Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Google Security

Google Announces "Password Alert" To Protect Against Phishing Attacks 76

HughPickens.com writes: Google has announced Password Alert, a free, open-source Chrome extension that protects your Google Accounts from phishing attacks. Once you've installed it, Password Alert will show a warning if you type your Google password into a site that isn't a Google sign-in page. This protects you from phishing attacks and also encourages you to use different passwords for different sites, a security best practice. Once you've installed and initialized Password Alert, Chrome will remember a "scrambled" version of your Google Account password. It only remembers this information for security purposes and doesn't share it with anyone. If you type your password into a site that isn't a Google sign-in page, an alert will tell you that you're at risk of being phished so you can update your password and protect yourself.
This discussion has been archived. No new comments can be posted.

Google Announces "Password Alert" To Protect Against Phishing Attacks

Comments Filter:
  • Why would you update your password because of a *failed* phishing attempt?

    • Re:Wait.. (Score:5, Informative)

      by Anonymous Coward on Wednesday April 29, 2015 @07:56PM (#49581707)
      Because telling you as you're typing your password into a phishing page is already too late. Javascript key logging anyone?
  • Funny (Score:5, Funny)

    by ArcadeMan ( 2766669 ) on Wednesday April 29, 2015 @07:52PM (#49581677)

    Google warning us about other people trying to get our informations.

    • Google might show you ads that could entice you to buy something you might not otherwise buy.

      Phishers might steal your account and, if you have Google Wallet attached, might use your account to spend money. Or they might use your e-mail to gain access to other accounts (e.g. bank accounts).

  • Allen Ludden...what a retro trip...how quaint.
  • by SoCalChris ( 573049 ) on Wednesday April 29, 2015 @08:01PM (#49581745) Journal
    It's sad how far Slashdot has fallen.
    • Re: (Score:3, Insightful)

      by Anonymous Coward

      It's sad how smugly superior the tech nerds are here.

      • by Anonymous Coward

        It's sad that non-tech people waste their time visiting a site advertising itself as "news for nerds" and then complain when someone wants the site to cater to nerds.

        • by Okian Warrior ( 537106 ) on Wednesday April 29, 2015 @09:47PM (#49582333) Homepage Journal

          It's sad how far Slashdot has fallen.

          It's sad how smugly superior the tech nerds are here.

          It's sad that non-tech people waste their time visiting a site advertising itself as "news for nerds" and then complain when someone wants the site to cater to nerds.

          It's sad how entire families can be torn apart by something as simple as wild dogs.

          • by unrtst ( 777550 )

            It's sad how far Slashdot has fallen.

            It's sad how smugly superior the tech nerds are here.

            It's sad that non-tech people waste their time visiting a site advertising itself as "news for nerds" and then complain when someone wants the site to cater to nerds.

            It's sad how entire families can be torn apart by something as simple as wild dogs.

            They should have used Google Dog Alert. The scrambled version of the dogs, while disturbing, are not capable of tearing anything apart.

    • Yeah how dare they faithfully quote an article.

      • ...when they could have instead used a more succinct summary aimed at nerds, or, picked a different source document. I mean, this doesn't even tell us what hash algorithm is used to "scramble" our locally stored passphrase.

        What I'd really like to see is a keychain helper (listening, Apple, onepass, etc?) that keylogs browser forms and performs this function against ANY password stored in the keychain. I mean, I've already got a keychain full of password/uri pairs -- why not do this with it as well?

        The dow

        • by amias ( 105819 ) on Thursday April 30, 2015 @05:02AM (#49583857) Homepage Journal

          hmm , how do i find passwords on this computer...

          lets start typing random strings into a password field until this plugin tells me which is the google password.

          yay , now i can log in to their google account first time !

          this is almost as silly as those things that validate your bank cards pin for online banking that let
          muggers force you to disclose your pin in a way that the banking system couldn't possibly no.

          i really hope this isn't going to be installed on mobile phones

    • by gsslay ( 807818 )

      It's quoting TFA.

      I'm hoping that's just Google simplifying for the common end user and it is using some kind of encryption. But who knows?

  • by vux984 ( 928602 ) on Wednesday April 29, 2015 @08:04PM (#49581771)

    Put on the popcorn and wait for the fireworks show that arises when people who use the same password they use for google on other sites.

