mailing list archives
Re: New possible scam method : forged websites using XUL (Firefox)
From: Michael Reilly <michaelr () cisco com>
Date: Tue, 03 Aug 2004 12:10:08 -0700
Along the same lines I took a look at the spoof using my customized firefox
and it was an obvious fake -
1. The font is wrong
2. The window size is wrong (it is twice the width of my browser window and
almost 50% longer)
3. The fake toolbar was below my toolbar so both were viable
4. The address bar was also in the wrong place so I had two.
5. I also had two status bars
Isn't a possible solution to disable any overlaying of existing elements
(toolbar, status bar, address bar, etc.) once they are loaded from the
browser's and user's on disk config? Lock them even before opening a socket
to connect to a site.
Of course if there is an exploit to modify the on disk files then this won't
Peter J. Holzer wrote:
On 2004-08-02 11:59:17 +0200, Peter J. Holzer wrote:
(few people know that mozilla can do that, and even for those, editing
user.js is tedious).
More on the lines of "few people know that Mozilla can do that":
Daniel Veditz wrote in
| Or we could just force the location bar to be on using the existing
| pref, but obviously there must be some reluctance to that or it'd be
| done already.
So I started to look for the "existing pref", and sure enough, if you
in your prefs.js, the spoof looks much less convincing.
(You can also set this preference via "about:config".)
---- ---- ----
Michael Reilly michaelr () cisco com
Cisco Systems, California