Researchers outline a threat posed by Google Gadgets that can compromise user privacy and other risks, say experts at Black Hat conference. Google Gadget lovers were dealt a blow on Wednesday when two researchers outlined what they called a “hole” during a Black Hat presentation. “The attacker can forcibly install Google Gadgets; they can read the victim’s search history once a malicious gadget has been installed in some specific circumstances; they can attack other Google Gadgets; they can phish usernames and passwords from victims, and so on,” said Robert Hansen, also known as RSnake, a founder of security consultancy SecTheory. “Really, the sky is the limit, once the browser is under the control of an attacker. And that point is exacerbated by the fact that people trust Google be a trustworthy domain, making the attacks even easier.” Hansen said that users who are most vulnerable to attack are those who use Google and specifically Gmail since the Web-based e-mail service requires them to be logged in. The attack relies on users intentionally adding modules themselves; a user may be tricked into adding malicious Google modules to his iGoogle homepages. “These users are almost all using JavaScript and normal Web browsers, making them easing pickings for many different classes of attack, he added. Tom Stracener, a senior security analyst at Cenzic and co-presenter of the talk, outlined the threat: Gadgets can attack other Gadgets: The potential impact of these attacks is through cookie theft, or theft of confidential and sensitive information from the Gadget or user. Gadgets can attack the user: The type of attacks range from phishing to cross-site request forgery (when a user follows a link or clicks a form and unwittingly takes an action on a third party website that they did not intend to take). Auto-adding a Gadget: A malicious webpage can add a Gadget to a user’s iGoogle homepage without his knowledge and assist in the spread of gadget-based malware. Logging into an alternate Google account: A Gadget can log a user into a different Google account and monitor search queries. “While the business impact from Google Gadget malware is minimal at this time,” Stracener says, “As the use of Google Gadgets moves from consumer to business use, the risks for business users will grow.” Related content brandpost Sponsored by FPT Software Time for New Partnership Paradigms to Be Future-fit By Veronica Lew Dec 06, 2023 5 mins Vendors and Providers brandpost Sponsored by BMC Why CIOs should prioritize AIOps in 2024 AIOps empowers IT to manage services by incorporating AI/ML into operations. By Jeff Miller Dec 06, 2023 3 mins IT Leadership opinion Generative AI in enterprises: LLM orchestration holds the key to success In the dynamic landscape of AI, LLMs represent a pivotal breakthrough. Unlike traditional AI, which demands frequent data updates, LLMs possess the ability to learn and adapt in real-time. This mirrors human learning and positions LLMs as essential f By Shail Khiyara Dec 06, 2023 10 mins Generative AI Artificial Intelligence brandpost Sponsored by Freshworks How gen AI is joining the holiday shopping season One year after the launch of ChatGPT, the retail industry is embracing generative AI to deliver a variety of benefits By Elliot Markowitz Dec 06, 2023 4 mins Generative AI Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe