• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

How Your Favorite Websites are Loading Dozens of Hidden Domains

March 16, 2018 By The Editor

CNN NoScript 2

Complexity is the enemy of security; the more moving parts a system has, the more difficult it is to secure them all. Unfortunately, modern online advertising and website analytics trends are creating massively complex web applications that criminals could potentially exploit – all without the average user noticing.

WatchGuard CTO Corey Nachreiner explains this issue in detail in his latest column in Dark Reading. Using the Firefox browser plugin NoScript, which blocks all active scripting on web pages, Corey examines CNN.com and counts the number of hidden domains that this popular website tries to load.

In total, CNN.com loaded content from 47 other domains. To be fair, most if not all of these other domains are legitimate advertising or website analytics tools, or part of CNN’s web application. And this isn’t a problem unique to CNN – all major website do the same thing. The issue is that these third party connections add complexity and create a wider attack surface with more potential insecurities. Here’s an excerpt from Corey’s article explaining these risks:

In this case, CNN.com isn’t compromised, but imagine if CNN did suffer some flaw that allowed attackers to inject code, like a hidden iframe. How would anyone spot one malicious domain, when normal sites typically load so much third-party content already?…Worse yet, what if one of those third parties got compromised? If an advertising network got infected by a criminal that bought ad space for malicious purposes, the hidden iframe might come from one of these other domains CNN is trusting. 

Read the full article including all of the hidden CNN.com domains on Dark Reading and watch a video of Corey’s NoScript testing here.

Share This:

Related

Filed Under: Editorial Articles, Featured

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
  • TikTok is Banned, Kind Of
  • Naming APTs

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • How Not to Update Software
  • Naming APTs
  • TikTok is Banned, Kind Of
  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use