    Still its an interesting idea, that might be usable in a general purpose extension that maintains hashes and URLs and then hashes every input box and compares it to the databse / urls -- and if it finds a hash match but the URL is wrong throw up an alert.

    Way more useful than a google only one that only works in chrome and only when you are signed in.

    • Put on the popcorn and wait for the fireworks show that arises when people who use the same password they use for google on other sites.

      The intersection of the set of people that care about security enough to install this extension, yet don't care enough to use unique passwords, is probably rather small. When there is a problem, they could do the stupid thing and uninstall the extension, or they could do the smart thing, and start using unique passwords. Either way, there would be no need for fireworks.

      Still its an interesting idea, that might be usable in a general purpose extension that maintains hashes and URLs and then hashes every input box and compares it to the databse / urls -- and if it finds a hash match but the URL is wrong throw up an alert.

      Yes, making this work for all password protected sites, rather than Google-only, would be nice. That would not only stop many phishing at

      • But it's none of Google's business what I use as a password on other sites. Not that I use Chrome except at work where it's required.

        • But it's none of Google's business what I use as a password on other sites.

          Google doesn't need to know your passwords. They only need to know a one-way hash. But if you are too paranoid to even allow them to keep a hash, there is a simple solution: Don't install the extension.

          • But is google constantly scanning all the text I enter into webpages, even text into a https page? That seems wrong and scary.

            • Some Javascript downloaded from Google scans all the text you enter, hashes it, and compares it with a locally-stored hash. It doesn't send any of what you type anywhere off your machine. Not wrong, or scary, and it's all open source so you can verify what it's doing. For that matter, you can use the Chrome dev tools to set breakpoints and step through it.
      • by vux984 ( 928602 ) on Wednesday April 29, 2015 @09:11PM (#49582161)

        The intersection of the set of people that care about security enough to install this extension, yet don't care enough to use unique passwords, is probably rather small

        Fair enough. Still...

        "Password Alert is also available to Google for Work customers, including Google Apps and Drive for Work. Your administrator can install Password Alert for everyone in the domains they manage, and receive alerts when Password Alert detects a possible problem."

        The intersection of administrators who might think its a good idea with end users that use the same password on other sites might be large enough to be at least a little bit fun.

        Yes, making this work for all password protected sites, rather than Google-only, would be nice. That would not only stop many phishing attempts, but would also discourage cross-site password reuse.

        Yeah, if it were integrated with something like password safe or password gorilla or keypass etc.

        Or I suppose it could be tied into the A/V products which already have anti-phishing extensions -- McAfee for example, already has a password safe and antiphishing ... seems almost a no-brainer for them to integrate them in this way. The password safe component could dump a list of hashes and domain names and if you try entering a password that matches the hash throw up an alert. And then maybe flag the page for A/V's phishing lists so if a page is generating alerts like crazy visitors it can be blacklisted -- preventing other users from even reaching the domain/phishing page.

        • by Nemyst ( 1383049 )
          For what it's worth, LastPass will already warn you if a password is reused across two different domains. You need to explicitly set a list of equivalences if two domains share the same backend, for example.
    • people will still use the same password even with this tool, because they are lazy.

      instead of "password" for all sites they will use password.google or something similar to bypass this and the passwords will still be fished

      • by vux984 ( 928602 ) on Wednesday April 29, 2015 @09:43PM (#49582305)

        Your criticism amounts to "If it doesn't completely solve the problem for everybody its no good." and that is false.

        Yes some will switch to various simple password patterns t.password for twitter... f.password for facebook... or maybe fb.password... etc. That's still an improvement. Even simple patters require some effort to break.

        Some fraction will use a harder patterns that aren't immediately obvious. That's an improvement. Lets say my password is "stupidgdog" for google. Maybe your automated phishing tools will try stupidfdog on facebook... but maybe not.

        Some fraction will use a slightly harder pattern.

        Lets say I use stupidgHdog as my google password. My new pattern is still simple. its "stupid" + "first name of domain" + "next letter in alphabet capitalized" + "dog"

        With just one sample, are you really sure your automated phishing tools going to figure out that facebook is: stupidfGdog ? And twitter its stupidtUdog?

        And that's still pretty lazy as passwords go.

        Some smal fraction will take the hint and use much harder patterns. That will take several fished passwords for the user and probably some human eyes to figure out. This is an improvement.

        Lets say my google password is: C69.7Germanium what's my facebook password?

        Here... I give you twitter on this pattern too: N47.8Vanadium.
        With 2 samples passwords you've got enough of a pattern to try and brute force it... letter + 3 digits + element... 26* 1000 * 118... 2.6 million passwords to try.

        Very doable if its a targeted search on a particular user... but your probably not going to spend the time looking at each fished password and then write a script to do that specific search... for just one random user. Probably.

        And some fraction of people will switch to using a password safe or something, and thats an improvement too.

        • by suutar ( 1860506 )

          O19.0Neon

          But no way in hell I'd have an automatic pattern generator rigged to try that.

          • by vux984 ( 928602 )

            O19.0Neon

            Good solve! :) Strictly speaking, it would have been O18.9Neon as I was truncating rather than rounding atomic weights.

            But no way in hell I'd have an automatic pattern generator rigged to try that.

            That was my thought too. And even that algorithm was relatively simple; requiring the user memorize just a couple simple rules and either know the periodic table; or have ready access to one (which is trivial) in the event he needs to "regenerate" a forgotten password.

            I -used- to use techniques in the same general category as this for password generation... but after a few breaches and othe

    • Fuck it, I'm making popcorn tonight.

  • by NotInHere ( 3654617 ) on Wednesday April 29, 2015 @08:09PM (#49581797)

    Can you please stop with this plebs speak? This is a site for nerds, not for non-technical people. Say "hash" when you mean "hash". I mean is researching actual technical info [github.com] so hard? For everyone not wanting to click links: its comparing the first 37 bits of the hash, using the SHA-1 hash mechanism. And yes its salted.

    • short answer: no.
    • by Anonymous Coward
      The word "scrambled" is a direct quote from the google blog post the story links to.
    • by Anonymous Coward

      So basically, Google is giving you access to their hash, salt, and saying "Enjoy unlimited cracking attempts at this password offline, evildoers!" Thanks Google!

      • by xxxJonBoyxxx ( 565205 ) on Wednesday April 29, 2015 @09:50PM (#49582343)

        >> So basically, Google is giving you access to their hash, salt, and saying "Enjoy unlimited cracking attempts...

        Not exactly. The 37-bit version is just less than 25% of the full 160-bit SHA-1 so, as the source mentions (https://raw.githubusercontent.com/google/password-alert/master/SECURITY.md) the intent is to keep enough of the password to tell when the same password has been tried twice, but not enough of the hash to allow someone to authoritatively crack it. (I hope - haven't seen the proof of 37-is-the-right-number yet.)

        This isn't the first time someone's used hashes with high collision rates to see if the same passwords are being tried without actually storing enough of a hash to flag the password. See this article for a different example (trying to tell badly configured clients from brute forcing attempts): http://www.filetransferconsult... [filetransf...ulting.com]

    • I would rather a faithfully quoted news article then someone try and come up with some meaning that isn't there. Slashdot is not a news site, it's an aggregator. It doesn't publish news, it publishes links to news and when it does I am happier knowing that parts of the article are quoted accurately.

      Every time we let the editors off the rails to form their own opinions on subjects it turns out badly for readers.

      • Bingo. Additionally, every slashdaughter who knows what hashing is realized that's what they meant by "scrambled". So big deal, TFS doesn't say which hash they use.
        • Additionally, every slashdaughter who knows what hashing is realized that's what they meant by "scrambled".

          "Scrambled" can also mean reversibly encrypted, as in the Content Scrambling System used with DVD Video.

      • The problem I have with the /. summaries is that they are missattributed. For example, in this [slashdot.org] /. article, the claim is:

        mrflash818 writes:

        immediately followed by a verbatim copy of a NOAA press release. Now, I don't have evidence that "mrflash818" is not the author of that press release, but the chances are unlikely. It would not be hard to find many many other examples where the quoted material has a byline that doesn't match the "xxx writes" attribution.

        Please, attribute the true author and leave the handles and nics an

    • What?? No pepper?

  • So like the cops... it shows up only after the crime has been committed, and only protects some of the population (Google passwords) and not the rest of the population (e.g. your banking password isn't protected, because it's not a Google site).

    Seems slightly less than useful.

    • by swillden ( 191260 ) <shawn-ds@willden.org> on Wednesday April 29, 2015 @11:40PM (#49582937) Journal

      So like the cops... it shows up only after the crime has been committed, and only protects some of the population (Google passwords) and not the rest of the population (e.g. your banking password isn't protected, because it's not a Google site).

      Seems slightly less than useful.

      I disagree.

      If you use Gmail as your primary e-mail then your Google password is the crown jewel of your online identity, since every other site out there (including your bank) uses e-mail as the password reset channel. Sure it might be nice if the tool were more general-purpose (though that would require changing the hashing strategy, which intentionally uses relatively few bits as a security measure to protect against brute force), but if you can protect only one password, your e-mail password is the one.

      For people who use not just Gmail but lots of Google services, it's even more critical. I store lots of important stuff in Drive, have my phone report my exact location, have my whole address book synced, etc., etc. It doesn't concern me to have so many eggs in one basket because I trust Google to maintain good security, but it can only be as good as my authentication. I use 2FA, but there's still value in being careful with such an important password.

  • Seems to me that if you use a password manager - LastPass among others - then this is unnecessary. I never type my password. and if I'm phished, then the site won't match the password manager entry and won't be filled in. So, google would have been better off allowing / providing a good password manager rather than this half measure that only sees it after the fact rather than preventing you from entering it in the first place. Personally, I'm waiting for SQRL that will eliminate the need for passwords alt
  • Ignore the fact that a Google Apps domain can use their own SAML SSO solution to effectively replace the Google signin page. This means that their new anti-phishing plugin would be rendered useless. Additionaly if this is used on a domain, it also bypasses their two-factor authentication mechanism (even if you set it up).
  • by Anonymous Coward

    Now if I get a foothold on your machine, I can run a hidden browser window pointed at my own server and start feeding random passwords into a form until the browser alert tells me I guessed correctly.

  • by Begemot ( 38841 ) on Thursday April 30, 2015 @02:29AM (#49583513)

    Users who are savvy enough to find and install this extension are less likely to fall for phishing.
    Users who may fall for phishing may not hear about the extension or do not know how to install it.
    Why not build it in the browser itself?

  • So now people will have passwords like this:

    google_password
    tinder_password
    linkedin_password
    facebook_password

    instead of just "password"

    I think at this point using a Google Authenticator generated code _as_ the password should be enough. It removes the user from the process of creating a "correct horse battery staple" password. It makes the authentication pretty much on par with SSH key authentication (you have a private key, Google has the public part, you generate a code that demonstrated that you have the

  • by dskoll ( 99328 ) on Thursday April 30, 2015 @07:51AM (#49584267) Homepage

    Google is on to something, but the implementation is wrong. First of all, this facility should be built in to browsers, not added as an extension. Secondly, it needs to be generalized: Just as browsers currently ask "Would you like to save this username/password for www.somesite.example", they should also ask "Would you like to lock this username/password combination to www.somesite.example?" and offer the usual "Yes / No / Not now" choices.

    If you say "Yes", then the browser should alert you every time it sees that password on a different site.

  • Sounds like Google wants you to install a keylogger for your safety.

    • RTFA. It doesn't log keystrokes, and doesn't send anything off your machine.
      • by in10se ( 472253 )

        You describe the process in another comment as "Some Javascript downloaded from Google scans all the text you enter..." Oh, now I get it. So it doesn't log your keystrokes, it just monitors all the text you type. Thanks for the distinction.

        • You describe the process in another comment as "Some Javascript downloaded from Google scans all the text you enter..." Oh, now I get it. So it doesn't log your keystrokes, it just monitors all the text you type. Thanks for the distinction.

          What do you mean by "monitors"? It monitors the text you type in exactly the same way that your web browser does, or your keyboard, for that matter. That is, it performs local computations on your keystrokes. Your web browser takes the additional step (sometimes) of sending network messages if you type certain things. In that way, the password alert extension is different, because it never does that.

  • If I start typing my password the site can collect it as I type. By the time I'm done it is too late.

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...