Skip to main content

IBM Reveals 'SpoofedMe' Attack Leveraging Social Login Vulnerability

posted onDecember 7, 2014
by l33tdawg

IBM researchers uncovered an attack that could allow a hacker to impersonate someone by abusing the social login mechanism.

Social login is a form of single sign-on that uses existing login information from a social network, such as Facebook or Google+, to sign into a third-party website. According to IBM's X-Force Application Security Research Team, the attack -- which they have dubbed "SpoofedMe" -- works this way: A cyber criminal registers a spoofed account within a vulnerable identity provider using the victim's email address. Then, without having to actually confirm ownership of the email address, the attacker will log into the relying website with the fake account, via social login. The relying website will check the user details asserted by the identity provider and log the attacker into the victim's account, based on the victim's email address value, Or Peles, a security researcher with X-Force, explains in a blog post.

IBM found the issue impacted identity providers Amazon, LinkedIn, and MYDIGIPASS, all of which have taken steps to fix the problem. In one case, IBM discovered the issue could have allowed an attacker to intrude into a Slashdot.org user account using the "Sign In With LinkedIn" service. Once logged in, an attacker would have had total access to the victim's account. LinkedIn responded to the issue quickly and fixed the vulnerability after the attack was disclosed, Peles wrote.

Source

Tags

IBM Security

You May Also Like

Recent News

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th