Researchers bypass Google redirect notice

By

Burmese hacker group post proof of concept.

The Burmese YGN hacker group has detailed a URL redirect vulnerability that bypasses Google’s checks to point users to malicious websites.

Researchers bypass Google redirect notice

The flaw exists in the way that Google checks redirected URLs against a blacklist of known malicious web sites.

The attacker would send a victim a proxy server link which redirected to a malicious URL and, when clicked, would verify if the landing website was blacklisted by Google.  

If it was, the server would generate a second malicious URL to infect users.

Researchers posted a proof of concept of the vulnerability on the YGN site.

Google redirect notice:

http://www.google.com/url?sa=t&url=http%3A%2F%2Fattacker.in%2Fmalware_exists_in_this_page%2F.

Bypass:

http://www.google.com/url?sa=t&url=http%3A%2F%2Fattacker.in%2Fmalware_exists_in_this_page%2F&usg=AFQjCNEBtpLqGPICIMz5TJZqfNsZKtHbRg

“The bypass link will last as long as Google doesn't change its internal algorithm that compares the hash against the provided URL,” researchers said.

Google posted tips to mitigate the risk of abuse of open redirect URLs.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

University of Western Australia resets all staff and student passwords

University of Western Australia resets all staff and student passwords

"Shade BIOS" stealth malware hides below operating system

"Shade BIOS" stealth malware hides below operating system

Researchers poke further holes in TETRA encrypted wireless comms

Researchers poke further holes in TETRA encrypted wireless comms

"BitUnlocker" full-volume encryption bypass found by Microsoft researchers

"BitUnlocker" full-volume encryption bypass found by Microsoft researchers

Log In

  |  Forgot your password?