<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns:idx="urn:atom-extension:indexing" xmlns="http://www.w3.org/2005/Atom" xmlns:dw="https://www.dreamwidth.org" idx:index="no">
  <id>tag:dreamwidth.org,2009-04-14:58489</id>
  <title>Monica</title>
  <subtitle>Monica</subtitle>
  <author>
    <name>Monica</name>
  </author>
  <link rel="alternate" type="text/html" href="https://cellio.dreamwidth.org/"/>
  <link rel="self" type="text/xml" href="https://cellio.dreamwidth.org/data/atom"/>
  <updated>2023-05-24T13:32:33Z</updated>
  <dw:journal username="cellio" type="personal"/>
  <entry>
    <id>tag:dreamwidth.org,2009-04-14:58489:2124275</id>
    <link rel="alternate" type="text/html" href="https://cellio.dreamwidth.org/2124275.html"/>
    <link rel="self" type="text/xml" href="https://cellio.dreamwidth.org/data/atom/?itemid=2124275"/>
    <title>sneaky malware vector</title>
    <published>2023-05-24T02:32:53Z</published>
    <updated>2023-05-24T13:32:33Z</updated>
    <category term="tech"/>
    <category term="internet"/>
    <dw:security>public</dw:security>
    <dw:reply-count>4</dw:reply-count>
    <content type="html">&lt;p&gt;Huh, this is interesting.  There are many top-level domains these days; we're way past the days when the world consisted of &lt;code&gt;.com&lt;/code&gt;, &lt;code&gt;.edu&lt;/code&gt;, &lt;code&gt;.org&lt;/code&gt;, and &lt;code&gt;.gov&lt;/code&gt;.  I hadn't realized that one of those TLDs is &lt;code&gt;.zip&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Yeah, really.  That seems like asking for trouble.  People sometimes do legitimately download ZIP &lt;em&gt;files&lt;/em&gt; from sites they trust, like GitHub.  But maybe you're not really talking to GitHub...&lt;/p&gt;

&lt;p&gt;&lt;a href="https://medium.com/@bobbyrsec/the-dangers-of-googles-zip-tld-5e1e675e59a5"&gt;This post&lt;/a&gt; does a good job of explaining how a stray &lt;code&gt;@&lt;/code&gt; in a URL might ruin your whole day:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Can you quickly tell which of the URLs below is legitimate and which one is a malicious phish that drops evil.exe?&lt;/p&gt;
  
  &lt;p&gt;&lt;code&gt;https://github.com∕kubernetes∕kubernetes∕archive∕refs∕tags∕@v1271.zip&lt;/code&gt;&lt;/p&gt;
  
  &lt;p&gt;&lt;code&gt;https://github.com/kubernetes/kubernetes/archive/refs/tags/v1.27.1.zip&lt;/code&gt;&lt;/p&gt;
  
  &lt;p&gt;[...] As you can see in the breakdown of a URL below, everything between the scheme &lt;code&gt;https://&lt;/code&gt; and the &lt;code&gt;@&lt;/code&gt; operator is treated as user info, and everything after the &lt;code&gt;@&lt;/code&gt; operator is immediately treated as a hostname. However modern browsers such as Chrome, Safari, and Edge don’t want users authenticating to websites accidentally with a single click, so they will ignore all the data in the user info section, and simply direct the user to the hostname portion of the URL.&lt;/p&gt;
  
  &lt;p&gt;For example, the URL &lt;code&gt;https://google.com@bing.com&lt;/code&gt;, will actually take the user to &lt;code&gt;bing.com&lt;/code&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;I didn't know that part about user info.  Combined with Unicode fakes of characters you expect in URLs, this can send you somewhere very different from where you thought you were going.&lt;/p&gt;

&lt;p&gt;We all know not to trust links or attachments from unverified sources (right?).  But stealth URLs add extra risk; you might eyeball the URL in that email and decide "yeah, I trust GitHub/Dreamwidth/Google/whatever".  Be careful out there.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Edit:&lt;/strong&gt; also &lt;code&gt;.mov&lt;/code&gt;.  &lt;a href="https://samjohnssonvt.tumblr.com/post/717574024015839232"&gt;This post&lt;/a&gt; does a good job of demonstrating how this can be exploited and catch even people who are careful (thanks &lt;span style='white-space: nowrap;'&gt;&lt;a href='https://gingicat.dreamwidth.org/profile'&gt;&lt;img src='https://www.dreamwidth.org/img/silk/identity/user.png' alt='[personal profile] ' width='17' height='17' style='vertical-align: text-bottom; border: 0; padding-right: 1px;' /&gt;&lt;/a&gt;&lt;a href='https://gingicat.dreamwidth.org/'&gt;&lt;b&gt;gingicat&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;).&lt;/p&gt;

&lt;p&gt;I might just edit my hosts file to wholesale block these domains.&lt;/p&gt;
&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=cellio&amp;ditemid=2124275" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
</feed>
