Bitcoin Forum
April 25, 2024, 02:22:08 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 »  All
  Print  
Author Topic: Punycode and how to protect yourself from Spoofed URLs and fake websites.  (Read 1075 times)
wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
October 11, 2019, 10:05:19 AM
Last edit: October 24, 2019, 09:36:04 AM by wwzsocki
Merited by tranthidung (1)
 #21

Today I found that there are a couple of addons for Google chrome and other browsers that are vulnerable to the Punycode and  Homograph Phishing attacks.

PhishProtect Beta: Free open-source tool to protect against homograph attacks and zero-day phishing powered by AI and Computer Vision. The tool redirects the browser to a warning page when IDN/Unicode URL or zero-day phishing website is detected and the full Punycode (ASCII) representation is displayed.
https://chrome.google.com/webstore/detail/phishprotect-beta/mikecfgnmakjomepfcghpbhfamjbjhid

Punycode alert: extension that alerts you when a Unicode URL has been opened preventing phishing attacks.
URLs can be registered in Unicode and some scams can be made with URLs looking like official websites. This extension alerts you when the URL is of this kind.
https://chrome.google.com/webstore/detail/punycode-alert/odbbcdajedbapmgpgfacfigdpbdahenh

These two are not known so much but have a couple of thousands of users but is hard to tell something more about them and to find more info or reviews online.

The last addon I found is Punycode Domain Detection and is the most known from these three. I found a couple of articles about it. Developed by Phish.ai and released a Google Chrome extension that can detect when users are accessing domains spelled using non-standard Unicode characters and warn the users about the potential of a homograph attack.



Here link: https://chrome.google.com/webstore/detail/punycode-domain-detection/fkenopinnpinfcjneoanjoimhkmdcjne

If you wish to read more here is the article I used as a source for information: https://www.bleepingcomputer.com/news/security/chrome-extension-detects-url-homograph-unicode-attacks/

1714011728
Hero Member
*
Offline Offline

Posts: 1714011728

View Profile Personal Message (Offline)

Ignore
1714011728
Reply with quote  #2

1714011728
Report to moderator
1714011728
Hero Member
*
Offline Offline

Posts: 1714011728

View Profile Personal Message (Offline)

Ignore
1714011728
Reply with quote  #2

1714011728
Report to moderator
1714011728
Hero Member
*
Offline Offline

Posts: 1714011728

View Profile Personal Message (Offline)

Ignore
1714011728
Reply with quote  #2

1714011728
Report to moderator
The Bitcoin network protocol was designed to be extremely flexible. It can be used to create timed transactions, escrow transactions, multi-signature transactions, etc. The current features of the client only hint at what will be possible in the future.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
yazher
Hero Member
*****
Offline Offline

Activity: 2170
Merit: 585


You own the pen


View Profile
October 11, 2019, 10:42:43 AM
Merited by wwzsocki (1)
 #22

This is some scary phishing technique, another worth thread to post on my daily news today. I'll make them aware of this kind of phishing.
A few months ago I entered a fake Bitcointalk site but instead of .org the fake one is .to I'm close to getting hack by that site because I am already in the login window. I was about to sign in when I see something strange with the domain name and read it again, Damn, it was not the original site rather it's the fake one.

Base on your examples they are only interested in hacking Big exchanges account, If they make something like a Bitcointalk site, many users will fall and become victims with this kind of phishing. That's why I need them to be aware of this kind of stuff.

.freebitcoin.       ▄▄▄█▀▀██▄▄▄
   ▄▄██████▄▄█  █▀▀█▄▄
  ███  █▀▀███████▄▄██▀
   ▀▀▀██▄▄█  ████▀▀  ▄██
▄███▄▄  ▀▀▀▀▀▀▀  ▄▄██████
██▀▀█████▄     ▄██▀█ ▀▀██
██▄▄███▀▀██   ███▀ ▄▄  ▀█
███████▄▄███ ███▄▄ ▀▀▄  █
██▀▀████████ █████  █▀▄██
 █▄▄████████ █████   ███
  ▀████  ███ ████▄▄███▀
     ▀▀████   ████▀▀
BITCOIN
DICE
EVENT
BETTING
WIN A LAMBO !

.
            ▄▄▄▄▄▄▄▄▄▄███████████▄▄▄▄▄
▄▄▄▄▄██████████████████████████████████▄▄▄▄
▀██████████████████████████████████████████████▄▄▄
▄▄████▄█████▄████████████████████████████▄█████▄████▄▄
▀████████▀▀▀████████████████████████████████▀▀▀██████████▄
  ▀▀▀████▄▄▄███████████████████████████████▄▄▄██████████
       ▀█████▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀█████▀▀▀▀▀▀▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.PLAY NOW.
magneto
Hero Member
*****
Offline Offline

Activity: 1666
Merit: 753


View Profile
October 11, 2019, 11:43:41 AM
 #23

Extremely comprehensive guide. I did know of these phishing websites before but didn't know the exact method that scammers seem to do this by.

I think that browsers should definitely show these codes by default, or at least have better algorithms that detect when the user is visiting a fraudulent site. Of course it is impossible to keep up with these phishers 100% all the time, but it should at least get periodically updated (this sort of scam has been around for a while now).

The majority of these phishing sites come from google ads as far as I know. You should never click on any of them. Even top search results can sometimes contain these sites if the site is relatively new. As others would have probably suggested, even though bookmarks may seem like a hassle, they are definitely worth it.
Lafu
Legendary
*
Offline Offline

Activity: 2954
Merit: 3037



View Profile
October 11, 2019, 12:19:51 PM
Merited by wwzsocki (1)
 #24

Great post and thread , sadly i have just seen it now lol  Cheesy !

Nice information and explain about the whole thing , respect !

This deserved 3 Merits from me to you  , so you Hit now the Legendary Rank with it !


Congrats for the Legendary and welcome in the Club !  Cool

Regards Lafu

wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
October 11, 2019, 01:19:46 PM
 #25

Great post and thread , sadly i have just seen it now lol  Cheesy !

Nice information and explain about the whole thing , respect !

This deserved 3 Merits from me to you  , so you Hit now the Legendary Rank with it !


Congrats for the Legendary and welcome in the Club !  Cool

Regards Lafu

Thank you very much Lafu!!!

This is a real achievement for me, so I will remember this first post as a Legendary member and those 3 merits which made it possible for a very long time, probably forever  Cheesy.

After so many years, I finally got to the most famous Legendary club, it's a little hard to believe, that it is right now and on the other hand it lasted for so long.

Mission accomplished 

crypto mania
Member
**
Offline Offline

Activity: 476
Merit: 92


View Profile
October 12, 2019, 12:31:28 PM
Last edit: October 12, 2019, 12:57:56 PM by crypto mania
 #26

...Congrats for the Legendary and welcome in the Club !  Cool..

CONGRATUALTIONS!!!

You finally did it. Amazing achievement taking into consideration that this only took 2 years.
As you see I am back after so long again because of you. I will to be more active because is a shame to left this account after so much work I already did.
One more time thank you for everything you did for me on the forum and sorry for all the problems you had because of me.

I see that your posting skills are indeed on a much higher level and hovering merits is now for you something common.
This Punnycode thread is one of best I have read lately about security breaches on Bitcointalk forum, kudos for that.
wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
October 24, 2019, 09:32:14 AM
 #27

...I think that browsers should definitely show these codes by default, or at least have better algorithms that detect when the user is visiting a fraudulent site. Of course it is impossible to keep up with these phishers 100% all the time, but it should at least get periodically updated (this sort of scam has been around for a while now)...

Exactly, I was wondering about the exact same thing which is why the hell browsers just don't implement something which will show the real URL, message in a popup or something else which will be really helpful and easy to use and understand. Despite everything as for now, there is no solution provided from browsers creators and all I found was a couple of addons and already written about this a couple of posts above.

...The majority of these phishing sites come from google ads as far as I know. You should never click on any of them. Even top search results can sometimes contain these sites if the site is relatively new...

This is, of course, true what you have written but outside Google Ads are also plenty of them. I have Ad blockers installed (uBlock Origin) and still already was a couple of times on such phishing websites that use Punycode and Homograph Phishing attacks to steal your passwords and only thanks to my password manager I haven't shared it.

I think we have to prepare for even the worst situation in the future because phishing websites count is growing with insane speeds. Today I have read a great post about this subject in this thread: Re: Half of all Phishing Sites Now Have the Padlock Sign

wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
November 25, 2019, 09:23:30 AM
Last edit: November 25, 2019, 12:27:34 PM by wwzsocki
Merited by OcTradism (2), DdmrDdmr (1)
 #28

I found a great service called Gluee with multiple tools for webmasters and developers but the most important thing for us is that there are a couple of tools to protect against Punycode vulnerability.


https://www.gluee.com/tools/

As you can see the first one called Punycoder is a tool that converts text with special characters (UNICODE) to the Punycode encoding (just ASCII) and vice versa.

This is a great tool to check all suspicious Phishing Punycode URLs. Just copy and paste the needed link.


https://www.punycoder.com/

Punycoder - Punycode converter or an IDN converter, a tool for Punycode to Text/Unicode and vice-versa conversion.

I advise checking the other tools from this website because they can help to stay safer online if we use them.

wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
September 12, 2020, 08:07:49 PM
Last edit: September 12, 2020, 08:18:22 PM by wwzsocki
Merited by DdmrDdmr (1)
 #29

Wandera - the world's largest provider of cloud security for remote workers, just published its Cloud Security Report for September 2020.

In which they refocus on phishing, looking at the length of phishing URLs compared to safe URLs, but nor only.

Researches from Wandera found that the length of a URL can be a telltale sign of a phishing attack.

Quote
legitimate URLs typically sit between 20 and 44 characters, anything beyond that is most likely a phishing link. On average, requests made to unsafe domains were 1.8x the length of requests made to safe domains.

Wandera researches warn that spotting suspicious links could be very problematic on smartphones and tablets because modern browsers truncate URLs for a sleeker design.

Quote
Users need to apply a greater level of scrutiny when using browsers on mobile devices, particularly given the rise in use of punycode in phishing URLs.

I encourage everyone to read about Punycode and Phishing attacks, in this report are many interesting pieces of information, like the days of the week in which people visit phishing sites the most.

Quote
... largely stable during the week aside from Monday... Interestingly, Saturday was the day with the highest number of requests made to phishing domains.

Here link to the full report: https://www.wandera.com/cloud-security-report-september-2020/

adamvp
Hero Member
*****
Offline Offline

Activity: 1246
Merit: 708



View Profile
November 05, 2020, 05:56:35 PM
 #30

Very valuable work wwzoscki! I was aware of phising threats, but I have never heard about such thing as punnycode. And it is one of most dangerous one, sometimes it needs to enter dangerous side to harm your computer. Many thanks, good job!

I am looking for signature campaign Wink pm me
wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
November 07, 2020, 05:54:21 PM
Last edit: November 07, 2020, 06:08:33 PM by wwzsocki
Merited by DdmrDdmr (2)
 #31

Very valuable work wwzoscki! I was aware of phising threats, but I have never heard about such thing as punnycode...

Thank you @Adamvp for your kind words.

I created this thread because I was almost hacked using Punycode attack, thanks to Metamsk and password manager I was able to spot this on time but to be honest, I already started to write a password manually (few first ciphers) when I stopped because something filled wrong about this login.

I was logged in earlier and normally my password and username are automatically filled when I am on the correct website and here it wasn't, despite I was logged in a few minutes earlier and only closed the tab. Additionally on the correct website, when I start to type email or password the login details came up automatically thanks to the password manager, and here it wasn't. Second-time Metamask warned me that I am on a phishing website and didn't let me proceed further.

So, I started to dig this Punycode topic and found that we are almost defenseless because these pishing URLs are exactly the same or almost identical to the original.

I think, I am quite paranoid about privacy and malicious threats and if I was so easily almost hacked I can imagine that many people are vulnerable every day even without knowing it.
So if this thread helps somebody to defend himself or at least to be aware of the danger, then I am ok with that and think that the job is done Wink.

OcTradism
Hero Member
*****
Offline Offline

Activity: 1722
Merit: 801



View Profile WWW
November 08, 2020, 10:14:24 AM
Merited by wwzsocki (1)
 #32

I created this thread because I was almost hacked using Punycode attack, thanks to Metamsk and password manager I was able to spot this on time but to be honest, I already started to write a password manually (few first ciphers) when I stopped because something filled wrong about this login.

I was logged in earlier and normally my password and username are automatically filled when I am on the correct website and here it wasn't, despite I was logged in a few minutes earlier and only closed the tab. Additionally on the correct website, when I start to type email or password the login details came up automatically thanks to the password manager, and here it wasn't. Second-time Metamask warned me that I am on a phishing website and didn't let me proceed further.
Your story sounds like you chose "Remember my password on this site (something like that)" on the browser you used to log in. I don't think it is good way to do despite of its simplicity and convenience. I never choose this option on any browser and everytime I log in, I manually type passwords.

Some sites have their security methods to automatic log out your accounts (on browser, on mobile) each month. And what you said is not always true that the site you are logging in your account is a phishing site.

.
.Duelbits.
█▀▀▀▀▀











█▄▄▄▄▄
TRY OUR
  NEW  UNIQUE
GAMES!
.
..DICE...
███████████████████████████████
███▀▀                     ▀▀███
███    ▄▄▄▄         ▄▄▄▄    ███
███   ██████       ██████   ███
███   ▀████▀       ▀████▀   ███
███                         ███
███                         ███
███                         ███
███   ▄████▄       ▄████▄   ███
███   ██████       ██████   ███
███    ▀▀▀▀         ▀▀▀▀    ███
███▄▄                     ▄▄███
███████████████████████████████
.
.MINES.
███████████████████████████████
████████████████████████▄▀▄████
██████████████▀▄▄▄▀█████▄▀▄████
████████████▀ █████▄▀████ █████
██████████      █████▄▀▀▄██████
███████▀          ▀████████████
█████▀              ▀██████████
█████                ██████████
████▌                ▐█████████
█████                ██████████
██████▄            ▄███████████
████████▄▄      ▄▄█████████████
███████████████████████████████
.
.PLINKO.
███████████████████████████████
█████████▀▀▀       ▀▀▀█████████
██████▀  ▄▄███ ███      ▀██████
█████  ▄▀▀                █████
████  ▀                    ████
███                         ███
███                         ███
███                         ███
████                       ████
█████                     █████
██████▄                 ▄██████
█████████▄▄▄       ▄▄▄█████████
███████████████████████████████
10,000x
MULTIPLIER
NEARLY UP TO
.50%. REWARDS
▀▀▀▀▀█











▄▄▄▄▄█
wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
November 09, 2020, 11:33:15 PM
 #33

Your story sounds like you chose "Remember my password on this site (something like that)...

No, not exactly, I had it saved in my password manager, and every time I start to type he show the right option right away and here it was empty.

Still, I didn't realize and started to manually provide the password, luckily I don't know it and I wasn't able to figure it out, luckily I recognized something is wrong
and haven't provided any valuable info to the hackers.

It's really tricky and to be honest, we should check all URLs we are not fully sure of.

adamvp
Hero Member
*****
Offline Offline

Activity: 1246
Merit: 708



View Profile
November 24, 2020, 11:46:31 PM
 #34

I created this thread because I was almost hacked using Punycode attack, thanks to Metamsk and password manager I was able to spot this on time but to be honest, I already started to write a password manually (few first ciphers) when I stopped because something filled wrong about this login.

I was logged in earlier and normally my password and username are automatically filled when I am on the correct website and here it wasn't, despite I was logged in a few minutes earlier and only closed the tab. Additionally on the correct website, when I start to type email or password the login details came up automatically thanks to the password manager, and here it wasn't. Second-time Metamask warned me that I am on a phishing website and didn't let me proceed further.
Your story sounds like you chose "Remember my password on this site (something like that)" on the browser you used to log in. I don't think it is good way to do despite of its simplicity and convenience. I never choose this option on any browser and everytime I log in, I manually type passwords.

Some sites have their security methods to automatic log out your accounts (on browser, on mobile) each month. And what you said is not always true that the site you are logging in your account is a phishing site.

Manualy typing is very dangerous .. it needs only your computer is infected by keylogger and hacker will know your password immediatelly! Only good password manager (with good encryption,) is reliable solution!!

I am looking for signature campaign Wink pm me
wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
November 26, 2020, 03:54:23 PM
 #35

Manualy typing is very dangerous... Only good password manager (with good encryption,) is reliable solution!!

I agree but despite everything and that I had one, still, I started to manually log in when there was no response from the password manager.

As I said, I was lucky to recognize something is wrong but can assume that many people can't and login every day on phishing sites.

Thanks to this event, this thread came to existence, I hope that at least a few members more are aware of this threat thanks to my writings.

adamvp
Hero Member
*****
Offline Offline

Activity: 1246
Merit: 708



View Profile
December 08, 2020, 07:17:57 PM
 #36

Yes, I was made aware of this danger thanks to your thread, I think this thread should be pinned!
Or maybe this is a thread about  biggest threats and it could be linked there?

I am looking for signature campaign Wink pm me
wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
January 24, 2021, 08:21:42 PM
Merited by adamvp (1)
 #37

Or maybe this is a thread about  biggest threats and it could be linked there?

Don't know to be honest but I fully agree with you that Punycode is the biggest threat for normal internet user today when it comes to browsing the web and using URLs.

Despite many tools I have found and even reviewed in this thread, still I haven't found even one which will be easy to use and widely distributed like an extension or something.

This is for my very surprising that nobody created something like this because taking in consideration the scale of danger, even paid version could be easily a big success

And now shout out to the community, if anybody have seen or uses any tool that helps with Punycode and Homographs, please share!

o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18507


View Profile
January 24, 2021, 10:13:36 PM
Last edit: January 24, 2021, 10:26:49 PM by o_e_l_e_o
Merited by wwzsocki (1)
 #38

Despite many tools I have found and even reviewed in this thread, still I haven't found even one which will be easy to use and widely distributed like an extension or something.
You don't really want to install an extension for something so simple to solve. Every extension you install is a security risk, and unless you sit down and review all the code yourself (which few users have the knowledge and skill set to do, and even fewer actually do it), then you are introducing more and more unknown and potentially malicious code in to your browser with every extension you install. With any browser, you should be aiming to keep the number of extensions you use to the bare minimum, and they should only be ones which are open source and independently reviewed unless you are reviewing the code yourself. Malicious extensions can do everything from change bitcoin addresses in your clipboards through to stealing your passwords and your coins.

In Tor or Firefox, simply open a new tab, enter about:config, accept the warning, and change the preference "network.IDN_show_punycode" from false to true.
Chromium based browsers now show punycode as default, provided they are up to date.
wwzsocki (OP)
Legendary
*
Offline Offline

Activity: 2730
Merit: 1706


First 100% Liquid Stablecoin Backed by Gold


View Profile WWW
January 25, 2021, 04:21:53 PM
Last edit: January 25, 2021, 04:34:11 PM by wwzsocki
 #39

...In Tor or Firefox, simply open a new tab, enter about:config, accept the warning, and change the preference "network.IDN_show_punycode" from false to true.
Chromium based browsers now show punycode as default, provided they are up to date.

Thank you very much for your input @Oeleo. It would be great if you can show how it's look like by default in Google browser?

Is there any message shown that this is Punycode, don't understand quite correctly because don't use it from quite some time,

Still, I use Brave which is also build on Chromium and haven't noticed anything to be honest.

I will soon make an tutorial with screens how to set up this on Firefox for less experienced members but would be great to show also some Google examples.

Please explain more exactly how it works on Google now? Does it mean they don't show URLs translated to ASCII only original once?

o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18507


View Profile
January 25, 2021, 05:02:26 PM
Merited by adamvp (1)
 #40

It would be great if you can show how it's look like by default in Google browser?
I'm afraid I can't since I flat out refuse to install anything related to Google on my devices, especially not Google Chrome since it is spyware and a privacy nightmare.

According to the Chrome Release Notes here (https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html), this has been addressed (CVE-2017-5060) since version 58, and Chrome and Chromium based browsers should display the raw "xn--abc123" code.

There are images of this on this page: https://www.thesslstore.com/blog/security-changes-in-chrome-58/
Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!