Mobile browser vulnerabilities allow hackers to spoof website addresses
Vulnerabilities have been found in multiple mobile browsers that allow hackers to spoof the URL of websites in the address bar.
Detailed today by researcher Tod Beardsley at Rapid7 Inc., the address bar spoofing vulnerabilities were found in Apple Inc.’s Safari, Opera Touch/Mini, Yandex, Bolt Browser, RITS Browser and UC Browser. Although most of those are not widely known, Safari is the default browser in iOS and iPadOS, while the Opera browsers are popular on some low-end phones.
Exploiting the vulnerabilities, an attacker can present a fake URL in the address bar for a given webpage, fooling users into believing that they may be on a legitimate site when they are on a fake phishing or similar scam website.
Address spoofing isn’t new and it’s not limited to mobile browsers, but part of the issue lies with how mobile browsers present addresses. In a desktop browser, there are security features and signs to verify if the address is legitimate, but mobile browsers don’t have them.
“Essentially, if your browser tells you that a pop up notification or a page is ‘from’ your bank, your healthcare provider or some other critical service you depend on, you really should have some mechanism of validating that source,” Beardsley explained. “In mobile browsers, that source begins and ends with the URL as shown in the address bar. The fact of the matter is, we really don’t have much else to rely on.”
Rapid7 reached out to the companies behind the various browsers when they first discovered the issue in the northern summer. Both Apple and Opera responded promptly and have since patched the vulnerabilities in newer releases. Yandex, which is popular in Russia has also since addressed the vulnerability while RITS indicated that they were intending to fix the issue. UC and Bolt failed to respond.
“URL spoofing is one of the most common ways attackers trick people into clicking a phishing link — especially on mobile devices,” Hank Schless, senior manager, security solutions at mobile security firm Lookout Inc., told SiliconANGLE. “We’re all used to tapping on links that are sent to our mobile devices.”
Schless said people get countless delivery notifications when they buy something online and often quickly tap the link to check the tracking info. “Because the screen is smaller, it’s really hard to identify a spoofed URL with discrete changes,” he said. “For example, an attacker may add an accent or special character to one letter in the address that a user wouldn’t even notice. Mobile phishing is the fastest-growing problem for IT and security teams for this exact reason.”
A message from John Furrier, co-founder of SiliconANGLE:
Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.
We are holding our third cloud startup showcase on Sept. 22. Click here to join the free and open Startup Showcase event.
We really want to hear from you, and we’re looking forward to seeing you at the event and in theCUBE Club.