Monday, August 5, 2013

Published 7:09 AM by

JavaScript and timing can steal all the data from your browser

JavaScript and timing can steal all the data from your browser


A group of British security experts warned of a serious vulnerability in how modern browsers work with JavaScript and iFrame. According to them, the problem is deeper than it may at first seem, as the new technique is a combination of JavaScript-timing attacks, allows you to read any information from the browser's memory and sites to which the user is currently connected to. Authors technique say that the attack works on all major browsers and no easy way to get rid of it does not exist. technique uses a set of known issues of web browsers and JavaScript, but also involves a number of new elements that can be used with the previously known features for a complete access to the source code of pages in which the user is currently.

 In practice, it provides data on online banking person to open his personal data and receive data on bank cards. Gender Stone, author of the procedure, said that his technique is in principle possible to improve and achieve even more success. "I am confident that it will take time and technology will be improved," - he said. One of the finds of Stone - a trick that allows hackers to view what websites before browsing user. With the help of special equipment Stone managed to slow the process of rendering frames in a browser and see what the user sees. He also noticed that when the page uses JavaScript-animation, it is even more slow rendering pages.

This allows you to measure the frame rate and when the user clicks on the link, there is a change in the rate of processing frame rate and it also allows you to calculate exactly which links are pressed. In the end, the browser draws links as new, but then checks the database, if pressed on them before the user. If a match is, the link is marked as previously pressed. Stone showed for the technique at the Black Hat 2013. According to him, he created a program that analyzes the process of drawing frames and transmits the data to a potential attacker about what is happening in the user's browser. "When the browser renders a reference for the first time, the first frame is always slow.

If all links have not been previously pressed users, the second shot will be much faster. If you are pressed, then the second and subsequent frames also will slow rendering, "- says Stone. According to him, the highlight of this attack is the fact that there is nothing to fix. That is, you can not just release a patch to eliminate the problem. All browsers are initially on such algorithm. second part of Paul Stone's attack even more dangerous. It relies on the browser used format Scalable Vector Graphics, which is used on web pages.

 He found that the SVG-filters in browsers allow an attacker to see exactly what the user sees in the current browser window using the filter feature, Stone created a system that literally draws the contents of the screen pixels. As part of its report on the Black Hat USA 2013 Stone shows program that has revolutionized the remote computer, receiving a JavaScript code iFrame content in the victim's browser. According to experts, a similar technique can get the source code page to the victim computer.

 At presentation, he showed hacking closed pages on Google+, which contained the address, phone number and other personal data of the user. He also noted that the Firefox vulnerability with SVG already eliminated However, in other browsers it is still present.

      edit