A new scam that uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, Hotmail, Outlook, MSN, Messenger and OneDrive has been discovered.
Security experts at Kaspersky Lab said users receive warnings by email saying that their Windows Live ID accounts are being used to distribute unsolicited emails, so their accounts will be blocked.
To stop their accounts being suspended, users are asked to follow a link and update their details to comply with the service’s new security requirements. This sounds very much like a typical phishing email. Victims are expected to click on links that will take them to fake sites imitating the official Windows Live page. The data they enter there will be sent to the scammers. So our experts were surprised that the link from the scam email did indeed go to the Windows Live website and there was no apparent attempt to get the victims’ logins and passwords.
Having followed the link in the email and successfully authorised the account on the official live.com site, users received a curious prompt from the service: an application requested permission to automatically log into the account, view the profile information and contact list and access a list of the users’ personal and work email addresses. Scammers gained access to this technique through security flaws in the open protocol for authorisation, OAuth.
Users who click ‘yes’ do not give away their login and password credentials, but they do provide their personal information, the email addresses of their contacts and the nicknames and real names of their friends. It’s also possible to gain permission to access other parameters, such as lists of appointments and important events. This information is most likely to be used for fraudulent purposes, such as sending spam to the contacts in the victim’s address book or launching spear phishing attacks.
Developers of web applications for social networks which use the OAuth protocol are advised to:
Avoid using open redirects from your sites;
Create a white list of trusted addresses for redirects performed using OAuth. Fraudsters can perform a hidden redirect to a malicious site by finding an application that can be successfully attacked and changing its “redirect_uri” parameter
Recommendations to users:
Do not follow links received via email or in private messages on social networking sites;
Do not give unknown applications the right to access your personal data;
Make sure you fully understand the account access rights that each application receives;
If you discover that an application is already distributing spam or malicious links on your behalf, you can send a complaint to the administration of the social networking site or web service and the application will be blocked;
Keep your antivirus software databases and integrated anti-phishing protection up to date
How much do you know about Internet security? Take our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…