A new pixel-stealing exploit can read usernames and passwords across websites

Daniel Sims

Posts: 1,375   +43
Staff
What just happened? Website developers have a new reason to build defenses against cross-origin embedding, as a recently published GPU compression exploit can potentially utilize cross-site iframes to steal sensitive information. Users should carefully consider what sites they visit while logged into essential services.

Researchers recently discovered that graphics chips from all major vendors share a vulnerability that could let attackers steal usernames or passwords displayed on websites. Graphics card manufacturers and software companies have been aware of the issue for months but haven't decided whether to respond.

The exploit affects Chrome and Edge web browsers but not Firefox or Safari. Integrated and dedicated graphics hardware from AMD, Intel, Nvidia, Apple, Arm, and Qualcomm are susceptible.

Researchers devised a proof-of-concept attack, dubbed GPU.zip, whereby a malicious website contains embedded iframes linking to other sites a user may have logged into. If the latter page allows loading cross-origin iframes with cookies and renders SVG filters on iframes using the GPU, the malicious site can steal and decode the pixels it displays. If a user is logged into an insecure page displaying their username, password, or other critical information, it becomes visible to attackers.

Fortunately, most websites that handle sensitive data forbid cross-origin embedding and are thus unaffected. Wikipedia is a significant exception, so editors should take extra precautions when browsing other sites while logged in. To check a webpage's cross-origin security, open the developer console, reload the page, read the main document request under the network tab, and check for terms such as "X-Frame-Options" or "Content-Security-Policy."

The problem originates from GPU compression, which improves performance but can leak data. Security developers usually have little trouble with the issue because compression is traditionally visible to software and uses publicly available algorithms.

However, the new research demonstrates the existence of software-invisible compression schemes that are proprietary to each vendor. Since graphics chip companies withhold information on this compression, security groups have more difficulty working around it.

Google believes existing precautions from web developers are sufficient to combat the issue and hasn't indicated plans to address it system-wide. Intel and Qualcomm confirmed that they won't take action, saying third-party software is the problem. Nvidia, AMD, Apple, and Arm haven't publicly reacted to the news. No one has confirmed active exploitation in the wild, so the vulnerability is a low priority for now.

Permalink to story.

 
Interesting. Using Firefox, so I guess I don't have to worry ATM.

My one question would be about this secret/hidden compression. Is it lossless or lossy?
 
If you access the type of site that could theoretically host this type of scam, you are naive enough to lose the data through countless other, simpler means.
 
If you access the type of site that could theoretically host this type of scam, you are naive enough to lose the data through countless other, simpler means.
Care to explain? That's a lot of hyperbole with very little actual substance.
Not harping on ya. I just would like a better explanation of what you mean? Why couldn't "normal" websites use these pixels?
 
Care to explain? That's a lot of hyperbole with very little actual substance.
Not harping on ya. I just would like a better explanation of what you mean? Why couldn't "normal" websites use these pixels?
"Researchers devised a proof-of-concept attack, dubbed GPU.zip, whereby a malicious website contains embedded iframes linking to other sites a user may have logged into. If the latter page allows loading cross-origin iframes with cookies and renders SVG filters on iframes using the GPU, the malicious site can steal and decode the pixels it displays"

A real website would not host malicious code in order to commit a crime. The long and short of the story is that if you browse shady websites you certainly don't rely on security flaws to fall for scams.
 
"Researchers devised a proof-of-concept attack, dubbed GPU.zip, whereby a malicious website contains embedded iframes linking to other sites a user may have logged into. If the latter page allows loading cross-origin iframes with cookies and renders SVG filters on iframes using the GPU, the malicious site can steal and decode the pixels it displays"

A real website would not host malicious code in order to commit a crime. The long and short of the story is that if you browse shady websites you certainly don't rely on security flaws to fall for scams.

Ah OK thanks.

I was more thinking of this possibly being embedded in an advertisement, which websites often don't have as much control over. I've found that they often don't even know that there's something embedded in some of the random ads until someone informs them.
I was also thinking that another site could use a "legit" tracking pixel to possibly do this.

Thanks for the clarification.

That said, I wouldn't say that you're safe if you stay away from shady sites since websites can be hacked without the owner knowing right away. If the hacker does something sneaky like this, instead of just defacing the front page for "kicks," it might go unnoticed until someone finds it. sadge :(

Oh, also, is there an extension for Firefox that would shut this down from the start? I might already have it installed, but I thought I'd ask.
 
Ah OK thanks.

I was more thinking of this possibly being embedded in an advertisement, which websites often don't have as much control over. I've found that they often don't even know that there's something embedded in some of the random ads until someone informs them.
I was also thinking that another site could use a "legit" tracking pixel to possibly do this.

Thanks for the clarification.

That said, I wouldn't say that you're safe if you stay away from shady sites since websites can be hacked without the owner knowing right away. If the hacker does something sneaky like this, instead of just defacing the front page for "kicks," it might go unnoticed until someone finds it. sadge :(

Oh, also, is there an extension for Firefox that would shut this down from the start? I might already have it installed, but I thought I'd ask.


Firefox blocks tracking bugs, read this, its kind of long. Strict setting should be recommended.

 
Back