Researchers bypass Google redirect notice

Powered by SC Magazine
 

Burmese hacker group post proof of concept.

The Burmese YGN hacker group has detailed a URL redirect vulnerability that bypasses Google’s checks to point users to malicious websites.

The flaw exists in the way that Google checks redirected URLs against a blacklist of known malicious web sites.

The attacker would send a victim a proxy server link which redirected to a malicious URL and, when clicked, would verify if the landing website was blacklisted by Google.  

If it was, the server would generate a second malicious URL to infect users.

Researchers posted a proof of concept of the vulnerability on the YGN site.

Google redirect notice:

http://www.google.com/url?sa=t&url=http%3A%2F%2Fattacker.in%2Fmalware_exists_in_this_page%2F.

Bypass:

http://www.google.com/url?sa=t&url=http%3A%2F%2Fattacker.in%2Fmalware_exists_in_this_page%2F&usg=AFQjCNEBtpLqGPICIMz5TJZqfNsZKtHbRg

“The bypass link will last as long as Google doesn't change its internal algorithm that compares the hash against the provided URL,” researchers said.

Google posted tips to mitigate the risk of abuse of open redirect URLs.

Copyright © SC Magazine, Australia


Researchers bypass Google redirect notice
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1032

Vote