Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Google Businesses The Internet Privacy

Google Antiphishing Site Exposed Private User Data 69

Juha-Matti Laurio writes "Google has removed a few user names and passwords posted inadvertently to a phishing blacklist it compiles and makes publicly available on the Web. This information was submitted to Google by Firefox users with the browser's internal antiphishing toolbar. This feature, developed in cooperation with Google, enables users to report potential phishing sites to Google's blacklist database. Google has reportedly implemented a new mechanism detecting login data in submitted URLs to prevent sensitive information from getting posted to the list." The article notes that news of this minor lapse may obscure the ongoing problem of sensitive data exposed on the Web and findable via Google and other search services.
This discussion has been archived. No new comments can be posted.

Google Antiphishing Site Exposed Private User Data

Comments Filter:
  • by winkydink ( 650484 ) * <sv.dude@gmail.com> on Tuesday January 23, 2007 @02:02PM (#17726946) Homepage Journal
    It was discussed on the full-disclosure mailing list 2 weeks ago. If Google is continuing to do this, it's hard for me to see it as anything but irresponsible.
    • by jmazzi ( 869663 ) on Tuesday January 23, 2007 @02:14PM (#17727152) Homepage
      Well, obviously not everyone is on the mailing list your talking about (including the slashdot editor). This is news to me. Putting it on a site like slashdot will help educate people who weren't already aware.
    • Re: (Score:3, Insightful)

      by jamietre ( 1051578 )
      There are websites that manage sensitive information that pass usernames & passwords in the actual URL, and you think Google's irresponsible?
      • Re: (Score:2, Insightful)

        by kalleguld ( 624992 )
        Phishing websites. Why should they be careful about the security of the user?
      • by heytal ( 173090 )
        These weren't the real sites, I believe. They were phishing sites, which passed logins and passwords in the URL. The URL's submitted by the users were supposed to be blacklisted, and hence the list was published.

        If the user, before submitting the URL did not check for personal information in the URL, it's that user's problem, and not Google's.

        I think it was pretty smart on behalf of Google to come up with an algorithm to look at the submitted URL, and remove the personal data.
        • Yes, I got schooled already. Since then I've changed my mind completely: google is not just irresponsible, but pretty stupid for allowing this to happen at all. Why include ANY part of the query string at all? A reference to a phishing web site ought to end with the "?" in the URL. I would think the "algorithm" would just be "ditch anything after the actual location." Even if it didn't occur to them that there might be personal data in the query-string part of the URL, there's no reason to keep any of it i
    • Well you should have send it to /. 2 weeks ago then.
    • by sholden ( 12227 )
      Why not read the second paragraph of the article?

      Yes, I must be new here...
    • The first time I looked at the link that was posted on full disclosure, all the passwords etc were there, but when I checked again the next day they had been removed. I think Google actually did a pretty quick cleanup job cleaning up their mess. The delay is due to the media echo chamber.

      Remember that the full disclosure event was reported to Finjan, who did an analysis. Someone over at information week then wrote an article about this analysis, which was posted yesterday. The slashdot posting is about
  • Never fear! (Score:5, Funny)

    by greginnj ( 891863 ) on Tuesday January 23, 2007 @02:04PM (#17726984) Homepage Journal
    Google has removed a few user names and passwords posted inadvertently to a phishing blacklist it compiles and makes publicly available on the Web.
    Never fear, they're still available on Google Cache :)

  • Nice (Score:2, Interesting)

    by madsheep ( 984404 )
    Sounds like we have some sites that are passing persistent username and password information in the URL (not just querystrings etc). That's pretty lame. I think Barracuda SPAM Firewall does this as well. Perhaps one of these days we'll just see applications with a higher level of security and won't have to worry about this so much.
    • by Nos. ( 179609 )
      Passing strings via POST as opposed to GET is not "secure". Both can be easily sniffed. The only way to do it is to use SSL, in which case, even the GET strings are encrypted.
      • SSL has nothing to do with it though if it's a GET or persisting URL. It can be encrypted all it wants to be to and from the server, but doesn't mean it cannot be picked up as a phishing site..unless the anti-phishing URL checker breaks because it's preceded by https.
      • Re: (Score:2, Insightful)

        by lukas84 ( 912874 )
        You are right, but that's not the point.

        URLs are commonly copy and pasted, submitted to other sites, can be read in the browser history, in proxy logs, etc.

        Of course, you can configure a proxy to log POST data, but this is beside the point. This is about preventing unintended duplication of sensitive data, not actual attacks.
      • by Cally ( 10873 )
        or encrypt the data on the server side before sending it back to the client (via a cookie by preference. You can't bookmark a cookie ;)
        • by Nos. ( 179609 )
          But how does the data get to the server in the first place. If its not encrypted from step one, its not secure.
    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Sounds like we have some sites that are passing persistent username and password information in the URL (not just querystrings etc). That's pretty lame.

      That's quite an understatement. Doing that not only causes problems like this, it also discloses your username and password to a) anybody with access to a proxy log (it's easier to get hold of that than root the proxy to sniff the traffic) and b) any website you navigate to directly from the braindead website (since the URI, including the username and p

  • by SNR monkey ( 1021747 ) on Tuesday January 23, 2007 @02:06PM (#17727010)
    Now please excuse me, g00gle.com tells me I need to enter my gmail login, password, and a valid credit card number to unlock my gmail account.
  • Google (Score:5, Funny)

    by Newfie2005 ( 932609 ) on Tuesday January 23, 2007 @02:06PM (#17727012)
    "Google also encourages users to use its search engine as a free credit card and Social Security number monitoring service for Web-based content. "We also suggest that individuals create Google Alerts for their credit card and Social Security numbers," the company recommends. "You can be notified once a day or once a week if a new result appears on Google for this query."

    As if google doesn't know enough about us, whats next, check google to see if someone is eating the same meal as you for breakfast?
    • What is my assurance that a "trusted partner" doesn't gain access to "Aggregate search queries with no personally identifying information involved" five years down the line and run grep /[0-9]{3}\-[0-9]{2}\-[0-9]{4}/ against it? Anything that goes into the search hopper is retained, forever, so that Google can use it to tweak their algorithms. Google *has* my credit card number on file (AdWords) and can even access my bank account (Checkout) but these are risks that I can tolerate because presumably they
  • by EveryNickIsTaken ( 1054794 ) on Tuesday January 23, 2007 @02:07PM (#17727026)
    "This information was submitted to Google by Firefox users with the browser's internal antiphishing toolbar." So, the antiphishing toolbar is submitting full URL's without stripping them of uids/pwds/hashes. Sounds like both FF and Google are to blame for this one.
    • "This information was submitted to Google by Firefox users with the browser's internal antiphishing toolbar."

      What internal antiphishing toolbar? I use firefox 2.0 and the only toolbars listed on View->Toolbars are Navigation and Bookmarks.
    • Does anyone know of a toolbar that hasn't eventually been the source of a problem? In the past past I would have said Google toolbar, but now I'm not so sure.
  • This kinda is a big deal. Imagine all the customers of Bank of America, Suntrust, Citibank, and Wachovia who are constantly reporting to google whenever they come across a phishing site. Dyslexic still continue in reporting fishing.com to google *sigh*.
  • by fatnicky ( 991652 )
    We only comment about the jerks who phish for one reason.

    We didn't think of it first.

  • Do no evil (Score:1, Insightful)

    Let's get all of the Google nuthuggers out of the woodwork to defend their g00gl3!!!11 Now, if it was Microsoft on the other hand, they would be skewered to no end for a SNAFU such as this.
    • Well if you actually read the comments above instead of going straight to complaining you would see the posts are all pretty much jokes, or people blaming google (or firefox too)
  • Quick! (Score:4, Funny)

    by thanksforthecrabs ( 1037698 ) on Tuesday January 23, 2007 @02:54PM (#17727618)
    Switch to Internet Explorer 7!
    • IE7 strips GET data (anything after the ?) from the pages you check, so this kind of thing doesn't happen.

      The funny thing is that there was an article about this on IEBlog months ago - I'm amazed that Google didn't do this.
  • Does anyone know what limits are placed on the urls that are sent to Google(and with IE7 Microsoft)? I figure that if these companies wanted to they could use all these urls to piece together what the most popular search results should be for any query. Even if these companies could not do this, a community-based, properly anonymizing service could almost replace any search engine on the planet by tracking what keywords lead to what websites people click on. Has anyone heard of this idea or has it been shot
  • Sorry!
  • by iabervon ( 1971 ) on Tuesday January 23, 2007 @05:26PM (#17729634) Homepage Journal
    Okay, so people are accidentally sending Google URLs with their usernames and passwords in them, and Google is then reporting this information to whoever cares.

    But the URLs people are submitting are URLs of sites they think are phishing sites. People are effectively saying, "I think this site stole my password, which is 12345." Okay, so maybe Google shouldn't widely distribute this accidentally-disclosed information, but... how much do you care about whether the general public can see your password, when you've already provided it to somebody who was actually trying to collect it for presumably nefarious purposes? Surely these passwords have been changed, right? Right?
  • by Dotnaught ( 223657 ) on Tuesday January 23, 2007 @06:41PM (#17730558) Homepage
    The most interesting aspect of the story is that Google's auto-suggestion code will suggest a social security number search keyed to a specific person and that the Google engineers were unaware of this possibility. In other words, if you search for your name and social security number enough times, someone else searching on your name might get a search suggestion that included the social security number you entered (if you did it a lot).

    In fact, Google is downright helpful when it comes to finding Social Security numbers: In one case -- and it may be the only one -- Google will identify an individual whose Social Security number has been posted online, thanks to a feature in the Google Toolbar that generates search suggestions based on popular searches. (Evidently, a lot of people have searched for this person's Social Security number.)

    Entering two keywords related to Social Security numbers -- call them "x" and "y" so as not to compound the problem -- into the Google Toolbar will produce a keyword search suggestion in the form "x y John Doe." Selecting the suggested search terms and name, as might be expected, generates a search results page with the named person's Social Security number.


As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...