Facebook experiment helps battle man-in-the-middle attacks

Researchers at Facebook and Carnegie Mellon University have developed a detection tool for man-in-the middle attacks that security pros might find helpful in protecting corporate data.

While the technique has been around for years, the researchers were able to adapt it for use on Facebook, proving that the method would work on a large-scale network.

[DDoS attack from Facebook possible, but unlikely]

The researchers analyzed more than 3 million SSL connections to the website and found 0.2 percent, or 6,845, contained tampered or forged certificates.

Most of the changes were related to anti-virus software and corporate content filters, with only 121 forged by malware and 330 by adware, the researchers said Tuesday.

"The takeaway for IT professionals is that SSL man-in-the-middle is at the same time more common than expected, but also mostly perpetrated by the good guys," Wolfgang Kandek, chief technology officer for risk management company Qualys, said.

A man-in-the-middle attack is a form of eavesdropping on communications between a browser and a web server. If the traffic is encrypted through the widely used SSL protocol, then the attackers will somehow tinker with the certificates to decrypt the communications.

To detect certificate shenanigans, the researchers embedded a Flash applet in web pages served to Facebook users chosen at random. The code bypassed the network protocol stack of the browser and sent information on the certificates to a server run by the researchers.

In proving the technique works on a large scale, the experiment, conducted under Facebook's data use policy, showed that the method would be useful to corporate security pros who wanted to watch for man-in-the-middle attacks on users of company websites, Collin Jackson, co-author of the study and an assistant research professor at Carnegie Mellon, said.

"We were looking at Internet users as a whole, but CSOs are probably a lot more interested in protecting the people inside their organization," Jackson said. "This would be one way to identify if any employee's traffic is being tampered with, at least when they're communicating internally,"

The research also highlighted the potential security risks introduced by anti-virus products and content filtering technology that act as proxies through which all Internet traffic flows. These products can be on a person's computer or in the cloud.

Either way, the software uses its certificates in place of the browser's, which could weaken the latter's ability to validate certificates, making communications with web servers less secure, Jackson said.

[FTC warning unlikely to stop Facebook from changing WhatsApp privacy policies]

Bottom line, companies using such proxies have to trust their ability to manage certificates in an environment that's more complex than if the vendors somehow leveraged the browsers' certificates, Jackson said.

"It's really better for privacy and security to let the browser take care of that," he said.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationsdata loss preventionsoftwaresocial networking securitydata protectionsecurity researchqualysFacebookCarnegie Mellon UniversityFacebook securityman-in-the-middle attacks

More about Carnegie Mellon University AustraliaFacebookFTCMellonQualys

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts