Attacks On Ebay: By: Jaspuneet Sidhu, Rohit Sakhuja & David Zhou
Attacks On Ebay: By: Jaspuneet Sidhu, Rohit Sakhuja & David Zhou
Ebay History and Statistics
The cause of the compromised eBay server was attributed to the theft of three
corporate employee log-in credentials.
eBay itself did not disclose exactly how these credentials were compromised
With the gathered information, even if the attackers never cracked the decryption,
the plaintext information taken from the database could lead to increased pharming
and phishing on eBay customers (possible final section material)
the eBay encryption dealt with hashing the plaintext password and then salting this
hashed text by adding a randomized digit or two
The Attack (cont.)
With the lack of detail provided by eBay of the incident, speculation lead to
suggestions that the credentials were taken via phishing methods
This resulted in eBay telling its customers that they needed to change
their passwords.
The first noted vulnerability found was the website’s weakness to cross
site scripting (also known as XSS).
XSS is a code injection attack where the attacker can use malicious
scripts in a user’s browser to inject a pay load into a web page that the
victim visits
Shows attacker using a link that on first glance has the ebay.com tag at
the start to trick the more careless individual
As you look further to the right of this link, there is a clear portion of
javascript highlighted by an ip address of 45.55.162.179.
JSF*** essentially a way to write java script using only six different
characters:
( ) + [ ] and !
For the best possible chance at preventing the type of data breach
that struck eBay, a proper defense strategy must be implemented.
This involves the use of a variety of different layers that can help
identify and prevent breaches at various points during an intrusion
attempt.
The server or platform layer will have its own centralized log management
solution, password rotation on a regular basis and anti-virus protection for
all servers.
The most important lessons to take from this data incident are :
https://netshield.wordpress.com/2014/06/11/ebay-cyber-
attack-aftermath/
http://www.forbes.com/sites/greatspeculations/2014/10/16/eba
ys-earnings-continue-to-be-impacted-by-cyber-
attack/#583ef1cb723b
http://blog.thinknettech.com/is-your-security-layered-like-your-
bean-dip/
http://www.scmagazine.com/the-ebay-breach-
explained/article/360998/2/
References
S. Khandelwal, "Hacking any eBay Account in Just 1 Minute", The Hacker News, 2014. [Online].
Available: http://thehackernews.com/2014/09/hacking-ebay-accounts.html. [Accessed: 28- Feb- 2016].
J. Leyden, “Theregister.co.uk, "EBAY... You keep using that word 'ENCRYPTION' – it does not mean what
you think it means", 2014. [Online]. Available:
http://www.theregister.co.uk/2014/05/22/ebay_password_encryption/. [Accessed: 28- Feb- 2016].
P. Paganini, "A new series of critical eBay vulnerabilities still menaces 145M users", Security Affairs, 2014.
[Online]. Available: http://securityaffairs.co/wordpress/25177/hacking/critical-ebay-
vulnerabilities.htmlve.html. [Accessed: 29- Feb- 2016].
J. Pagliery, "EBay customers must reset passwords after major hack", CNNMoney, 2014. [Online].
Available: http://money.cnn.com/2014/05/21/technology/security/ebay-passwords/. [Accessed: 29- Feb-
2016].
T. Ring, "eBay e-commerce platform under attack", SC Magazine UK, 2015. [Online]. Available:
http://www.scmagazineuk.com/ebay-e-commerce-platform-under-attack/article/423576/. [Accessed:
02- Mar- 2016].
P. Gramantik, "Magento Platform Targeted by Credit Card Scrapers", Sucuri Blog, 2015. [Online].
Available: https://blog.sucuri.net/2015/06/magento-platform-targeted-by-credit-card-scrapers.html.
[Accessed: 02- Mar- 2016].
C. Brook, "A Year Later, XSS Vulnerability Still Exists in eBay", Threatpost | The first stop for security
news, 2015. [Online]. Available: https://threatpost.com/a-year-later-xss-vulnerability-still-exists-in-
ebay/112493/. [Accessed: 02- Mar- 2016].
L. Vaas, "eBay XSS bug left users vulnerable to (almost) undetectable phishing attacks", Naked
Security, 2016. [Online]. Available: https://nakedsecurity.sophos.com/2016/01/13/ebay-xss-bug-left-
users-vulnerable-to-almost-undetectable-phishing-attacks/. [Accessed: 02- Mar- 2016].
D. Goodin, "eBay has no plans to fix “severe” bug that allows malware distribution [Updated]", Ars
Technica, 2016. [Online]. Available: http://arstechnica.com/security/2016/02/ebay-has-no-plans-to-fix-
severe-bug-that-allows-malware-distribution/. [Accessed: 02- Mar- 2016].
Questions?
Ans: A very well-trained and educated staff who can implement new and current IT
Security standards.
How would a hacker intercept a “New Password Request” that is being sent to the
user’s email?
Ans: Normally the new password request would go to the user’s email, but the attacker
could intercept this request using the “reqinput” value that could be found using a Browser’s
inspect element option
Ans: An attacker would encrypt the stolen data using a public key they define in their script