While browser fingerprinting has long been a privacy-intrusive technique for users, it can now pose a direct threat to usersâ€™ security. Thatâ€™s because researchers have devised a new attack strategy â€œGummy Browsersâ€ that exploits fingerprinting by spoofing the target usersâ€™ browsers.
Gummy Browsers Attack Trick Browser Fingerprinting
A team of researchers from Texas A&M University and the University of Florida has shared details about how browser fingerprinting can risk usersâ€™ security.
Briefly, browser fingerprinting is a common user tracking approach that different apps and websites use to identify and track visitors. For this, the apps or websites log usersâ€™ device and browser details, IP addresses, system information, and more. They then track the usersâ€™ browsing habits and interests and build a profile by linking all this data.
This profile potentially includes identifiable user information that an adversary can exploit. Thatâ€™s what the researchers have demonstrated in their recent study.
How it all works
As elaborated in a detailed research paper, the team has devised â€œGummy Browsersâ€ â€“ an attack strategy that mimics web browsers. The idea is to bluff sites and apps using browser fingerprinting to get the target userâ€™s data.
The idea is that the attacker ð´ first makes the user ð‘ˆ connect to his website (or to a well-known site the attacker controls) and transparently collects the information from ð‘ˆ that is used for fingerprinting purposes (just like any fingerprinting website ð‘Š collects this information). Then, ð´ orchestrates a browser on his own machine to replicate and transmit the same fingerprinting information when connecting to ð‘Š, fooling ð‘Š to think that ð‘ˆ is the one requesting the service rather than ð´. As a consequence, if ð‘Š populates targeted ads for ð‘ˆ based on only browser fingerprints, ð´ can now start seeing the same or similar ads on his browser as ð‘ˆ would see. This will allow the attacker to profile ð‘ˆ and compromise ð‘ˆâ€™s privacy.
In their study, the researchers successfully implemented the attack using three script injection-based techniques to mimic browsers. These include browser settings, debugging tools, and script modification.
After that, they could easily validate the attack effectiveness by employing two fingerprinting algorithms, Panopticlick and FP-Stalker.
Such an attack can take place remotely without being detected. Also, it employs no cookies and merely relies on browser spoofing.
Once an adversary gets a victimâ€™s browser fingerprints, the adversary can use it maliciously for a long period of time.
Potential Exploitability And Limitations
Given the accuracy of profiling and browser fingerprinting obtained, Gummy Browsers attack poses a serious real-world threat.
According to the researchers, the huge adaptation of browser fingerprinting globally now raises concerns about usersâ€™ online security.
The impact of Gummy Browsers can be devastating and lasting on the online security and privacy of the users, especially given that browser-fingerprinting is starting to get widely adopted in the real world. In light of this attack, our work raises the question of whether browser fingerprinting is safe to deploy on a large scale.
Although, the present study has shown some limitations that may affect the attack efficiency. For instance, a change in browser fingerprints may result in partial accuracy of spoofed results. Still, the ease of execution of these attacks doesnâ€™t make it difficult for an adversary to reprofile a target user.