Originally posted by: Zugzwang152
Originally posted by: RedSquirrel
Hmm since I recall another article saying the guy testing the program got people's paypal passwords and everything, this was just random people online, not people on his network. This is the part that scared me, as I just don't understand how that's possible without planting a trojan or something and having previous access to part of the network the victim is on.
You probably read this one:
http://forums.anandtech.com/me...id=76&threadid=2280161
If you read the article, you will see he used a Tor server he was hosting. He took advantage of the fact that Internet users trusted him by redirecting all their traffic through the anonymizing proxy server and sotle their stuff. So the hard part, which is intercepting the encrypted traffic, was actually very easy.
Just like any other man in the middle attack, he inserted himself between the web server and the user, and had his way with the data. This attack type is not new, and in fact there are many other man in the middle tools out there.
And here's the key quote in the whole article:
Despite the fact that the sites in Marlinspike's tests displayed themselves as "HTTP" instead of "HTTPS," not a single user navigated away from a look-alike site without entering a password.
People need to pay attention if they care about their information. Period.