IE Devs Criticize Bank Security Vulnerabilities 214
mrcaseyj writes "A post on the IE blog criticizes some banks for no longer using secure connections for entire login pages and only encrypting the password as it goes back to the bank. This prevents simple password sniffing but doesn't prevent a man in the middle attack from replacing the unsecured login page with one that has disabled encryption. This is especially a problem if you are using an unencrypted wireless connection such as at a coffee shop, because hackers can easily use the airpwn package to intercept the login page and steal your password. An easy remedy for when a secure page isn't available is to enter a bad username and password which usually brings up a secure page telling you to try again. But can you really trust your money to a bank that doesn't even offer the option of a secure login page?"
Fixed it for ya! (Score:3, Funny)
"But can you really trust your money to a bank that doesn't even offer the option of a secure login page?""
But can you really trust your money to a web browser and operating system that are the most hijacked in the world?"
There, fixed it for you.
Re: (Score:2)
Re:Fixed it for ya! (Score:4, Insightful)
So back to the obvious explanation: the IE team can't code for shit
Re: (Score:2)
So back to the obvious explanation: the IE team can't code for shit
Needs some modding up, please.
Re: (Score:2, Interesting)
Re: (Score:2)
JP Morgan Chase?
http://www.jpmorganchase.com/ [jpmorganchase.com]
Looks like they use Apache 2.0.55
Bank Of America, HSBC, and my own bank all seem to use Sun-ONE-Web-Server/6.1
From what I've seen by typing Bank into Google, and Clicking on links... it looks like Sun-ONE is the most popular. I didn't see any IIS....
Re:Fixed it for ya! (Score:4, Informative)
Apache: http://secunia.com/search/?search=Apache [secunia.com]
IIS 6: http://secunia.com/product/1438/ [secunia.com]
The fact of the matter is that you do not have enough information to conclude that IE is more poorly coded that any other browser out there. You are coming to this conclusion based on assumptions, not based on facts.
Re:Fixed it for ya! (Score:4, Informative)
Comparing IIS 6.0 to, say, Apache 2.2, we see 3 advisories for each product. Also, the comparison fails for only comparing the number of advisories and not the severity level of each one of them. Granted, Apache 2.2 has one unpatched advisory compared to zero for IIS 6.0, but it is not nearly as clear cut and one sided as your post made it seem.
Re: (Score:3, Informative)
To compare them somewhat accurately, one should compare IIS 6 with the version of Apache that has been out a similar amount of time, and, ideally, has a similar market share.
I guess this would mean you would compa
Re: (Score:2)
Another misleading post. Secunia only lists vendor supplied or publicly listed vulnerabilities. After the disaster that was IIS 5, MS stopped making that information available and now silently patches vulnerabilities they detect in-house.
Re:Fixed it for ya! (Score:5, Interesting)
IIS security holes [secunia.com]
Apache Security Holes [secunia.com]
Re: (Score:2)
If you remove the data you used to back up your statement, you can see how they would find it funny.
Re: (Score:3, Insightful)
Re: (Score:3, Interesting)
There is a lot of blame to go around for unsecure bank transactions. In the example, we are presented w/ the whole case of user on unsecured wireless. I think the lack of security of the bank in that case is the end users - I never would do bank transactions on an unsecured network except in extreme cases.
Granted, I do believe that banks do share some responsibility. I think they would be best served to do all of their pages as se
Re: (Score:2)
Hooray for https://mail.google.com/ [google.com]
Re: (Score:2)
So then you never bank over the internet?
(hint... you should treat a wired internet connection that you "control" with just as much suspicion as a wireless one)
Re:Fixed it for ya! (Score:5, Insightful)
Re: (Score:2)
potmeetkettle (Score:2)
Re: (Score:2)
One word answer: mattress (Score:3, Funny)
Security is expensive. (Score:2, Insightful)
Not every IT professional wants to spend lots of his free time researching the latest means of breaking into something, and defending against the break-in. So a lot of people just don't go out of their way to find out if they really know enough to write secure software...it
Re: (Score:2)
I don't have to know how to write secure software - I just need uncrackable keys, like "09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0".
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Isn't this a little old? (Score:5, Informative)
Re:Isn't this a little old? (Score:4, Informative)
Re: (Score:2)
Deja Vu (Score:2)
Nevermind Just The Login Page (Score:5, Insightful)
Just because they can't get your password doesn't mean they can't get useful information about you. Sniffing out an online banking session could be a big jackpot for an identity thief.
