Security News > 2021 > October > New Gummy Browser attack lets hackers spoof tracking profiles
University researchers in the US have developed a new fingerprint capturing and browser spoofing attack called Gummy Browsers.
The 'Gummy Browsers' attack is the process of capturing a person's fingerprint by making them visit an attacker-controlled website and then using that fingerprint on a target platform to spoof that person's identity.
Browser setting and debugging tool - Both can be used to change the browser attributes to any custom value, affecting both the JavaScript API and the corresponding value in the HTTP header.
"Our results showed that Gummy Browsers can successfully impersonate the victim's browser transparently almost all the time without affecting the tracking of legitimate users," the researchers explain in an Arxiv paper published yesterday.
"Since acquiring and spoofing the browser characteristics is oblivious to both the user and the remote web-server, Gummy Browsers can be launched easily while remaining hard to detect".
The researchers state that threat actors can easily use the Gummy Bear attack to trick systems utilizing fingerprinting.
News URL
Related news
- North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)
- Firefox Zero-Day Under Attack: Update Your Browser Immediately (source)
- Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- Hackers increasingly use Winos4.0 post-exploitation kit in attacks (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
- SafePay ransomware gang claims Microlise attack that disrupted prison van tracking (source)