{"id":13892,"date":"2018-11-21T11:10:03","date_gmt":"2018-11-21T19:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/11\/21\/news-7659\/"},"modified":"2018-11-21T11:10:03","modified_gmt":"2018-11-21T19:10:03","slug":"news-7659","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/21\/news-7659\/","title":{"rendered":"Spoofed addresses and anonymous sending: new Gmail bugs make for easy pickings"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Wed, 21 Nov 2018 17:53:50 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/twitter.com\/cottenio\" target=\"_blank\" rel=\"noopener\">Tim Cotten<\/a>, a software developer from Washington, DC, was responding to a request for help from a female colleague last week, who believed that her Gmail account has been hacked, when he discovered <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener\">something phishy<\/a>. The evidence presented was several emails in her\u00a0<em>Sent<\/em> folder, purportedly sent by her to herself.<\/p>\n<p>Cotten was stunned when, upon initial diagnosis, he found that those sent emails didn\u2019t come from her account but from another, which Gmail\u2014being the organized email service that it is\u2014only filed away in her <em>Sent<\/em> folder. Why would it do that if the email wasn&#8217;t from her? It seems that while Google&#8217;s filtering and organizing technology worked perfectly, something went wrong when Gmail tried to process the emails&#8217;\u00a0<em>From<\/em> fields.<\/p>\n<h3>This trick is a treat for phishers<\/h3>\n<p>Cotten noted <a href=\"https:\/\/blog.cotten.io\/hacking-gmail-with-weird-from-fields-d6494254722f\" target=\"_blank\" rel=\"noopener\">in a blog post<\/a> that the <em>From<\/em> header of the emails in his coworker&#8217;s\u00a0<em>Sent<\/em> folder contained (1) the recipient\u2019s email address and (2) another text\u2014usually a name, possibly for increased believability. The presence of the recipient\u2019s address caused Gmail to move the email to the <em>Sent<\/em> folder while also disregarding the email address of the actual sender.<\/p>\n<div id=\"attachment_26399\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26399\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/attachment\/weird-header-structure\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/weird-header-structure.png\" data-orig-size=\"1638,800\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"weird-header-structure\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/weird-header-structure-300x147.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/weird-header-structure-600x293.png\" class=\"wp-image-26399 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/weird-header-structure-600x293.png\" alt=\"\" width=\"600\" height=\"293\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/weird-header-structure-600x293.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/weird-header-structure-300x147.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">Weird &#8220;From&#8221; header. <em>Screenshot by Tim Cotten, emphasis (in purple) ours.<\/em><\/p>\n<\/div>\n<p>Why would a cybercriminal craft an email that never ends up in a victim&#8217;s inbox? This tactic is particularly useful for a phishing campaign that banks on the recipient\u2019s confusion.<\/p>\n<p>\u201cImagine, for instance, the scenario where a custom email could be crafted that mimics previous emails the sender has legitimately sent out containing various links. A person might, when wanting to remember what the links were, go back into their sent folder to find an example: disaster!\u201d wrote Cotten.<\/p>\n<p>Cotten provided <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gmail-bugs-allow-changing-from-field-and-spoofing-recipients-address\/\" target=\"_blank\" rel=\"noopener\">a demo for Bleeping Computer<\/a> wherein he showed a potentially malicious sender spoofing the <em>From<\/em> field by displaying a different name to the recipient. This may yield a high turnover of victims if used in <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/business-email-compromise-scam-costs-pathe-21-5-million\/\" target=\"_blank\" rel=\"noopener\">a business email compromise<\/a> (BEC)\/CEO fraud campaign, they noted.<\/p>\n<p>After raising an alert about this bug, Cotten unknowingly opened the floodgates for other security researchers to come forward with their discovered Gmail bugs. <a href=\"https:\/\/twitter.com\/sephr\" target=\"_blank\" rel=\"noopener\">Eli Grey<\/a>, for example, shared the discovery of <a href=\"https:\/\/eligrey.com\/blog\/google-inbox-spoofing-vulnerability\/\" target=\"_blank\" rel=\"noopener\">a bug in 2017<\/a> that allowed for email spoofing, which has been fixed in the web version of Gmail but remains a flaw in the Android version. One forum commenter\u00a0<a href=\"https:\/\/news.ycombinator.com\/item?id=18457025\" target=\"_blank\" rel=\"noopener\">claimed<\/a> that the iOS Mail app also suffers from the same glitch.<\/p>\n<h3>Another one stirs the dust<\/h3>\n<p>Days after publicly revealing the Gmail bug, Cotten discovered another flaw wherein malicious actors can potentially hide sender details in the <em>From<\/em> header by forcing Gmail to display a completely blank field.<\/p>\n<div id=\"attachment_26400\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26400\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/attachment\/blank-sender\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-sender.png\" data-orig-size=\"1000,67\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"blank-sender\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-sender-300x20.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-sender-600x40.png\" class=\"wp-image-26400 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-sender-600x40.png\" alt=\"\" width=\"600\" height=\"40\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-sender-600x40.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-sender-300x20.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-sender.png 1000w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">Who&#8217;s the sender? <em>Screenshot by Tim Cotten, emphasis (in purple) ours.