@fl : Thanks for your response!
Extremely worrysome is that Cloudflare is very USA (FISA Section 702) and MitM's all https connections: https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/
@fl : Thanks for your response!
Extremely worrysome is that Cloudflare is very USA (FISA Section 702) and MitM's all https connections: https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/
171.178.220.60.adsl-pool.sx[.]cn - does anyone know why zillions of such domain names are behind Cloudflare?
Open the RELATIONS tab in https://www.virustotal.com/gui/ip-address/104.21.73.215/relations
Cloudflare now *IS* the internet (central hub)?
@jschwart : aan add-ons hebben we niks: die zullen door veel te weinig mensen worden gebruikt waardoor er niets verandert (bovendien bestaat het risico dat mensen nep-add-ons installeren).
Het gaat om een *combinatie* van wijzigingen die de EU zal moeten afdwingen.
Domeinnamen (inclusief het toenemende aantal TLD's) zijn namelijk het *probleem*. Je kunt ze vergelijken met telefoonnummers of woonadressen, potentieel iets- of nietszeggende strings die van een eigenaar *kunnen* zijn (en morgen van een ander). De enige voordelen ervan zijn dat ze uniek zijn en meestal kort.
De meeste internetters begrijpen echter niet hoe je ze moet interpreteren, zoals dat
www-example·com
iets heel anders is dan
www.example·com
(om het nog maar niet te hebben over IDN's zoals in
"https:⧸⧸lîdl·be/login").
Ik zie geen andere oplossing dan voor *mensen* begrijpelijke en traceerbare identificerende informatie opnemen in websitecertificaten, waaronder bijv. (indien beschikbaar) een KvK-nummer (in tegenstelling tot bij 'whois' kun je bij de KvK wel zinvolle identificerende info vinden). Alleen al betrouwbaar weten in welk land de websiteverantwoordelijke gevestigd is, zou al enorm kunnen helpen tegen oplichting.
In https://infosec.exchange/@ErikvanStraten/113990009126611573 zie je een screenshot van
https://play.google-ivi·com
waar Google Trust Services "gewoon" een ceetificaat voor uitgeeft (te zien in https://infosec.exchange/@ErikvanStraten/114061799937444243).
"Franse overheid voert phishingtest uit op 2,5 miljoen leerlingen"
https://www.security.nl/posting/881630/Franse+overheid+voert+phishingtest+uit+op+2%2C5+miljoen+leerlingen
KRANKZINNIG!
Het is meestal onmogelijk om nepberichten (e-mail, SMS, ChatApp, social media en papieren post - zie plaatje) betrouwbaar van echte te kunnen onderscheiden.
Tegen phishing en vooral nepwebsites is echter prima iets te doen, zoals ik vandaag nogmaals beschreef in https://security.nl/posting/881655.
(Big Tech en luie websitebeheerders willen dat niet, dus is en blijft het een enorm gevecht).
@mensrea : if you visit a shop (or a bank) in the center of the city, chances are near zero that it's run by impostors.
However, if you go to some vague second hand market, chances are the you will be deceived.
Possibly worse, if there's an ATM on the outside wall of a shack where Hells Angels meet, would you insert your bank card and enter your PIN?
On the web, most people do not know WHERE they are.
Big Tech is DELIBERATELY withholding essential information from people, required to determine the amount of trust that a website deserves.
DELIBERATELY, because big tech can rent much more (cheap) hosting and (meaningless) domain names to whomever if website vistors cannot distinguish between authentic and fake websites.
You are right that some people will never understand why they need to know who owns a website.
However, most people (including @troyhunt ) would enormously benefit.
Like all the other deaf and blind trolls, you trash a proposal because it may be useless for SOME, you provide zero solutions and you keep bashing me.
What part of "get lost" do you not understand?
@mensrea : it is not the UI/UX that is the problem. It is missing reliable info in the certs.
Image from https://infosec.exchange/@ErikvanStraten/114224682101772569
@aral :
I don't want to pay a cent. Neither donate, nor via taxes.
@aral : most Let's Encrypt (and other Domain Validated) certificates are issued to junk- or plain criminal websites.
They're the ultimate manifestation of evil big tech.
They were introduced to encrypt the "last mile" because Internet Service Providers were replacing ads in webpages and, in the other direction, inserting fake clicks.
DV has destroyed the internet. People loose their ebank savings and companies get ransomwared; phishing is dead simple. EDIW/EUDIW will become an identity fraud disaster (because of AitM phishing atracks).
