iTnews
  • Home
  • News
  • Technology
  • Security

Researcher uncovers timing attack to decloak Google users

By Juha Saarinen on Sep 12, 2014 5:39AM
Researcher uncovers timing attack to decloak Google users

But web giant isn't interested in remediating it.

A newly discovered timing attack could be used to identify Google users, in order to prove that they've visited a specific site, or even to serve up tailored content to targeted individuals.

The exploit could be used in so-called spearphishing campaigns and also to pinpoint users of the anonymising The Onion Router (TOR) software, if they are logged on to Google at the same time.

Andrew Cantino, vice president of engineering for business management software company Mavenlink, discovered the timing attack. He explained to iTnews that it is more targeted than theoretical.

"It wouldn't be hard to deploy against a small set of real users, but would be hard to use against many people at once," Cantino said.

A succesful timing attack to decloak a Google user has several steps, but is straightforward to execute Cantino wrote on his blog.

By recording the difference in loading times for a maliciously crafted page that repeatedly instantiates an image with a source that points to the URL of a Google Drive document, it is possible to identify when a specific targeted user such as a government official accesses it.

Sample code for Cantino's timing attack

"An attacker knows someone's Gmail address, makes a new Google Drive document and shares it only with this address, but un-checks the option that causes a share notification to be sent," Cantino said, describing the flow of the exploit.

"Now, when the targeted person visits a site controlled by the attacker, the attacker can identify the user based on this timing attack against the document," he said.

The attack has been disclosed to Google ahead of publication.

However, Cantino said Google has decided not to fix the problem as it deemed the risk being fairly low as well as the attack being difficult to exploit against large amounts of users.

"... and we don't have an effective solution," Google told Cantino.

Cantino was awarded two prizes in 2011 by Google's Vulnerability Reward Program, for finding three bugs in Gmail, and is in the web service provider's Security Hall of Fame.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
andrew cantinogmailgooglegoogle drivesecuritytiming attack

Partner Content

Digital signatures propel Australian Unity with rapid time to value
Digital signatures propel Australian Unity with rapid time to value
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Sep 12 2014
5:39AM
0 Comments

Related Articles

  • ACCC greenlights Google's buy of Mandiant
  • Google Cloud joins AWS, Azure in gov data sovereignty scheme
  • Poor patching creates easy zero-day vulnerability reuse
  • ACCC starts review of Google's Mandiant buyout
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

Google Cloud IoT Core goes on the end-of-life list

Google Cloud IoT Core goes on the end-of-life list

Digital Nation

COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.