Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Google Businesses The Internet Privacy

Google Antiphishing Site Exposed Private User Data 69

Juha-Matti Laurio writes "Google has removed a few user names and passwords posted inadvertently to a phishing blacklist it compiles and makes publicly available on the Web. This information was submitted to Google by Firefox users with the browser's internal antiphishing toolbar. This feature, developed in cooperation with Google, enables users to report potential phishing sites to Google's blacklist database. Google has reportedly implemented a new mechanism detecting login data in submitted URLs to prevent sensitive information from getting posted to the list." The article notes that news of this minor lapse may obscure the ongoing problem of sensitive data exposed on the Web and findable via Google and other search services.
This discussion has been archived. No new comments can be posted.

Google Antiphishing Site Exposed Private User Data

Comments Filter:
  • by winkydink ( 650484 ) * <sv.dude@gmail.com> on Tuesday January 23, 2007 @03:02PM (#17726946) Homepage Journal
    It was discussed on the full-disclosure mailing list 2 weeks ago. If Google is continuing to do this, it's hard for me to see it as anything but irresponsible.
  • by EveryNickIsTaken ( 1054794 ) on Tuesday January 23, 2007 @03:07PM (#17727026)
    "This information was submitted to Google by Firefox users with the browser's internal antiphishing toolbar." So, the antiphishing toolbar is submitting full URL's without stripping them of uids/pwds/hashes. Sounds like both FF and Google are to blame for this one.
  • by jmazzi ( 869663 ) on Tuesday January 23, 2007 @03:14PM (#17727152) Homepage
    Well, obviously not everyone is on the mailing list your talking about (including the slashdot editor). This is news to me. Putting it on a site like slashdot will help educate people who weren't already aware.
  • by fatnicky ( 991652 ) on Tuesday January 23, 2007 @03:14PM (#17727164) Homepage
    We only comment about the jerks who phish for one reason.

    We didn't think of it first.

  • Re:Nice (Score:2, Insightful)

    by lukas84 ( 912874 ) on Tuesday January 23, 2007 @03:17PM (#17727204) Homepage
    You are right, but that's not the point.

    URLs are commonly copy and pasted, submitted to other sites, can be read in the browser history, in proxy logs, etc.

    Of course, you can configure a proxy to log POST data, but this is beside the point. This is about preventing unintended duplication of sensitive data, not actual attacks.
  • Do no evil (Score:1, Insightful)

    by Robert Goatse ( 984232 ) on Tuesday January 23, 2007 @03:36PM (#17727430)
    Let's get all of the Google nuthuggers out of the woodwork to defend their g00gl3!!!11 Now, if it was Microsoft on the other hand, they would be skewered to no end for a SNAFU such as this.
  • Re:Nice (Score:2, Insightful)

    by Anonymous Coward on Tuesday January 23, 2007 @03:50PM (#17727568)

    Sounds like we have some sites that are passing persistent username and password information in the URL (not just querystrings etc). That's pretty lame.

    That's quite an understatement. Doing that not only causes problems like this, it also discloses your username and password to a) anybody with access to a proxy log (it's easier to get hold of that than root the proxy to sniff the traffic) and b) any website you navigate to directly from the braindead website (since the URI, including the username and password, will be sent to the new website in the Referer HTTP header).

  • by jamietre ( 1051578 ) on Tuesday January 23, 2007 @04:36PM (#17728130)
    There are websites that manage sensitive information that pass usernames & passwords in the actual URL, and you think Google's irresponsible?
  • by kalleguld ( 624992 ) on Tuesday January 23, 2007 @05:54PM (#17729194)
    Phishing websites. Why should they be careful about the security of the user?
  • by iabervon ( 1971 ) on Tuesday January 23, 2007 @06:26PM (#17729634) Homepage Journal
    Okay, so people are accidentally sending Google URLs with their usernames and passwords in them, and Google is then reporting this information to whoever cares.

    But the URLs people are submitting are URLs of sites they think are phishing sites. People are effectively saying, "I think this site stole my password, which is 12345." Okay, so maybe Google shouldn't widely distribute this accidentally-disclosed information, but... how much do you care about whether the general public can see your password, when you've already provided it to somebody who was actually trying to collect it for presumably nefarious purposes? Surely these passwords have been changed, right? Right?

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...