Hi all,
Yesterday I found my internet connection got session hijacked (MITM), it keeps injecting the spam script into my browser webpage. Here's the screenshot
Well... it's a bit hard to determine, from this screen shot, exactly what did happen -- and if your computer actually had anything to do with it. It could be that the nefarious content is simply being served by whatever host is running that site.
Firefox does have some very good spam-killing plugins which will help you to shut-down requests like these.
This particular article is one that has been circulating in various forms for quite some time now, and I'm not sure it is really "aging" very well at all. The bottom line for you, as a web "endpoint," is to simply make sure that you have done all of the things that you can do from your position -- as an endpoint; as a would-be requester and consumer of whatever web content you seek.
First question: does the unwanted content appear now, while you are reading this? Since I most-assuredly have not slipped a "mickey" into this post, if you don't see the garbage while you are looking at this posting right now (assuming that you have no other Firefox windows or tabs open), then the garbage that you are seeing is simply clever spam. And you react to it by filtering it out as aforementioned.
Hi sundialsvc4, i can ensure that the nefarious content isnt served by that host, as many other sites are also get contaminated, sometimes even my google reader (not https secured).
The spam isnt around the whole web all the time, sometimes it appears, sometimes it doesnt. When i was reading this post, it didnt. Then i opened a new tab, switched to another legal site, it appeared again.
What i'm doing now is to reject both of the incoming and outgoing requests by iptables. But i'm wondering is there any effective way to prevent the data packet being observed by the man in the middle?
After contacted the ISP service, i was told that they were never gonna do these. But when i was trying to ask 'em to have a check on this issue, they kept asking me those stupid questions like 'Does your system get contaminated by viruses' or 'Have you updated your antivirus software to the latest version', it was ignorant that they said they didnt have any obligation if there was a session hijack b/w the connections and nothing they could help by far.
if you swap out your router, does it still happen? if so, then it is indeed your isp, or a peering along the way... or perhaps the great chinese firewall.
Neddyseagoon wrote:The problem with leaving is that you can only do it once and it reduces your influence.
I'm using ADSL connection, which doesnt require a router.
Lets go back to the point, if it is a peering along the way which intercepts the data packets from the client side, and replies with fake packets. Is there any way to secure my data packets that guarantees the packets wont be intercepted by the third one?
Hmm... the noscript or adblock doesnt help as the injection is directly from the data packets. If i block the script, it also prevents the sites from loading, since the site pages are <iframe>d to be load by the script.
There's no way that i can secure the data packets so that the attackers cannot intercept 'em and reply with fake ones? I think that's the best way to prevent the injection so far from my side as an endpoint
punkid wrote:Hmm... the noscript or adblock doesnt help as the injection is directly from the data packets. If i block the script, it also prevents the sites from loading, since the site pages are <iframe>d to be load by the script.
There's no way that i can secure the data packets so that the attackers cannot intercept 'em and reply with fake ones? I think that's the best way to prevent the injection so far from my side as an endpoint
Of course the simplest solution would be to use an external secured proxy server for all of your web traffic.
I would recommend a service like anonymizer.
There is no way that ads could be injected into that.