Even the name "Let's Encrypt" is wrong for a CSP: nobody needs a certificate to encrypt a connection. The primary purpose of a certificate is AUTHENTICATION (of the owner of the private key, in this case the website).
However, for human beings, just a domain name simply does not provide reliable identification information. It renders impersonation a peace of cake.
Decent online authentication is HARD. Get used to it instead of denying it.
REASONS/EXAMPLES
Troy Hunt fell in the DV trap: https://infosec.exchange/@ErikvanStraten/114222237036021070
Google (and Troy Hunt!) killed non-DV certs (for profit) because of the stripe.com PoC. Now Chrome does not give you any more info than what Google argumented: https://infosec.exchange/@ErikvanStraten/114224682101772569
https:⧸⧸cancel-google.com/captcha was live yesterday: https://infosec.exchange/@ErikvanStraten/114224264440704546
Stop phishing proposal: https://infosec.exchange/@ErikvanStraten/113079966331873386
Lots of reasons why LE sucks:
https://infosec.exchange/@ErikvanStraten/112914047006977222 (corrected link 09:20 UTC)
This website stopped registering junk .bond domain names, probably because there were too many every day (the last page I found): https://newly-registered-domains.abtdomain.com/2024-08-15-bond-newly-registered-domains-part-1/. However, this gang is still active, open the RELATIONS tab in https://www.virustotal.com/gui/ip-address/13.248.197.209/relations. You have to multiply the number of LE certs by approx. 5 because they also register subdomains and don't use wildcard certs. Source: https://www.bleepingcomputer.com/news/security/revolver-rabbit-gang-registers-500-000-domains-for-malware-campaigns/
@lewiray : phishing can and should be mitigated.
See https://infosec.exchange/@ErikvanStraten/114222237036021070 and (I just wrote this) https://infosec.exchange/@ErikvanStraten/114224682101772569.
@rohare : phishing can and should be mitigated.
See https://infosec.exchange/@ErikvanStraten/114222237036021070.
@BjornW :
I've stopped doing that after a lot of people called me an idiot and a liar if I kindly notified them. I stopped, I'll get scolded anyway.
Big tech and most admins want everyone to believe that "Let's Encrypt" is the only goal. Nearly 100% of tech people believe that.
And admins WANT to believe that, because reliable authentication of website owners is a PITA. They just love ACME and tell their website visitors to GFY.
People like you tooting nonsense get a lot of boosts. It's called fake news or big tech propaganda. If you know better, why don't you WRITE BETTER?
It has ruined the internet. Not for phun but purely for profit. And it is what ruins people's lives and lets employees open the vdoor for ransomware and data-theft.
See also https://infosec.exchange/@ErikvanStraten/112914047006977222 (and, in Dutch, https://security.nl/posting/881296).
@troyhunt : if we open a website that we've never visited before, we need browsers to show us all available details about that website, and warn us if such details are not available.
We also need better (readable) certificates identifying the responsible / accountable party for a website.
We have been lied to that anonymous DV certificates are a good idea *also* for websites we need to trust. It's a hoax.
Important: certificates never directly warrant the trustworthyness of a website. They're about authenticity, which includes knowing who the owner is and in which country they are located. This helps ensuring that you can sue them (or not, if in e.g. Russia) which *indirectly* makes better identifiable websites more reliable.
More info in https://infosec.exchange/@ErikvanStraten/113079966331873386 (see also https://crt.sh/?Identity=mailchimp-sso.com).
Note: most people do not understand certificates, like @BjornW in https://mastodon.social/@BjornW/114064065891034415:
❝
@letsencrypt offers certificates to encrypt the traffic between a website & your browser.
❞
2x wrong.
A TLS v1.3 connection is encrypted before the website sends their certificate, which is used only for *authentication* of the website (using a digital signature over unguessable secret TLS connection parameters). A cert binds the domain name to a public key, and the website proves possession of the associated private key.
However, for people a domain name simply does not suffice for reliable identification. People need more info in the certificate and it should be shown to them when it changes.
Will you please help me get this topic seriously on the public agenda?
Edited 09:15 UTC to add: tap "Alt" in the images for details.
@0xF21D : Cloudflare is evil anyway.
Cloudflare reverse-proxies (or -proxied):
-
cloudflare.com.save-israel·org
-
ns.cloudflare.com.save-israel·org
-
albert.ns.cloudflare.com.save-israel·org
-
sydney.ns.cloudflare.com.save-israel·org
-
I don't know whether any of these domains were or are malicious, but such domain names are insane; expect evilness.
