Bonsoir,
Je reçois régulièrement ce type de message en lien avec mon site joomla :
Hi Team,
My name is Mustufa, and I'm lead penetration tester at BugStrix. BugStrix is a team of cybersecurity experts who specialize in the VAPT(Vulnerability Assessment & Penetration Testing) of online business solutions. Our team enables organizations to achieve their digital innovation outcomes without compromise on security by delivering a true cybersecurity service ensuring your products and services work seamlessly.
We have found a potential vulnerability in the site. Please review the report below.
Vulnerability Type: UI REDRESSING
Description:
Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of style sheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.
POC:
<html>
<body>
<h1>Clickjacking in your website</h1>
<iframe width="1000" height="800" src="Your Website Login Page Url"
</body>
</html>
Impact:
1. The user may feel they are inputting their email or password, but they are actually typing into an invisible frame controlled by the attacker.
2. The site can also be opened in an iframe after the user has logged it making it hard for the user to avoid phishing.
3. A user can be tricked into downloading a malicious file that an attacker wants a user to download, allowing an attacker to gain access to the user’s device.
If you require any additional information, please let us know. We will be waiting to hear from your side.
---
Regards,
Syed,
BugStrix team
Selon vous, est-ce un courriel type commercial pour vendre des prestations liées à la sécurité de mon site internet ? Y-a-t-il réellement un souci de vulnérabilité ?
Mon site est actuellement sous Joomla! 3.10.2 Stable.
Merci d'avance pour vos retour :-)
Cordialement,
Jérôme
Je reçois régulièrement ce type de message en lien avec mon site joomla :
Hi Team,
My name is Mustufa, and I'm lead penetration tester at BugStrix. BugStrix is a team of cybersecurity experts who specialize in the VAPT(Vulnerability Assessment & Penetration Testing) of online business solutions. Our team enables organizations to achieve their digital innovation outcomes without compromise on security by delivering a true cybersecurity service ensuring your products and services work seamlessly.
We have found a potential vulnerability in the site. Please review the report below.
Vulnerability Type: UI REDRESSING
Description:
Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of style sheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.
POC:
<html>
<body>
<h1>Clickjacking in your website</h1>
<iframe width="1000" height="800" src="Your Website Login Page Url"
</body>
</html>
Impact:
1. The user may feel they are inputting their email or password, but they are actually typing into an invisible frame controlled by the attacker.
2. The site can also be opened in an iframe after the user has logged it making it hard for the user to avoid phishing.
3. A user can be tricked into downloading a malicious file that an attacker wants a user to download, allowing an attacker to gain access to the user’s device.
If you require any additional information, please let us know. We will be waiting to hear from your side.
---
Regards,
Syed,
BugStrix team
Selon vous, est-ce un courriel type commercial pour vendre des prestations liées à la sécurité de mon site internet ? Y-a-t-il réellement un souci de vulnérabilité ?
Mon site est actuellement sous Joomla! 3.10.2 Stable.
Merci d'avance pour vos retour :-)
Cordialement,
Jérôme
Commentaire