August 8, 2016 By Larry Loeb 2 min read

Suphannee Sivakorn, a Ph.D. student at Columbia University, and Jason Polakis, an assistant professor at the University of Illinois, discussed the state of cookies and cookie encryption during a Black Hat briefing.

They looked at 25 popular websites, including the major search engines and news sites such as The Huffington Post and The New York Times. They found that 15 of these sites supported HTTPS, but not universally.

Many sites offer personalization over HTTP. The researchers felt this could lead to issues such as poor interoperability and flawed access control, Threatpost reported.

It Starts With One Connection

For an HTTP cookie hijacking attack to work, the attacker needs to observe an unencrypted connection to the server. Even HTTPS may have a part at the beginning of the session that is unencrypted.

“This process seems to be very secure to users as the server and browser cooperatively redirect the user to a secure connection,” the authors noted. “However, [the initial step] leaves a window of opportunity for attackers to steal the cookies. This also means that even when users see HTTPS in the address bar and the other visual clues of a trusted connection, they might still have been exposed to a cookie hijacking attack during the initial request.”

Default actions seem to be a problem in certain services. For example, the researchers found that Bing serves all connections over HTTPS by default, and all searches on the site are in cleartext. In fact, users must type HTTPS in the address bar to protect themselves.

Cookie Encryption Is Not Enough

Efforts such as HTTPS Everywhere have tried to increase adoption of more secure browsing. The presenters found that the main limitation of HTTPS Everywhere is the rule sets. These are created and maintained by the community, which requires a lot of manual effort.

It can also result in incomplete rules. HTTPS Everywhere cannot protect the user in a situation where websites contain pages or subdomains whose functionality breaks over HTTPS; the unavoidable result is an unencrypted connection. User cookies can then be exposed since a single HTTP request is enough to cause a cookie reveal.

Extensions may reduce the attack surface of a browser, but really don’t help if the website doesn’t use encryption for all data transmissions.

It’s Not Just Websites

In general, the problem is not just limited to websites. Researchers found that cookies are also exposed by “official browser extensions, search bars and mobile apps.” Additionally, they looked at Wi-Fi connections and detected that a large portion of the outgoing traffic in public wireless networks remains unencrypted, which exposes numerous users to cookie hijacking attacks.

The security versus usability conundrum has been around for a while. The price paid for easily usable websites may lie in how they enable exposure of user information.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today