Android app brings cookie stealing to unwashed masses
Hello. It's time for always-on SSL
A developer has released an app for Android handsets that brings website credential stealing over smartphones into the script kiddie realm.
FaceNiff, as the Android app is called, can be used to steal unencrypted cookies on most Wi-Fi networks, giving users a point-and-click interface for stealing sensitive authentication tokens sent over Facebook, Twitter, and other popular websites when users don't bother to use encrypted SSL, or secure sockets layer, connections. The app works even on networks protected by WPA and WPA2 encryption schemes by using a technique known as ARP spoofing to redirect local traffic through the attacker's device. An attacker would have to know the security password, however.
To be sure, FaceNiff doesn't do anything that hasn't been done for decades, and based on a YouTube video and comments on an official support forum, the app seems to have its share of quirks. Programs such as SSLSniff, released years ago by Moxie Marlinspike, contain considerably more powerful capabilities even if they lack a smartphone GUI.
But by making it possible for ordinary Android users to hijack other people's Web 2.0 accounts, FaceNiff has the potential to be something like the smartphone equivalent of Firesheep, a Firefox browser extension that brought new urgency to the decades-old threat of using unencrypted web connections. FaceNiff lacks some of the automated features of Firesheep, but that could change with a few updates to the Android app.
Over the past year or so, Google, Facebook, Twitter, and Microsoft have upgraded a variety of their services to add always-on SSL, which is the only effective way to prevent the theft of authentication tokens. Those protections on several occasions have been found to be far from perfect, but they're a step in the right direction.
And they've been rolled out increasingly thanks to the growing awareness that comes from DIY man-in-the-middle tools like Firesheep. ®
What a good idea...
So when is El Reg going to support always-on SSL (or even sometimes on) for the comments?
Or even for the content?
So we can read what we like without fearing that BT/Phorm, Vodafone/Bluecoat, or TalkTalk/Huawei or any other bent ISP can monitor, censor, or interfere with the articles here?
If only to save your revenue. One of those three bragged they were capable of rewriting ads on the fly... to make them 'more relevant'.
C'mon Reg. You're supposed to be savvy. You know what these evil crooks are doing. Set an example.
It is time to encrypt the web.
>"rolled out increasingly thanks to the growing awareness"
And this is why full disclosure is the right thing to do. If you don't do it, the big firms never fix anything. If you do, things get fixed. It's a no-brainer.