See also:
https://crt.sh/?Identity=save-israel.org
Tap "Alt" in the images for more info.
@spamhaus : why is .com not in your list?
For example, more than 2000 malicious .com domains can be found on one server in Russia: https://www.virustotal.com/gui/ip-address/193.143.1.14/relations (open the RELATIONS tab).
Note that malicious servers are increasingly hosted on US and EU big tech cloud servers - or hide behind CDN's, like CloudFlare, the worst of the worst: https://www.virustotal.com/gui/ip-address/188.114.96.0/relations (again, open the RELATIONS tab). Note: .xin appears to gain traction.
@dianasusanti : w.r.t. Indonesian speaking people, the image below that I just made shows another fake site - which will look familiar to Android users.
Note that it has a website certificate submitted by "Google Trust Services" while the site hides behind a Cloudflare IP-address.
It is not surprising that people fall for this, as (for example), to log in to Microsoft you have to go to:
https:⧸⧸login.microsoftonline.com
Instead of, any of, for example:
https:⧸⧸login.microsoft.com
https:⧸⧸login.365.microsoft.com
https:⧸⧸login.office.microsoft.com
Another scamwebsite:
https:⧸⧸lîdl·be/login
Note the î instead of the i.
P.S. I'm using
· instead of . and
⧸ instead of /
to prevent accidental opening.
Web onveiliger dan Noord Korea
De eerste onderstaande screenshot (gemaakt van https://www.rtl.nl/nieuws/economie/artikel/5488980/nu-er-ook-noord-korea-een-ikea-maar-deze-wel-illegaal), toont een gespoofde (vervalste) *fysieke* winkel. Zoiets zie je zelden of nooit in de westerse wereld (de dader zou snel door de mand vallen en de politie op bezoek krijgen).
Hoe anders is dat op het web! Daar krioelt het van de nepwebsites (zie ook https://infosec.exchange/@ErikvanStraten/113737891651336874) - en niemand die er écht en effectief iets tegen doet...
Als voorbeeld, uit https://www.heise.de/en/news/38C3-BogusBazaar-gang-still-operating-thousands-of-fake-stores-10221661.html:
❝
Dec 29, 2024 at 8:48 pm CET
By Dr. Christopher Kunz
The Chinese fake store factory "BogusBazaar" is still active and operates thousands of stores to defraud customers. The discoverers of the criminal network found this out and presented their discoveries at 38C3.
[...]
Matthias Marx from security service provider SRLabs and Kai Biermann from Zeit Online stated that although the network of fake stores has shrunk, the presumed Chinese originators have adapted their approach.
[...]
BogusBazaar, a criminal network of up to 75,000 fake stores, was uncovered in May.
❞
De tweede screenshot hieronder bevat een voortzetting van die tekst. Dat de daarin getoonde webshop nog steeds live is, en "gewoon" een nieuw certificaat van "GTS" (Google TRUST Services) kreeg, ziet u in de laatste twee plaatjes (daaronder).
Aangenaam voor de cybercriminelen is dat Cloudflare verhult waar de server echt staat (daar verdient Cloudflare vast goed aan). In https://www.virustotal.com/gui/domain/365dayfashion.shop/relations zijn namelijk twee Cloudflare IP-adressen te zien (naast dat oudere certificaten zichtbaar zijn, tevens uitgegeven door GTS).
Alle ooit voor deze websitenaam uitgegeven (TLS) webcertificaten kunt u zien in https://crt.sh/?Identity=365dayfashion.shop, de laatste (met alle details) in https://crt.sh/?id=16155692869 (details die deels te zien zijn in het laatste plaatje hieronder).
Volgens https://www.virustotal.com/gui/domain/365dayfashion.shop/detection detecteert uitsluitend Netcraft (van 94 anti-malware producten deze website als kwaadaardig; Google Safe Browsing (ook ingebouwd in andere browsers) waarschuwt u niet bij het bezoeken van deze nepwebshop.
Voor de gebruikte Cloudflare IP-adressen (172.67.209.160 en 104.21.69.151) waarschuwt "MalwareURL" met "Phishing" en "Cyble" met "Suspicious", aldus resp. https://www.virustotal.com/gui/ip-address/172.67.209.160/detection en https://www.virustotal.com/gui/ip-address/104.21.69.151/detection.