Re: (Score:2)
Re: (Score:2)
Uh, you missed the main point. "Once you're logged in" isn't good enough. Unless the login page (the whole page) is sent to you securely via https, what looks to you like a login page could be sending your login info in the clear to that Man in the Middle. He'll then use the info to drain your account.
You need to make sure that the login session itself is secured in its entirety. If security starts only "once you're logged in",
Re: (Score:2)
I did mean "From the start of the login process to the end of the logout process" - I just didn't actually say that.
Thanks for the correction!
Re: (Score:2)
Re: (Score:2)
Um... (Score:3, Insightful)
Surely anyone who logs onto their bank site from a wireless connection in a coffee shop is just asking to get owned?
Re: (Score:2)
Re:Um... (Score:4, Insightful)
Why? SSL protects you from MITM attacks and provides strong encryption & authentication.
That is exactly what SSL is for, to protect you from sniffers/spoofers between you and the website.
Re: (Score:2)
when it is being used properly, which it isn't.
Re: (Score:2)
I am not aware of any bank transaction system that is impervious to man in the middle attacks.
Do not trust what is on your monitor because it can always be fake.
Re: (Score:2)
Re:Um... (Score:5, Insightful)
Not really - this is the whole point of SSL. If you trust both endpoints, you don't much care about what's in the middle.
Now, if you'd said "anyone who logs into their bank site from a random Internet cafe PC is just asking to get owned", I'd agree. It wouldn't require a great deal of sophistication to install keyloggers on every PC. Or if you're rather more sophisticated, you could set up some sort of proxy which sets up a MITM with every HTTPS session, presenting a self-signed certificate for $BANK and configure the client PC's with the appropriate certificate from the proxy's root CA.
Re: (Score:2, Insightful)
BTW without secure dns, Google Apps is worthless toy for the enterprise. M$ is shaking in their boots.
Re: (Score:2)
Your web browser comes with a collection of public keys from registrars including Verisign. But your browser can't include every public key for every secure website. It would be too big a download and it would be hard to update. So the bank gets Verisign to put Verisign's digital signature on the bank's public
Re: (Score:2)
Sure, but are they aware of this fact? I'd say about 75% of the people (random number) don't know the dangers in logging in on a wireless network.
For anecdotal evidence, yesturday I was sitting in a hotel with two public iMac terminals. A lady sat down and right off the bat asked her husband how to "turn the Apple off", by which I think she meant "how do I switch to windows".
People l
Don't trust any bank that relies on credentials (Score:5, Insightful)
Re: (Score:2, Insightful)
Man ..
It's all software .. It's all software.
Re: (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
Somewhere, the hashes are stored. Find those and the solution presents itself.
No they're not, they're hashes; they're produced on-the-fly with a hashing algorithm from a combination of the hardware GUID and the encryption key. Since the dongle and the bank's webserver would both be using the same (probably open-source) algorithm, the hashes they produce would be the same, hence they can compare them to verify security. Every 30 seconds the hash would be discarded and a new one generated from a new (randomly generated) encryption key that's sent to the dongle encrypted with the pre
Re: (Score:2)
I've not heard of any working attacks against SecurID (or any other hardware token). Got any links?
Re: (Score:2)
Well, yeah, RSA sells a SecurID software token. It's obviously less secure, since it resides on your computer instead of in your hands.
http://www.rsa.com/node.aspx?id=1162 [rsa.com]
You need both the user's PIN and the number displayed on the token, so stolen/copied tokens aren't any use without also compromisi
Re: (Score:2)
So tell me, how could a hardware solution be more secure
Re: (Score:2)
What US banks offer this?
Credit Unions (Score:5, Interesting)
I suggest everyone do the same.
Re: (Score:3, Interesting)
Wachovia's site is as the article describes and only gives you https after login. I wondered about it myself and so began going to the site by manually specifying https://www.wachovia.com/ [wachovia.com] -- this works and gives you SSL for the entire browsing session. You may want to type it manually every time, though it would be nice if all banks made their sites HTTPS only.
Re: (Score:2)
Right this second, Washington Mutual's site https://www.wamu.com/ [wamu.com] does the exact opposite, it redirects me back to http:/// [http]
It annoys me, but not enough to withdraw my cash. I just hit log in with the fields blank to get to the SSL page and then actually log in.
Re: (Score:2)
Anyone know of a website that ranks banks on their online security? Might be interesting to tak
Re: (Score:2)
Re: (Score:2)
All of my other financial web sites use https for logging on.
bank web security practices annoy (Score:3, Interesting)
Come on guys... (Score:5, Insightful)
Two thousand and five.
Re: (Score:2)
;-)
Re: (Score:2)
BTW, if
What me worry (Score:5, Interesting)
Scott Trade [consumeraffairs.com]
Verizon [consumeraffairs.com]
Bank of America [consumeraffairs.com]
Choicepoint [consumeraffairs.com]
Mastercard [consumeraffairs.com]
AT&T [consumeraffairs.com]
Department of Edumacashun [consumeraffairs.com]
Chase [consumeraffairs.com]
Great article, but (Score:3, Insightful)
I'd love to complain to my bank if it is guilty of these lapses, but how would I know?
Re: (Score:2)
Thanks for your input though.
Re: (Score:2)
Step 2) Look for the pretty little lock picture in your browser that tells you that the website is SSL encrypted.
Without the lock, there is no guarantee you're even on your bank's website when you click the login button that takes you to who knows where. ESPECIALLY when the bank helpfully puts a username/password form on the front page (see http://www.wamu.com/ [wamu.com] ) for you to fill out and hit submit and hope that the page it's submitting to actually IS encrypted.
I work with insurance companies, they suck (Score:2)
Their password policies for acessing extranets, for instance, are in most cases completely insane. They impose so many arbitrary constraints (such as changing the password monthly) in the name of security, no less, that invariably passwords en up being "password1", "password2" and so on. Furthermore most of them block an account after three unsuccesful login a
Jab at firefox (Score:2)
I wonder how a MITM attack could do that..
They're really giving the phishers a hand (Score:2)
While the article may be older than dirt, I'm glad the issue has been brought up, because many financial sites still haven't done anything about the problem. It always pisses me off when I go to my bank's or credit card companies' site and am confronted with a login prompt on an insecure page. To add insult to injury, they generally have put some sort of little lock icon next to the login fields. Oh, well great! That must mean it's secure!. I mean, surely no phishing site will think to put a lock icon
Still relies on a secure connection (Score:2)
I'm not really sure how that solves the problem I was talking about. My complaint is when a bank has the login prompt on a page served up with http, not https. The SSL connection isn't made until you hit the button to submit your password, at which point it's a little late for authentication.
What you seem to be talking about is a mechanism by which the browser makes obvious changes in appearance when it connects to certain sites via https. If they're not using SSL in the first place, I don't think t
Mother's Maiden Name (Score:4, Insightful)
Pot calling the snowball black? (Score:2)
For almost all successful bank frauds here, the culprit was a trojan in the IE. Banks do hire very good people to secure their online money transfer routines (at least here, cannot vouch for the US). What fails, though, is the security on the user side.
Faciliated by IEs way of treating plugins. To slip a plugin into the IE, all you have to do is set a few registry keys. It does not even need any user inte
Oh come on (Score:2)
Also, I think TFA may be conflating MITM with phishing. I'd like to see how many frauds have been really been succesfully perpetrated using real MITM (with contact back to the bank for something otehr than static content, as opposed to plain old phishing), It's not hard to set up a phishing site with a "real" SSL cert from some dodgy issuer, I've seen LOTS of those.
Still I'm a little baffled why MOST sites have non-SSL login pages - it
Re: (Score:2)
"True" MITM attacks are exceedingly rare. Because of a minmaxing reason. Unfortunately NDAs keep me from telling much more, but ponder this: A t
Re: (Score:2)
Maybe for a "true" MITM attack. But airpwn can do a sort of partial MITM attack. When your browser sends off a request for your bank's web page over the wireless, airpwn quickly sends back a response to your computer before the real server does (because airpwn is closer and can respond quicker). As soon as your browser gets the page back, it closes the port and ignores the real bank server. When you submit the password from the fa
Also problem for major US companies (Score:2)
As it turns out, all of the forms they send to your computer are encrypted. None of the data you send them back by filling out such forms are encrypted. Account logins, billing address, shipping address, card details - they all go plain text according to Firefox. I contacted Hanes customer support twice about this, only to be told that they use "industry standard encryption". "Yes", I said, "but onl
Fair point (Score:2)
The other issue is that public wireless networks (the
I'm sorry, did I hear you right? (Score:2)
The banking system we have just now, the world over is the single largest scam ever created[1]. And it's backed and enforced by the various governments. Most people have no idea how our money and banking system works, they still think it's backed by gold or something. What bankers do, is take your money, invest it at a healthy rate of return and then give you marginally more than the rate of inflation, if they're feeling generous, less if they
Re: (Score:2)
Regardless, when is the last time a major bank failed?
Barings Bank.
Re: (Score:2)
Every now and then one of you antibank nuts crawls out of the woodwork.
Coming from an Anonymous Coward.
Regardless, when is the last time a major bank failed? How many depositors lost money when that bank failed?
Who said anything about failure? I'm talking about the normal operation, and how many depositors lose money? Every single one with an account returning less than the rate of inflation.
the main reason gold is valuable is because people think it is valuable.
As well as the other features, gold has an inherently limited supply, hence the perception of value. Dollars or in fact, any of the existing currencies, do not. Particularly when banks have been allowed to loan out the same cash tens or hundreds of times and charge interest on each of the loa
Banks have a much bigger problem (Score:3, Interesting)
There are many ways to slip money out of accounts it isn't funny.
Trading accounts:
Create a series of bad trade orders. Offset these with legitimate trade orders in legitimate accounts. There are many thinly traded companies where it is easy to figure out who has the buy order and who has the sell order. All one has to do on a thinly traded company for instance is place a lowball buy order and have the victim's account buy shares at whatever price and then sell them into the lowball. This can be triggered from instance by a stop loss order. Once the shares are owned they can then be sold to another victim.
Chequing accounts: Create fraudulent transactions by paying for goods not ordered. These goods can even be shipped to create a semblance of legitimacy. By the time any of these goods arrive and the transactions are noticed the perpetrators are long gone with their loot.
Its quite easy to create a series of dummy companies to accomplish this. Of course, since this is e-commerce one would obtain valid certificates ahead of time.
This is one reason that secure communications offer limited protection. A felon in Jail can always get his lawyer to register a corporation for him and these are legitimate corporations. Its just they are run by crooks. But then Enron was run by crooks too it would seem. In fact, there are a HUGE number of companies run by crooks. Lots of people invest in them.
I'm in the bank business (Score:3, Interesting)
These really are just a few of the many many things we do to protect your data. In fact, I deleted 2 of the list items that I originally wrote about because I didn't want to give away any information that could be useful to a potential crook.
We take security very seriously for two main reasons. First, we're liable for any losses you have due to a security breach. But more importantly, we can't afford to lose the faith of our customers. If they don't trust us they'll take their money somewhere else. The actual financial loss from an attack on our system would be minor compared to the loss of trust from our customers.
My Bank tried to force me to switch. (Score:2)
I ignored it, and now, several more months later,
Re: (Score:2)
Re:Cringe (Score:4, Insightful)
They're just file extensions buddy, they can't hurt you.
Re: (Score:2, Insightful)
Re: (Score:2)
Oh wait, IE is known for having exploits, therefore an IE developer talking about security of any kind, even SSL/TLS which IE supports fully, correctly and handles sensibly, is ironic, right? That's ironic indeed. You and Alanis Morisette should team up and write a song about these things you find ironic. I'd listen, I really would.
Re: (Score:2)
Re: (Score:2)
Also, you are wrong about the login. Traditional POP logins (ie, without SSL) are insecure.
Re: (Score:2)
You should never be sending sensitive information over nonencrypted email in any case. Securing the hotmail login page and then sending your bank details by email would be rather like locking the barn door, then demolishing large parts of the other three walls of the barn, whilst keeping the lock intact. Utterly pointless. And that applies to any webmail system, not just hotmail.
Re: (Score:2)
If Microsoft in general were to make that criticism toward banks, then it would be hypocrisy.
Re: (Score:2)
Newsflash:
Microsoft does.
And don't tell me about how it's a big company. It's a big black pot talking shit to the kettle.
Fuck Microsoft.
If there's anything that banks need to be told, it's that they need to quit checking user-agent headers and redirecting us to stupid pages telling us to use Internet Explorer.
I can't believe you got modded insightful for this. If that article had been made by the Firefox team your post would've no doubt been something along the lines of "yeah, stick it to the man! Fuck those big business banks and their insecure products. OPEN SOURCE 4EVA1!!!1!". But because it's a Microsoft employee who is writing something quite correctly about a major security issue affecting millions of people and billions of pounds/dollars/yen/whatever then "Fuck Microsoft", right? This guy works on a comp
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It doesn't matter what the IP address is. Once your bank gets one certificate authority to sign their mybank.com public key, no other trusted certificate authority will sign another public key for the domain mybank.com. If the crook makes his own p