protection
Bitdefender Antivirus for Mac
Bitdefender Mobile Security for Android
Bitdefender Product Comparison

BUSINESS SOLUTIONS

Bitdefender GravityZone Business Security
Bitdefender GravityZone Advanced Business Security
Bitdefender GravityZone Enterprise Security
Bitdefender Hypervisor Introspection

TOOLS & RESOURCES

Renewal for Business Customers
Trial Downloads
Free Antivirus
Free Online Virus Scanner
Free Virus Removal Tools
Live Remote Assistance
Free Tools
Bug Bounty
Press Center

Powered by Bitdefender - a leading cyber security technology provider | Copyright © 2008 - 2016. All rights reserved.
  • Home
  • The Team
  • Terms and Conditions
  • Contact
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok