Featured Post

Hottest Girls on Facebook & Their Sexy Profile Pictures

A lot of sexy Facebook cuties. 1 2 3 4 5   6 7 8 9 ...

Post Top Ad

Friday, December 21, 2012

Hacker Selling Yahoo Mail Exploit for $700

Yahoo campus signA hacker has begun selling what is claim to be a zero-day exploit that will let criminals hijack control of Yahoo Mail users' accounts.

The hacker, who goes by the moniker TheHell, posted a video marketing a $700 exploit kit on the secretive Darkode cybercrime market today. The video was later spotted and reposted onto YouTube by security blogger Brian Krebs.

"I'm selling Yahoo stored xss that steal Yahoo emails cookies and works on ALL browsers. And you don't need to bypass IE or Chrome xss filter as it do that itself because it's stored xss," TheHell proclaimed in his marketing video. "Prices around for such exploit is $1,100 - $1,500, while I offer it here for $700. Will sell only to trusted people cuz I don't want it to be patched soon"

The exploit infects users machines via a malicious email link and reportedly targets a cross-site scripting (XSS) weakness in Yahoo.com.

TheHell claimed that when clicked the malicious link exploits a cross-site scripting bug that lets criminals steal Yahoo Mail cookies. The cookies can then reportedly be used to log into and steal control of any compromised Yahoo mail account.

Krebs has reportedly informed Yahoo of the vulnerability. It is unclear whether the exploit will work, though numerous security vendors, including Trend Micro security director Rik Ferguson, have indicated TheHell's claims could be legitimate.

"We discovered something very similar in Hotmail not too long ago," Ferguson said. "How serious could it be? Well considering how interlinked our online services are, and how the email account is often at the heart of our web of existence it's like handing over the keys to your online identity."

F-Secure security researcher Sean Sullivan added that if legitimate, the exploit could prove the next hot item on the online black market.

"It certainly isn't a good thing that an active session cookie can be stolen or hijacked. But then, that's why I typically log off and purge my browser's cache at the end of the day," Sullivan said. "Also, it's why I ‘browse' with one browser (system default) and ‘logon' with another. I can see this type of attack being very useful for a select audience."

This article was originally published on V3.

SES London

Early Bird Rate Ends Friday!

18-21 February 2013: The brightest and most insightful marketing minds in the industry will be gathering at SES London. SAVE up to £300 on an All Access Pass through 21 December. Register today!


View the original article here

No comments:

Post a Comment

Comments System

Disqus Shortname

Author Info (Documentation Required)