Paul Hempshall

Website Cyber Security Professional

Dangerous Redirects - Kraken Phishing Analysis

Published: August 19, 2016 2:35 pm

Analysis Application Security

I originally published this in 2016 on a different website under a pseudonym. Apart from some spelling corrections, this has been republished verbatim.

The Bitcoin exchange, Kraken, issued a warning on its blog[1], regarding various phishing attacks that have caused some accounts to lose their Bitcoin.

I decided to do some research into how this could have happened as my previous knowledge of advert networks say that this isn’t possible otherwise it would be much more commonplace.

Display vs Destination URLs

The advert display networks allow you to customize[2] the ‘Display URL’ vs the ‘Destination URL’.

The Display URL is what the user will see and the Destination URL is where the advert will take the user when clicked.

This is allowed because some websites have user-unfriendly URL’s. There are limitations; the Display URL root domain must match the Destination URL root domain. For example:

Approved URL Customisations

Display URL Destination URL
Paulhempshall.com https://www.paulhempshall.com/signup?adref=gadws_campaign1
SignUp.Paulhempshall.com https://www.paulhempshall.com/signup?adref=gadws_campaign2
Paulhempshall.com/Signup https://signup.paulhempshall.com

Unapproved URL Customisations

Display URL Destination URL
Paulhempshall.com https://paulhempshall.uk/join
SignUp.Paulhempshall.com https://paulhempshall.co.uk/signup/
Paulhempshall.com/Signup https://signup.paulhempshall.co.uk

The Attack

This is a very interesting and more sophisticated phishing attack in that the attackers seem to have utilized a possible open redirect flaw[3] in the Kraken website to bypass anti-phishing mechanisms on the Google, Bing and Yahoo advert display network.

Kraken has yet to confirm whether this is the case or how it happened but testing the redirect feature ( https://www.kraken.com/redirect?url=INSERT_URL_HERE) after the event seems to throw a few errors ranging from generic 403 Forbidden messages to generic CloudFlare ‘You have been blocked’ messages. This leads me to believe this is a temporary “duct tape” solution to mitigate the issue.

Why do I believe it is a temporary “duct tape” solution? Because of the generic standard errors that it produces. If the attack vector was considered at the beginning then usually a more user-friendly approach is taken; such as a custom error message with company branding. This is only an assumption on my part but is assumed because of other user-friendly error messages that the site is using.

However, the phishing site has an interesting string in the URL (highlighted in green). This correlates to the same redirect feature on the official website and previous knowledge of other websites that have these vulnerabilities has shown me that the query string or other data from the original tend to be passed to the destination, such as source along with other necessary parameters.

No evidence of Kraken itself being hacked.

Kraken

Unless the attacker found a flaw in Google, Yahoo and Bing then the only thing that would allow Display URL’s with the Kraken domain would be a redirect exploit on one of the kraken.com domain names.

One thing to be aware of now is to not trust advert links, skip the adverts in search engines, and only use known links to websites.

Footnotes

  1. http://blog.kraken.com/post/148976188862/kraken-phishing-warning [archive]
  2. https://adwords.googleblog.com/2006/05/display-vs-destination-urls.html [archive]
  3. https://www.owasp.org/index.php/TestingforClientSideURLRedirect(OTG-CLIENT-004) [archive]