The Times Australia
Google AI
The Times World News

.

We analysed the entire web and found a cybersecurity threat lurking in plain sight

  • Written by Kevin Saric, Computer Scientist & Mechatronic Engineer, CSIRO
We analysed the entire web and found a cybersecurity threat lurking in plain sight

Our latest research has found that clickable links on websites can often be redirected to malicious destinations. We call these “hijackable hyperlinks” and have found them by the millions across the whole of the web, including on trusted websites.

Our paper[1], published at the 2024 Web Conference, shows that cybersecurity threats on the web can be exploited at a drastically greater scale than previously thought.

Concerningly, we found these hijackable hyperlinks on the websites of large companies, religious organisations, financial firms and even governments. The hyperlinks on these websites can be hijacked without triggering any alarms. Only vigilant – some might say paranoid – users would avoid falling into these traps.

If we were able to find these vulnerabilities across the web, so can others. Here’s what you need to know.

What are hijackable hyperlinks?

If you make a typo when entering your bank’s web address, you might accidentally end up on a phishing site – one that impersonates, or “spoofs”, your bank’s website to steal your personal info.

If you’re in a rush and don’t inspect the website closely, you may enter sensitive personal details and pay a steep price for your mistake. This could include identity theft, account compromise or financial loss[2].

Something even more dangerous happens when programmers mistype web addresses in their code. There’s a chance their typo will direct users to an internet domain that has never been purchased. We call these phantom domains.

For example, a programmer making a link to theconversation.com might accidentally link to tehconversation.com – note the misspelling. If the mistyped domain has never been purchased, someone could come along and buy that phantom domain for around A$10, hijacking the inbound traffic. In these cases, the price of programmers’ mistakes is paid by the users.

These programmer linking errors don’t just risk directing users to phishing or spoofing sites. Hijacked traffic can be directed towards a range of traps, including malicious scripts[3], misinformation, offensive content, viruses and any other hacks the future will bring.

Over half a million phantom domains

Using high-performance computing clusters, we processed the whole browsable web for these vulnerabilities. At a scale never seen in research, in total we analysed over 10,000 hard drives’ worth of data.

Doing so, we found over 572,000 phantom domains. The hijackable hyperlinks directing users to them were found on many trusted websites. In a twist of irony, this even included web-based software designed to enforce privacy legislation on websites.

We investigated what errors caused these vulnerabilities and categorised them. Most were caused by typos in hyperlinks, but we also found another type of programmer-generated vulnerability: placeholder domains.

When programmers develop a website that does not yet have a specific domain, they often enter links to a phantom domain with the expectation the links will be fixed later.

We found this to be common with website design templates, where the aesthetic components of a website are purchased from another programmer rather than developed in-house. When the design template is later installed on a website, the phantom domains are often not updated, making links to them hijackable.

To determine if hijackable hyperlinks could be exploited in practice, we purchased 51 of the phantom domains they point to and passively observed the inbound traffic. From this, we detected substantial traffic coming from the hijacked links. Compared to similar new domains that lacked hijacked links, 88% of our phantom domains got more traffic, with up to ten times more visitors.

A man with a black beard and glasses looks at his smartphone while frowning, sitting at a cafe with his laptop.
Staying vigilant on the web is your best protection against falling for hijacked links. GaduLab/Shutterstock[4]

What can be done?

For average web users, awareness is key. Links cannot be trusted. Be vigilant.

For those in charge of companies and their websites, we suggest several technical countermeasures[5]. The simplest solution is for website operators to “crawl” their websites for broken links. Countless free tools are available for doing so. If any broken links are found, fix them before they are hijacked.

We, the Web

British scientist Sir Tim Berners-Lee first proposed the web at CERN[6] in 1989. In his earliest description of it – still widely available on the web as a testament to itself – there is a section titled “non requirements”, where security is addressed. This section includes the fateful phrase:

[Data security is] of secondary importance at CERN, where information exchange is still more important.

While this was true of CERN in 1989, the web is now the primary information exchange medium of the modern age.

We have come to treat the web as an external component of our own brains. This is evidenced by the popularity of large language models like ChatGPT, which themselves are trained on data from the web.

As our dependence deepens, it might be time to mentally re-categorise web data security from “non requirements” to “important requirements”.

References

  1. ^ Our paper (dl.acm.org)
  2. ^ or financial loss (theconversation.com)
  3. ^ malicious scripts (theconversation.com)
  4. ^ GaduLab/Shutterstock (www.shutterstock.com)
  5. ^ we suggest several technical countermeasures (dl.acm.org)
  6. ^ first proposed the web at CERN (www.home.cern)

Read more https://theconversation.com/we-analysed-the-entire-web-and-found-a-cybersecurity-threat-lurking-in-plain-sight-233240

Times Magazine

AI is failing ‘Humanity’s Last Exam’. So what does that mean for machine intelligence?

How do you translate ancient Palmyrene script from a Roman tombstone? How many paired tendons ...

Does Cloud Accounting Provide Adequate Security for Australian Businesses?

Today, many Australian businesses rely on cloud accounting platforms to manage their finances. Bec...

Freak Weather Spikes ‘Allergic Disease’ and Eczema As Temperatures Dip

“Allergic disease” and eczema cases are spiking due to the current freak weather as the Bureau o...

IPECS Phone System in 2026: The Future of Smart Business Communication

By 2026, business communication is no longer just about making and receiving calls. It’s about speed...

With Nvidia’s second-best AI chips headed for China, the US shifts priorities from security to trade

This week, US President Donald Trump approved previously banned exports[1] of Nvidia’s powerful ...

Navman MiVue™ True 4K PRO Surround honest review

If you drive a car, you should have a dashcam. Need convincing? All I ask that you do is search fo...

The Times Features

The past year saw three quarters of struggling households in NSW & ACT experience food insecurity for the first time – yet the wealth of…

Everyday Australians are struggling to make ends meet, with the cost-of-living crisis the major ca...

The Week That Was in Federal Parliament Politics: Will We Have an Effective Opposition Soon?

Federal Parliament returned this week to a familiar rhythm: government ministers defending the p...

Why Pictures Help To Add Colour & Life To The Inside Of Your Australian Property

Many Australian homeowners complain that their home is still missing something, even though they hav...

What the RBA wants Australians to do next to fight inflation – or risk more rate hikes

When the Reserve Bank of Australia (RBA) board voted unanimously[1] to lift the cash rate to 3.8...

Do You Need a Building & Pest Inspection for New Homes in Melbourne?

Many buyers assume that a brand-new home does not need an inspection. After all, everything is new...

A Step-by-Step Guide to Planning Your Office Move in Perth

Planning an office relocation can be a complex task, especially when business operations need to con...

What’s behind the surge in the price of gold and silver?

Gold and silver don’t usually move like meme stocks. They grind. They trend. They react to inflati...

State of Play: Nationals vs Liberals

The State of Play with the National Party and How Things Stand with the Liberal Party Australia’s...

SMEs face growing payroll challenges one year in on wage theft reforms

A year after wage theft reforms came into effect, Australian SMEs are confronting a new reality. P...