Syrian Government Trying To Swipe Social Networking Passwords?

from the hamfisted dept

You may recall reports a few months ago from Tunisia, that indicated the government there had used a form of a man-in-the-middle attack to get usenames and passwords and access Facebook accounts of certain political opponents. It appears that Syria is trying to do the same thing. Reports have come out that Syria, via the Syrian Telecom Ministry, has kicked off a large man-in-the middle-attack on the HTTPS version of Facebook’s site. While the EFF notes that the attack is amateurish, that doesn’t mean it won’t snare a potentially large number of people:

The attack is not extremely sophisticated: the certificate is invalid in user’s browsers, and raises a security warning. Unfortunately, because users see these warnings for many operational reasons that are not actual man-in-the-middle attacks, they have often learned to click through them reflexively. In this instance, doing so would allow the attackers access to and control of their Facebook account. The security warning is users’ only line of defense.

Either way, I’m a bit surprised that governments are using and promoting such ineffective means of spying on the populace. Of course, hopefully, this helps teach people to not just click through potential warnings, but also to get a better sense of how to keep their own computers secure and how to avoid such attacks.

Filed Under: ,
Companies: facebook

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Syrian Government Trying To Swipe Social Networking Passwords?”

Subscribe: RSS Leave a comment
Miff (profile) says:

“Oh, a SSL certificate should be expensive, that way it would be hard to get a false one. Nobody who couldn’t afford it would even be hosting HTTPS anyways.”

> Unfortunately, because users see these warnings for many operational reasons that are not actual man-in-the-middle attacks, they have often learned to click through them reflexively.


Anonymous Coward says:

This could be a problem if we start having laws that require too many security warnings (as has been discussed here on techdirt in the past). If everything you do requires ten security warnings, before you know it, you start habitually clicking the important ones with the non-important ones without paying much attention to either. Security warnings should appear only where absolutely necessary so that when they do appear, users actually pay attention to them.

another mike (profile) says:

saw this coming

Iran was implicated in spoofing the certificates of sites like Facebook several months ago. You really didn’t think they were going to let it go.
To make this attack work less obviously, they need to spoof not only the certificate but also the certificate authority (CA). Diverting traffic from the legitimate site into their honeypot makes that easier. That sounds like the kind of border router protocol hacking China is implicated in.
The arms race between freedom and censorship on the internet is only just warming up.

Add Your Comment

Your email address will not be published.

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...