August 3, 2016 By Douglas Bonderud 2 min read

Another day, another way for cybercriminals to snoop out URL data — and even compromise HTTPS protections. The culprit this time: WPAD, or the Web Proxy AutoDiscovery protocol.

While this isn’t the protocol’s first problem, many companies still use it to easily broadcast proxy information across a network. If compromised, businesses may inadvertently leak entire URL paths, even for HTTPS websites. How do organizations avoid a URL flood?

PACs of Problems

As noted by Softpedia, the current problem with WPAD stems from proxy configurations called PAC files, or proxy auto-configs, which are used to automatically set up browser access to the web while still allowing companies to monitor and manage internet access. But if WPAD servers use HTTP rather than HTTPS servers to transmit these PAC files, it’s possible for malicious actors to snoop on configuration details or inject their own malicious version of PACs onto corporate networks.

Then, these bad PACs direct browsers to a compromised proxy that lets cybercriminals follow the entire URL path taken. Instead of simply grabbing the domain name portion of URLs, this PAC attack lets actors see the complete URL, which could include anything from innocuous web content to password reset pages.

That’s not all: According to Threatpost, there’s no visual indication that users have been compromised. URL bars still show they’re protected by HTTPS.

Protocol Redesign

The most likely attack vector is across an insecure wireless network using decoy servers to quickly respond when browsers request a PAC file via WPAD. Because of the conflict inherent that occurs when low-trust JavaScript can be easily executed in high-trust HTTPS environments, researchers are calling for a protocol redesign to limit the attack surface and expose less information.

So far, Apple and Google have responded to the request for improved protocols and PACs, but Microsoft has not. To stay safe, users are advised to disable the automatically detect settings option under LAN settings.

More WPAD Worries

As noted by Naked Security, fake PACs aren’t the only problems plaguing this web proxy protocol. Researchers at the University of Michigan recently discovered a vulnerability that manifests when browsers using the protocol can’t find the right PAC file on local networks. If the browser is on an unknown network, for example, it may escalate queries to public DNS servers and give attackers an easy way inside.

Recent changes to the global top-level domain (gTLD) have also impacted WPAD security. Until 2012, companies could use fake domain names for internal purposes — such as .office, .network or .group — and they couldn’t be purchased or used outside local networks. Now, more than 700 new gTLDs have been approved. Not only do they work beyond business borders, but they can be purchased by anyone, making previously safe domains potentially insecure.

WPAD is an easy way to grab proxy information and get browsers online. When it comes to security, however, this protocol doesn’t make the grade. New PAC problems may push a flood of URL issues onto corporate browsers.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today