(OT) Google: "Somebody knows your password"

Xen list at xenhideout.nl
Fri Aug 4 07:49:56 UTC 2017


Joel Rees schreef op 04-08-2017 8:05:

> Or, if you are not using plaintext, the displayed URL can be different 
> from the actual link.

What Joel means is that HTML emails can hide the actual URL you are 
visiting and show you something else.

The DNS poisoning thing would require for example a (Windows) computer 
to be compromised and the "hosts" file to include an entry for 
google.com or whatever, causing lookups for that domain to go there. 
Unlikely perhaps. Same could happen on Linux but even more unlikely at 
this stage.

With regards to SSL/TLS certificates... if there is a fishing attack and 
the browser thinks it is going to https://account.google.com/ or 
whatever, then the browser will request the certificate from the server. 
It will then verify that the certificate contains the URL you just 
visited, and that it can validate the certificate according to a root 
certificate present in its own (local) database.

So typically it should not be possible that anyone can impersonate that 
website, unless of course the computer was also compromised, and a 
validating certificate was added by the hacker to the root certificate 
store of your browser (or computer).

So if there is actually a malware on the computer then both could and 
would be possible and you could indeed go to https://account.google.com 
or whatever and not know you were being misled.

If there is not any malware on the computer, then it should not ever be 
possible.

I assume this isn't the case, so the only possibility would be that the 
link you click on is different from what the browser shows you.

But I would indeed follow Joel's advice if I were you.

> Use a different device, preferably on a network you trust, go directly 
> to Google by typing the address in the browser URL field. Change your 
> passwords again, to something completely different.




More information about the ubuntu-users mailing list