August 8, 2016 By Larry Loeb 2 min read

Suphannee Sivakorn, a Ph.D. student at Columbia University, and Jason Polakis, an assistant professor at the University of Illinois, discussed the state of cookies and cookie encryption during a Black Hat briefing.

They looked at 25 popular websites, including the major search engines and news sites such as The Huffington Post and The New York Times. They found that 15 of these sites supported HTTPS, but not universally.

Many sites offer personalization over HTTP. The researchers felt this could lead to issues such as poor interoperability and flawed access control, Threatpost reported.

It Starts With One Connection

For an HTTP cookie hijacking attack to work, the attacker needs to observe an unencrypted connection to the server. Even HTTPS may have a part at the beginning of the session that is unencrypted.

“This process seems to be very secure to users as the server and browser cooperatively redirect the user to a secure connection,” the authors noted. “However, [the initial step] leaves a window of opportunity for attackers to steal the cookies. This also means that even when users see HTTPS in the address bar and the other visual clues of a trusted connection, they might still have been exposed to a cookie hijacking attack during the initial request.”

Default actions seem to be a problem in certain services. For example, the researchers found that Bing serves all connections over HTTPS by default, and all searches on the site are in cleartext. In fact, users must type HTTPS in the address bar to protect themselves.

Cookie Encryption Is Not Enough

Efforts such as HTTPS Everywhere have tried to increase adoption of more secure browsing. The presenters found that the main limitation of HTTPS Everywhere is the rule sets. These are created and maintained by the community, which requires a lot of manual effort.

It can also result in incomplete rules. HTTPS Everywhere cannot protect the user in a situation where websites contain pages or subdomains whose functionality breaks over HTTPS; the unavoidable result is an unencrypted connection. User cookies can then be exposed since a single HTTP request is enough to cause a cookie reveal.

Extensions may reduce the attack surface of a browser, but really don’t help if the website doesn’t use encryption for all data transmissions.

It’s Not Just Websites

In general, the problem is not just limited to websites. Researchers found that cookies are also exposed by “official browser extensions, search bars and mobile apps.” Additionally, they looked at Wi-Fi connections and detected that a large portion of the outgoing traffic in public wireless networks remains unencrypted, which exposes numerous users to cookie hijacking attacks.

The security versus usability conundrum has been around for a while. The price paid for easily usable websites may lie in how they enable exposure of user information.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today