Kraken Phishing Analysis - Search Adverts and Non-validated URL Redirect Exploits

in #bitcoin8 years ago (edited)

Recently Kraken issued a warning on it's blog[1] regarding various phishing attacks that has caused some accounts to lose their Bitcoin.

<p dir="auto"><center><img src="https://images.hive.blog/768x0/https://s4.postimg.io/x9w0hkzbx/tumblr_inline_oby1hi9bhg1t0tbub_1280.png" srcset="https://images.hive.blog/768x0/https://s4.postimg.io/x9w0hkzbx/tumblr_inline_oby1hi9bhg1t0tbub_1280.png 1x, https://images.hive.blog/1536x0/https://s4.postimg.io/x9w0hkzbx/tumblr_inline_oby1hi9bhg1t0tbub_1280.png 2x" /> <p dir="auto">I decided to do some research in to how this could have happened as my previous knowledge of advert networks say that this isn't possible otherwise it would be much more commonplace. <p dir="auto">The advert display networks allow you to customize<strong>[2] the 'Display URL' vs the 'Destination URL'. The Display URL is what the user will see and the Destination URL is where the advert will take the user when clicked. This is allowed because some websites have user unfriendly URL's. There are limitations on this and that is the Display URL root domain must match the Destination URL root domain. For example: <p dir="auto"><strong>Approved URL customizations <div class="table-responsive"><table> <thead> <tr><th style="text-align:left">Display URL<th style="text-align:left">Destination URL <tbody> <tr><td style="text-align:left">Steemit.com<td style="text-align:left"><code>https://www.steemit.com/signup?adref=gadws_campaign1 <tr><td style="text-align:left">SignUp.Steemit.com<td style="text-align:left"><code>https://www.steemit.com/signup?adref=gadws_campaign2 <tr><td style="text-align:left">Steemit.com/Signup<td style="text-align:left"><code>https://signup.steemit.com <p dir="auto"><strong>Unapproved URL customizations <div class="table-responsive"><table> <thead> <tr><th style="text-align:left">Display URL<th style="text-align:left">Destination URL <tbody> <tr><td style="text-align:left">Steemit.com<td style="text-align:left"><code>https://steem.io/join <tr><td style="text-align:left">SignUp.Steemit.com<td style="text-align:left"><code>https://steemd.com/signup/ <tr><td style="text-align:left">Steemit.com/Signup<td style="text-align:left"><code>https://steemit.steem.io <p dir="auto">This is a very interesting and more sophisticated phishing attack in that the attackers seem to have utilized a possible open redirect flaw<strong>[3] in the Kraken website to bypass anti-phishing mechanisms on the Google, Bing and Yahoo advert display network. <p dir="auto"><strong>Kraken have yet to confirm whether this is the case or how it happened but testing the redirect feature (<code>https://www.kraken.com/redirect?url=INSERT_URL_HERE) after the event seems to throw a few errors ranging from generic 403 Forbidden messages to generic CloudFlare 'You have been blocked' messages. This leads me to believe this is a temporary "duck-tape" solution to mitigate the issue. <p dir="auto">Why do I believe it is a temporary "duck-tape" solution? Because of the generic standard errors that it produces. If the attack vector was considered at the beginning then usually a more user-friendly approach is taken; such as a custom error message with company branding. This is only an assumption on my part. <p dir="auto"><center><img src="https://images.hive.blog/768x0/https://s4.postimg.org/ynnncvyl9/tumblr_inline_oby1g40a_Tg1t0tbub_1280.png" srcset="https://images.hive.blog/768x0/https://s4.postimg.org/ynnncvyl9/tumblr_inline_oby1g40a_Tg1t0tbub_1280.png 1x, https://images.hive.blog/1536x0/https://s4.postimg.org/ynnncvyl9/tumblr_inline_oby1g40a_Tg1t0tbub_1280.png 2x" /> <p dir="auto">However the phishing site has an interesting string in the URL (highlighted in green by me). This correlates somewhat to the same redirect feature on the official website and knowledge of other websites that have these vulnerabilities has shown me that the query string or other data from the original function tend to be passed to the destination, such as source along with other neccessary parameters. <blockquote> <p dir="auto">No evidence of Kraken itself being hacked<br /> - Kraken <p dir="auto">Unless the attacker found a flaw in Google, Yahoo and Bing then the only thing that would allow Display URL's with the Kraken domain would be a redirect exploit on one of the kraken.com domain names. <p dir="auto">One thing to be aware now is to skip the adverts in search engines and only use known links to websites. <p dir="auto">Thoughts? <hr /> <h6>Footnotes <p dir="auto">1: <a href="http://blog.kraken.com/post/148976188862/kraken-phishing-warning" target="_blank" rel="nofollow noreferrer noopener" title="This link will take you away from hive.blog" class="external_link">http://blog.kraken.com/post/148976188862/kraken-phishing-warning<br /> 2: <a href="https://adwords.googleblog.com/2006/05/display-vs-destination-urls.html" target="_blank" rel="nofollow noreferrer noopener" title="This link will take you away from hive.blog" class="external_link">https://adwords.googleblog.com/2006/05/display-vs-destination-urls.html<br /> 3: <a href="https://www.owasp.org/index.php/Testing_for_Client_Side_URL_Redirect_(OTG-CLIENT-004)" target="_blank" rel="nofollow noreferrer noopener" title="This link will take you away from hive.blog" class="external_link">https://www.owasp.org/index.php/Testing_for_Client_Side_URL_Redirect_(OTG-CLIENT-004)