TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

You think you can't be phished?

192 pointsby ribasushiabout 8 years ago

29 comments

walrusabout 8 years ago
Firefox: open about:config, set network.IDN_show_punycode to true. Next time you open the page, the address bar will show <a href="https:&#x2F;&#x2F;www.xn--80ak6aa92e.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.xn--80ak6aa92e.com&#x2F;</a> instead of <a href="https:&#x2F;&#x2F;www.apple.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.apple.com&#x2F;</a>. Better yet, always type in or bookmark pages where you might enter sensitive information.<p>I was surprised this was still an issue, as I heard about IDN homograph attacks years ago.
评论 #14159775 未加载
评论 #14160004 未加载
评论 #14160302 未加载
评论 #14160571 未加载
inetknghtabout 8 years ago
The fact that I have to open developer tools to inspect the cert on Chrome is <i>infuriating</i>.
评论 #14158712 未加载
评论 #14158665 未加载
评论 #14159370 未加载
评论 #14158573 未加载
评论 #14158850 未加载
评论 #14158692 未加载
评论 #14158675 未加载
beamatronicabout 8 years ago
What if you just don&#x27;t click on any links in email? Particularly if they are really important sites. Just accomplish the proposed task another way. For example, if you get an email from Paypal, stating that you need to update a credit card or something, don&#x27;t click their link, instead open a browser and enter &quot;<a href="https:&#x2F;&#x2F;www.paypal.com&quot;" rel="nofollow">https:&#x2F;&#x2F;www.paypal.com&quot;</a> yourself, and go into your account information and look for your saved payment methods.<p>edit: typos
评论 #14159988 未加载
评论 #14158883 未加载
评论 #14158643 未加载
评论 #14159705 未加载
评论 #14159124 未加载
评论 #14159706 未加载
评论 #14158782 未加载
jdavis703about 8 years ago
Which is why I look for the organization&#x27;s name in the browser bar when I&#x27;m logging in to a high-value website (Google, Apple my bank, etc). For those who don&#x27;t know the UI for extended verification certificates see the difference in the screenshot: <a href="http:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;ycVwA" rel="nofollow">http:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;ycVwA</a>.
评论 #14160224 未加载
评论 #14158750 未加载
评论 #14158465 未加载
评论 #14158932 未加载
542458about 8 years ago
Amusingly, Facebook seems to block this link from being posted publicly (The site reports &quot;There was a problem updating your status. Please try again in a few minutes&quot; - private messages work fine however).<p>I wonder what Facebook&#x27;s heuristic there is, since they don&#x27;t seem to block all punycode URLs. Maybe something about character distribution (all latin-like characters -&gt; probably phishing)?<p>Edit: Actually, it might not be a block at all. I think it might just be a bug in Facebook&#x27;s URL parser, since when pasted into messages the automatic hyperlink is set to <a href="http:&#x2F;&#x2F;invalid.invalid" rel="nofollow">http:&#x2F;&#x2F;invalid.invalid</a>.
js2about 8 years ago
The latest version of Chrome renders the URL in the original punycode, not as apple.com. The browser vendors all use their own algorithm for deciding when to render as punycode vs unicode:<p><a href="https:&#x2F;&#x2F;www.chromium.org&#x2F;developers&#x2F;design-documents&#x2F;idn-in-google-chrome" rel="nofollow">https:&#x2F;&#x2F;www.chromium.org&#x2F;developers&#x2F;design-documents&#x2F;idn-in-...</a>
artimaeisabout 8 years ago
This is probably the most effective advertising to update to the newest Chrome release that I&#x27;ve ever seen.
andreyfabout 8 years ago
If you use a password manager, it most likely won&#x27;t auto-fill apple.com&#x27;s passwords on <a href="https:&#x2F;&#x2F;www.xn--80ak6aa92e.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.xn--80ak6aa92e.com&#x2F;</a>
评论 #14159145 未加载
irl_about 8 years ago
I really hope things like this do not lead us to a mentality that anything that isn&#x27;t the Latin alphabet is malware or spam. There are people in the world using non-Latin alphabets and allowing them to have domain names in their native alphabets is a good thing, we just haven&#x27;t worked out how to do it securely yet.<p>Disabling the rendering of punycode is actually not helpful in cases where you wanted to visit a domain using the Cyrillic alphabet which you want to be sure of, and someone registered some similar looking domain which looks equally like a bunch of gibberish to the one you&#x27;re looking for.<p>Some suggestions, maybe good, maybe bad:<p>* It may be as simple as adding a character set into the address bar<p>* Flag a warning if the domain name alphabet doesn&#x27;t match the page content (as would be the case in this example) or maybe something else
kardosabout 8 years ago
&gt;This affects the current version of Chrome browser, which is version 57.0.2987 and the current version of Firefox, which is version 52.0.2.<p>Firefox 52.0.2 &amp; linux here, and the &quot;L&quot; in the URL looks like a capital i with serifs - quite noticeable. Perhaps different on windows&#x2F;osx though.
评论 #14159574 未加载
gwu78about 8 years ago
