Categories: Security

Microsoft Rapidly Patches Serious Phishing Flaw

Microsoft has taken only two days to fix a security bug that could have enabled attackers to take over the accounts of users logging into Internet-based services such as Outlook.com or Windows Live.

British programmer Jack Whitton reported the problem to Microsoft earlier this year, on Sunday, 24 January, and a fix was implemented on the following Tuesday. Whitton first made the bug public in a blog post over the weekend.

Faulty authentication

When a user already logged into a Microsoft service running on one domain, such as outlook.com, accesses another service running on another domain, such as live.com, the user is issued a token proving their identity, so that they don’t have to login a second time. T

he token is used because the services run on completely separate domains, meaning cookies wouldn’t function.

The security bug affected the way the tokens are authenticated, and meant a malicious user who captured a user’s token via a fake website could have used the token to gain “complete access to the user’s account”, in an attack type known as a cross-site request forgery (CSRF), Whitton wrote.

“Despite CSRF bugs not having the same credibility as other bugs, when discovered in authentication systems their impact can be pretty large,” he wrote.

An attacker would need different tokens to access services hosted on different domains, but Whitton speculated that multiple hidden iframes could be used to harvest the tokens of various services.

Phishing scams

Phishing is a growing problem, with Seagate, Snapchat and Airbnb recently affected by scams using the technique.

While Whitton’s bug affected Microsoft’s online services, Windows administrators are currently awaiting a fix for a mysterious bug called “Badlock” that also affects an open-source tool called Samba.

Microsoft and Samba engineers warned that the bug is serious and to expect a fix on 12 April, Microsoft’s next scheduled patching date, but didn’t give any further information in order to prevent attackers from developing an exploit before the patch becomes available.

Are you a security pro? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

X’s Community Notes Fails To Stem US Election Misinformation – Report

Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…

1 day ago

Google Fined More Than World’s GDP By Russia

Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…

1 day ago

Spotify, Paramount Sign Up To Use Google Cloud ARM Chips

Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…

2 days ago

Meta Warns Of Accelerating AI Infrastructure Costs

Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…

2 days ago

AI Helps Boost Microsoft Cloud Revenues By 33 Percent

Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…

2 days ago