Blackberry Browser Bug Found

There is a new vulnerability for Blackberrys worldwide. Thought we were so safe didn't we? Recently discovered was the ability for hackers to execute phishing attacks on your Blackberry. This bug relates to the Browser dialog box that provides information about web site domain names and their associated certificates. The BlackBerry Browser dialog box informs the BlackBerry device user when there is a mismatch between the site domain name and the domain name indicated in the associated certificate, but does not properly illustrate that the mismatch is due to the presence of some hidden characters (for example, null characters) in the site domain name.
A malicious user could create a web site that includes a certificate that is purposely altered using null (hidden) characters in the certificate's Common Name (CN) field or otherwise manipulated to deceive a BlackBerry device user into believing they have connected to a trusted web site.
If the malicious user then performs a phishing-style attack by sending the BlackBerry device user a link to the web site in an SMS or email message that appears to be from a trusted source, and the BlackBerry device user chooses to access that site, the BlackBerry Browser will correctly detect the mismatch between the certificate and the domain name and display a dialog box that prompts the user to close the connection. However, the dialog box does not display null characters, so the user may believe they are connecting to a trusted site and disregard the recommended action to close the connection.


BlackBerry Browser dialog box that does not clearly indicate that there is a mismatch between the web server address and its associated certificate:

BlackBerry Browser dialog box that represents a previously hidden null character with a block and highlights (in bold) the non-matching portion of the domain name:

Check with your smartphone carrier to see if they have received the OS update.


0 comments:

Post a Comment