Text-only browser shows the IDN, not the phished domain.<p>&lt;&#x2F;sarcasm&gt;I guess I need to &quot;upgrade to a modern browser&quot; for websites to work correctly?&lt;&#x2F;sarcasm&gt;<p>As an aside, I still do not understand how &quot;modern&quot; browsers evolved to hiding portions of the URL or using a phony address bar i.e. &quot;omnibox&quot; to the right of the real address bar.<p>In the first case, it seems to offer no benefit other than to hide important details.<p>In the second case, it seems so overtly deceptive for newcomers to the www that I am surprised they could pull it off.<p>Maybe these things have changed recently as these monster programs are constantly changing. If so, pardon my ignorance.<p>Is it not true that users who do not understand the basics of www usage e.g., what is a domain, a URL, etc. are always going to be at risk of manipulation?
评论 #14159840 未加载
gommmabout 8 years ago
As much as I like Firefox, I don&#x27;t really agree with their reason for not considering this to be a bug: <a href="https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1332714" rel="nofollow">https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1332714</a><p>&gt; Indeed. Our IDN threat model specifically excludes whole-script homographs, because they can&#x27;t be detected<p>&gt; programmatically and our &quot;TLD whitelist&quot; approach didn&#x27;t scale in the face of a large number of new TLDs. If you are<p>&gt; buying a domain in a registry which does not have proper anti-spoofing protections (like .com), it is sadly the<p>&gt; responsibility of domain owners to check for whole-script homographs and register them.<p>&gt; We can&#x27;t go blacklisting standard Cyrillic letters.
robbykingabout 8 years ago
I wanted to share the fake Apple URL with my team, and Slack expanded it to <a href="https:&#x2F;&#x2F;www.xn--pple-43d.com" rel="nofollow">https:&#x2F;&#x2F;www.xn--pple-43d.com</a> when I hit send.
评论 #14158731 未加载
TheAceOfHeartsabout 8 years ago
Even though Safari is behind the curve for many web tech features, I&#x27;ve been pretty happy using it as my main browser for the last few months. On a MacBook Pro, none of the browsers even come close to competing with Safari when it comes to battery life. I still keep Chromium and Firefox installed, and Chromium is my go-to option for web development. But I&#x27;m happy to find that Safari has sane defaults when it comes to displaying URLs.
LeoPantheraabout 8 years ago
Safari is not fooled. <a href="http:&#x2F;&#x2F;i.imgur.com&#x2F;2PyCWtz.png" rel="nofollow">http:&#x2F;&#x2F;i.imgur.com&#x2F;2PyCWtz.png</a>
评论 #14158866 未加载
评论 #14158879 未加载
评论 #14159285 未加载
amenghraabout 8 years ago
U2F as a second factor prevents this (and many other) kinds of phishing attacks.<p>The token&#x27;s crypto takes the page&#x27;s domain into account.
SadWebDeveloperabout 8 years ago
Verified by: Let&#x27;s Encrypt<p>Somehow i was expecting that comodo was the one culprit for the valid cert but i forgot how easy is to ask for certs like this. Sometimes i think that lets encrypt is hurting more than doing good.
评论 #14162909 未加载
zullnabout 8 years ago
A password manager would be what (hopefully) saves me from this.
_nalplyabout 8 years ago
I thought about normalising homographs then I tried out an implementation.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;nalply&#x2F;homoglyph_normalize" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;nalply&#x2F;homoglyph_normalize</a><p>The idea is: get confusables.txt from Unicode and generate from that a JavaScript object which does the mapping.<p>It&#x27;s not guaranteed to work, I didn&#x27;t even test it, but it&#x27;s perhaps a starting point for whatever you want to do with it.
jwilkabout 8 years ago
Previous discussion:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14119713" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14119713</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14130241" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14130241</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14153900" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14153900</a>
helthanatosabout 8 years ago
The good news is, it&#x27;s hard to find characters that actually look like latin characters. This uses the Cyrillic characters, but there are no characters resembling g or d, so most websites are safe from this. Though, it is incredibly infuriating that it doesn&#x27;t show the punycode unless you try to find it.
mercerabout 8 years ago
Would a possible solution be to check if a url contains &#x27;ambiguous&#x27; letters, and if so, transform all these letters to the more common versions and then check if that domain already exists? If it does, give the user a warning.
makkesk8about 8 years ago
I was affected in chrome, then i went ahead and navigated to chrome:&#x2F;&#x2F;help&#x2F; and I was no longer affected. Gj google.
goodplayabout 8 years ago
Non-ev HTTPS should loose its green color. The green padlock should only be displayed with ev certs.
Exumaabout 8 years ago
Damn...... so ive been vulnerable up until v58 released a few days ago? WTF?
评论 #14158523 未加载
dorfsmayabout 8 years ago
Can somebody confirm that the link is safe to open?
评论 #14158887 未加载
评论 #14158843 未加载
tenerabout 8 years ago
Made me update to Chrome v58 right away.
Dylan16807about 8 years ago
This article is too narrowly focused on IDN. appie.com has fundamentally the same problem, despite being pure ASCII.
评论 #14159122 未加载
diminotenabout 8 years ago
The bug report in Chromium.<p><a href="https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=683314" rel="nofollow">https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=683314</a>
评论 #14158784 未加载