Security News > 2021 > October > New Gummy Browser attack lets hackers spoof tracking profiles
University researchers in the US have developed a new fingerprint capturing and browser spoofing attack called Gummy Browsers.
The 'Gummy Browsers' attack is the process of capturing a person's fingerprint by making them visit an attacker-controlled website and then using that fingerprint on a target platform to spoof that person's identity.
Browser setting and debugging tool - Both can be used to change the browser attributes to any custom value, affecting both the JavaScript API and the corresponding value in the HTTP header.
"Our results showed that Gummy Browsers can successfully impersonate the victim's browser transparently almost all the time without affecting the tracking of legitimate users," the researchers explain in an Arxiv paper published yesterday.
"Since acquiring and spoofing the browser characteristics is oblivious to both the user and the remote web-server, Gummy Browsers can be launched easily while remaining hard to detect".
The researchers state that threat actors can easily use the Gummy Bear attack to trick systems utilizing fingerprinting.
News URL
Related news
- North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- 390,000 WordPress accounts stolen from hackers in supply chain attack (source)
- Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks (source)
- Russian hackers use RDP proxies to steal data in MiTM attacks (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Malicious Browser Extensions are the Next Frontier for Identity Attacks (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)