Windows attack can steal your logged-in username and password

windows-jpeg.jpg

(Image: Habrahabr.ru)

A previously-disclosed flaw in Windows can easily allow an attacker to steal usernames and passwords of any signed-in user — simply by tricking a user into visiting a malicious website.

But now a new proof-of-exploit shows just how easy it is to steal someone’s credentials.

The flaw is widely-known, and is said to be almost 20 years old. It was allegedly found back in 1997 by Aaron Spangler, and was most recently resurfaced by researchers in 2015 at Black Hat, an annual security and hacking conference in Las Vegas.

The flaw wasn’t considered a major issue until Windows 8 began allowing users to sign into their Microsoft accounts — which links their Xbox, Hotmail and Outlook, Office, and Skype accounts, among others.

Overnight, the attack got larger in scope, and can now allow an attacker to conduct a full takeover of a Microsoft account.

The flaw works because Internet Explorer, and Edge (on Windows 10) allows a user to access local network shares, but doesn’t fully block connections to remote shares. To exploit this, a hacker has to trick a user into visiting a specially-crafted web page in Internet Explorer, or Edge (on Windows 10) that points to their own network share. The browser will silently send usernames and hashed passwords to the network share, which can then be scooped up and stolen.

ie-edge-exploit

ie-edge-exploit

(Image: Xiaoran Wang, et al)

If the password is weak, it can be easily unscrambled and used to log in to a user’s account.

The flaw can also be triggered by sending a trick email to a victim who uses Microsoft Outlook.

Perfect Privacy, a virtual private networking (VPN) provider, said in a blog post that VPN connections are also affected. If a user visits a site while they’re connected to a VPN, their credentials will also leak, potentially affecting the anonymity of the user.

The group set up a proof-of-exploit page that churns back your username, domain, and hashed password — which it then tries to crack (if it’s an easy-to-guess password, it’ll take just seconds).

We were able to verify on three computers in our lab using separate disposable Microsoft account logins. It’s not immediately clear where any submitted data goes, so we strongly recommend that you do not submit your own credentials to the site.

There’s a simple mitigation, according to the group. Don’t use Internet Explorer, Edge, or Microsoft Outlook, and don’t log in to Windows with a Microsoft account.

Chrome and Firefox users aren’t affected.

A spokesperson for Microsoft did not have any comment at the time of writing.

Black Hat 2016