<\/em><\/p>\n<\/div>\n<p>He pulled this off by replacing a portion of his test case with a long and arbitrary code string, as you can see below:<\/p>\n<div id=\"attachment_26401\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26401\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/attachment\/the-string\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/the-string.png\" data-orig-size=\"707,268\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"the-string\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/the-string-300x114.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/the-string-600x227.png\" class=\"wp-image-26401 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/the-string-600x227.png\" alt=\"\" width=\"600\" height=\"227\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/the-string-600x227.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/the-string-300x114.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/the-string.png 707w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">The string. Screenshot from\u00a0<em>Tim Cotten, emphasis (in purple) ours.<\/em><\/p>\n<\/div>\n<p>Average Gmail users may struggle to reveal the true sender because clicking the <em>Reply<\/em> button and the \u201cShow original\u201d option still yields a blank field.<\/p>\n<div id=\"attachment_26402\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26402\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/attachment\/blank-reply\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-reply.png\" data-orig-size=\"1000,333\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"blank-reply\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-reply-300x100.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-reply-600x200.png\" class=\"wp-image-26402 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-reply-600x200.png\" alt=\"\" width=\"600\" height=\"200\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-reply-600x200.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-reply-300x100.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-reply.png 1000w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Screenshot by Tim Cotten, emphasis (in purple) ours.<\/em><\/p>\n<\/div>\n<div id=\"attachment_26403\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26403\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/attachment\/blank-show-orig\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-show-orig.png\" data-orig-size=\"1000,698\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"blank-show-orig\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-show-orig-300x209.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-show-orig-600x419.png\" class=\"wp-image-26403 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-show-orig-600x419.png\" alt=\"\" width=\"600\" height=\"419\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-show-orig-600x419.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-show-orig-300x209.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/blank-show-orig.png 1000w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">There&#8217;s nothing there! <em>Screenshot by Tim Cotten, emphasis (in purple) ours.<\/em><\/p>\n<\/div>\n<p>Missing sender details could potentially increase the possibility of users opening a malicious email to click an embedded link or open an attachment, especially if it contains a subject that is both actionable and urgent.<\/p>\n<h3>When met with silence<\/h3>\n<p>The Gmail vulnerabilities mentioned in this post are all related to user experience (UX), and as of this writing, Google has yet to address them. (Cotten <a href=\"https:\/\/blog.cotten.io\/ghost-emails-hacking-gmails-ux-to-hide-the-sender-46ef66a61eff\" target=\"_blank\" rel=\"noopener\">has proposed<\/a> a possible solution for the tech juggernaut.) Unfortunately, Gmail users can only wait for the fixes.<\/p>\n<p>Spotting phishing attempts or spoofed emails can be tricky, especially when cybercriminals are able to penetrate trusted sources, but a little vigilance can go a long, <em>long<\/em> way.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/\">Spoofed addresses and anonymous sending: new Gmail bugs make for easy pickings<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Wed, 21 Nov 2018 17:53:50 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/' title='Spoofed addresses and anonymous sending: new Gmail bugs make for easy pickings'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/shutterstock_302793251.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>This isn\u2019t the first time that Gmail, an email service used by billions, is found to have flaws. One security researcher discovered two in less than a week; another revealed a weakness that still leaves Android users open to phishing.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bleeping-computer\/\" rel=\"tag\">Bleeping Computer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eli-gray\/\" rel=\"tag\">eli gray<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gmail-bug\/\" rel=\"tag\">gmail bug<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phisher\/\" rel=\"tag\">phisher<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tim-cotten\/\" rel=\"tag\">tim cotten<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ux-flaws\/\" rel=\"tag\">ux flaws<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/' title='Spoofed addresses and anonymous sending: new Gmail bugs make for easy pickings'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/spoofing-anonymous-gmail-ux-bugs-phishing\/\">Spoofed addresses and anonymous sending: new Gmail bugs make for easy pickings<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12246,4503,20228,20229,11637,10510,20230,20231],"class_list":["post-13892","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bleeping-computer","tag-cybercrime","tag-eli-gray","tag-gmail-bug","tag-phisher","tag-social-engineering","tag-tim-cotten","tag-ux-flaws"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13892"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13892\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13892"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}