Conversion Hackers
Fealse: Tech News
Browser Digital Fingerprints
  • Security

New Attack Let Attacker Collect and Spoof Browser’s Digital Fingerprints

  • October 25, 2021
  • admin
Total
0
Shares
0
0
0

A “potentially devastating and hard-to-detect threat” could be abused by attackers to collect users’ browser fingerprinting information with the goal of spoofing the victims without their knowledge, thus effectively compromising their privacy.

Academics from Texas A&M University dubbed the attack system “Gummy Browsers,” likening it to a nearly 20-year-old “Gummy Fingers” technique that can impersonate a user’s fingerprint biometrics.

Automatic GitHub Backups

“The idea is that the attacker 𝐴 first makes the user π‘ˆ connect to his website (or to a well-known site the attacker controls) and transparently collects the information from π‘ˆ that is used for fingerprinting purposes (just like any fingerprinting website π‘Š collects this information),” the researchers outlined. “Then, 𝐴 orchestrates a browser on his own machine to replicate and transmit the same fingerprinting information when connecting to π‘Š, fooling π‘Š to think that π‘ˆ is the one requesting the service rather than 𝐴.”

Browser fingerprinting, also called machine fingerprinting, refers to a tracking technique that’s used to uniquely identify internet users by gathering attributes about the software and hardware of a remote computing system β€” such as the choice of browser, timezone, default language, screen resolution, add-ons, installed fonts, and even preferences β€” as well as behavioral characteristics that emerge when interacting with the web browser of the device.

Thus in the event, the website populates targeted ads based on only the users’ browser fingerprints, it could result in a scenario where the remote adversary can profile any target of interest by manipulating their own fingerprints to match that of the victim for extended periods of time, all the while the user and the website remain oblivious to the attack.

By exploiting the fact that the server treats the attacker’s browser as the victim’s browser, not only would the former receive same or similar ads like that of the impersonated victim, it also allows the malicious actor to infer sensitive information about the user (e.g., gender, age group, health condition, interests, salary level, etc.) and build a personal behavioral profile.

In experimental tests, the researchers found that the attack system achieved average false-positive rates of greater than 0.95, indicating that most of the spoofed fingerprints were misrecognized as legitimate ones, successfully tricking the digital fingerprinting algorithms. A consequence of such an attack is a breach of ad privacy and a bypass of defensive mechanisms put in place to authenticate users and detect fraud.

“The impact of Gummy Browsers can be devastating and lasting on the online security and privacy of the users, especially given that browser-fingerprinting is starting to get widely adopted in the real world,” the researchers concluded. “In light of this attack, our work raises the question of whether browser fingerprinting is safe to deploy on a large scale.”



Total
0
Shares
Share 0
Tweet 0
Pin it 0
admin

Previous Article
SIM security solution
  • Security

new SIM security solution for IAM

  • October 25, 2021
  • admin
View Post
Next Article
A patch for eFootball 2022, Steam
  • Apps

A patch for eFootball 2022, Steam’s worst game of all time, has been delayed

  • October 25, 2021
  • admin
View Post
You May Also Like
U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware
View Post
  • Security

U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware

  • admin
  • May 17, 2022
Androids with Password Stealer
View Post
  • Security

Over 200 Apps on Play Store Caught Spying on Android Users Using Facestealer

  • admin
  • May 17, 2022
Zyxel Firewalls RCE Vulnerability
View Post
  • Security

Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability

  • admin
  • May 17, 2022
Astrix Security Emerges From Stealth With $15M Seed Round
View Post
  • Security

TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft

  • admin
  • May 16, 2022
Astrix Security Emerges From Stealth With $15M Seed Round
View Post
  • Security

RF Technologies Releases Safe Place Staff Protection for Healthcare Settings

  • admin
  • May 16, 2022
50% of Orgs Rely on Email to Manage Security
View Post
  • Security

50% of Orgs Rely on Email to Manage Security

  • admin
  • May 16, 2022
iPhones Open to Attack Even When Off, Researchers Say
View Post
  • Security

iPhones Open to Attack Even When Off, Researchers Say

  • admin
  • May 16, 2022
Open Source Security Gets $150M Boost From Industry Heavy Hitters
View Post
  • Security

Open Source Security Gets $150M Boost From Industry Heavy Hitters

  • admin
  • May 16, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories
  • Apps
  • Games
  • How To
  • News
  • Photography
  • Reviews
  • Security

Input your search keywords and press Enter.