Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Fraudsters Using HTTP Injectors to Steal Internet Access: Flashpoint

    Written by

    Sean Michael Kerner
    Published April 9, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Security firm Flashpoint is warning of an emerging attack pattern where fraudsters are using a technique known as HTTP injectors to steal internet access.

      Analysts at Flashpoint reported on April 9 that they have noticed an increase in fraudster conversations about HTTP injectors, which can be used to modify the HTTP headers sent on network requests to enable unauthorized internet access.

      “Cyber-criminals use HTTP injectors to obtain free access to mobile internet,” Flashpoint analyst Olivia Rowley told eWEEK. “They may also be used to circumvent regional blocks.”

      Flashpoint has found that the HTTP injector files are being shared in a variety of ways, with many using the Telegram messaging service. The activity to date has been concentrated in South America, including Brazil and Colombia.

      “Fraudsters typically download HTTP injector files—such as those shared openly on Telegram—then use a special HTTP injectors app to deploy the file,” Rowley said. “The scheme defrauds telecommunications companies and is not, as far as Flashpoint analysts are aware, a threat to or an attack on individuals or consumers.”

      The HTTP injector method detected by Flashpoint is not a man-in-the middle (MiTM) attack, Rowley said. In an MiTM attack, a hacker is able to get in between an individual and the intended recipient of data to intercept, manipulate and potentially redirect traffic. She added that while HTTP injector fraud is a form of redirection, Flashpoint hesitates to classify it as an “attack,” as it is not exploiting a vulnerability but it is rather misusing the protocol as designed. 

      Impact

      While the HTTP injector traffic monitored by Flashpoint does represent a form of fraud, the total financial impact is not known at this point. Rowley said that for the attack that Flashpoint is tracking, most of the individuals appear to be low-level cyber-criminals or individuals hoping to get free internet in a fraudulent manner. 

      “While we cannot estimate the losses involved with this form of fraud, 1G of data typically costs between $10-$20 USD in Latin American countries, according to a blog post published by the World Bank,” Rowley said. “These Telegram groups that we’ve observed can have upwards of tens of thousands of followers, meaning there is potential for significant losses.”

      SSL/TLS

      There are several methods that internet operators can use to mitigate HTTP injection attacks, but using Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption is not one of them, according to Flashpoint.

      “If an ISP implements SSL/TLS on the available websites, it has no effect on the actor, as the initial website is merely to obtain a session, which can be done via HTTP or HTTPS,” David Shear, intelligence analyst at Flashpoint, told eWEEK.

      In addition, Shear noted that the HTTP injection fraudsters themselves can and do make use of SSL/TLS when they use the session with SSH (Secure SHell) proxies for internet access. 

      “Effectively, the best prevention of this technique would require network-level protections, as opposed to protections only on the application level,” Shear said.

      Rowley suggested that organizations impacted by HTTP injection look to understand how the cyber-criminals are abusing their services and then respond according to trends observed in their data. 

      “Monitoring of conversation and exchanges in the cyber-criminal underground can provide impacted businesses with insights into how to mitigate this issue as well as how effective mitigation measures are,” she said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.