Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Researcher Finds Tor Exit Node Adding Malware to Binaries
The Kaspersky Lab Security News Service ^ | October 24, 2014 , 12:07 pm | Dennis Fisher

Posted on 10/24/2014 6:54:44 PM PDT by Utilizer

A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services.

Josh Pitts of Leviathan Security Group ran across the misbehaving Tor exit node while performing some research on download servers that might be patching binaries during download through a man-in-the middle attack. Downloading any kind of file from the Internet is a dodgy proposition these days, and many users know that if they’re downloading files from some random torrent site in Syria or The Marshall Islands, they are rolling the dice. Malware runs rampant on these kinds of sites.

But the scenario that worries security experts much more involves an attacker being able to control the download mechanism for security updates, say for Windows or OS X. If an attacker can insert malware into this channel, he could cause serious damage to a broad population of users, as those update channels are trusted implicitly by the users’ and their machines. Legitimate software vendors typically will sign their binaries and modified ones will cause verification errors. What Pitts found during his research is that an attacker with a MITM position can actively patch binaries–if not security updates–with his own code.

(Excerpt) Read more at threatpost.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: binaries; malware; mswindows; securitybreach; tor
Navigation: use the links below to view more comments.
first 1-2021-23 next last
Tor users beware -you may already be infected.

Related link:

http://www.leviathansecurity.com/blog/the-case-of-the-modified-binaries/

1 posted on 10/24/2014 6:54:44 PM PDT by Utilizer
[ Post Reply | Private Reply | View Replies]

To: Utilizer

Updated link:

http://www.leviathansecurity.com/blog/the-case-of-the-modified-binaries/


2 posted on 10/24/2014 6:55:17 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

There is no escape. The internet is a rigged game.


3 posted on 10/24/2014 7:09:20 PM PDT by ImJustAnotherOkie (zerogottago)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Use a virtual machine.


4 posted on 10/24/2014 7:51:46 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway-Enjoy Yourself ala Louis Prima)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
I read this 3 times - I still do not understand it.

Can someone post a clear explanation. Thanks.

No disrespect meant to the OP - I'm just 'geek-lite.'
5 posted on 10/24/2014 7:55:00 PM PDT by Tainan (Cogito, ergo conservatus sum -- "The Taliban is inside the building")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome

I guess you could boot from a Linux live cd after disabling your hard drive(s) in the bios.


6 posted on 10/24/2014 7:55:12 PM PDT by Dalberg-Acton
[ Post Reply | Private Reply | To 4 | View Replies]

To: ImJustAnotherOkie

Like a Pachinko machine!


7 posted on 10/24/2014 8:12:10 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway-Enjoy Yourself ala Louis Prima)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Dalberg-Acton

Sure, why not use a VM?

If it gets whacked use another copy.


8 posted on 10/24/2014 8:14:01 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway-Enjoy Yourself ala Louis Prima)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Vendome

I’ll see your ‘eh?’ and raise you a ‘wtf?’.


9 posted on 10/24/2014 8:14:49 PM PDT by bakeneko
[ Post Reply | Private Reply | To 7 | View Replies]

To: Utilizer

It strikes me that no one should be updating their Operating System software using an anonymized TOR connection. . . which is what a TOR is used for. It is a network for persons who want to connect to the Internet anonymously. If you want to update your software, connect without the TOR. Then return to your secret surfing after your software has been updated.

Perhaps software pirates might want this for stolen software? If so, they might deserve what they get.


10 posted on 10/24/2014 8:31:45 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

“There is no escape. The internet is a rigged game.”

I agree. I never use it.


11 posted on 10/24/2014 8:34:57 PM PDT by HereInTheHeartland (Obama lied; our healthcare died.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: HereInTheHeartland

ROFL...Oh so you get the OSMOSIS version of Free Republic? Expensive isn’t it?


12 posted on 10/24/2014 8:35:51 PM PDT by Kackikat (Two wrongs do NOT make a right.... unless you are a Democrat!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker

Seriously this is all greek to me or should I say geek...what this means?


13 posted on 10/24/2014 8:38:27 PM PDT by Kackikat (Two wrongs do NOT make a right.... unless you are a Democrat!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Utilizer

Shocking.

Or maybe, well duh.


14 posted on 10/24/2014 8:44:37 PM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kackikat

I dunno; I just always stay off the internet. Its not a good place.


15 posted on 10/24/2014 8:46:38 PM PDT by HereInTheHeartland (Obama lied; our healthcare died.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Tainan

OK, not certain which part you do not understand so I will go by some assumptions of necessity.

TOR is a system by which you can (to a huge extent) use the internet very securely since they use a number of very secure providing locations which are configured to not allow anyone to track your location or the sites you visit. In layman’s terms.

MS-Windows users have been using this network for secure lines when they perform their OS “upgrades” to ensure they only download software that is supposed to be uninfected by malware, but it turns out that a few of the servers in the TOR network have been compromised, and have been modifying software on-the-fly that people have been downloading without the knowledge of the originating agency (M-soft) or the user since the indicators such as the hashtag verifier have also been compromised.

The result has been that instead of getting a “pure” upgrade from the MS people, they have been getting infected software without any warnings from the system or the virus-scanning utilities. This is why this information provided in the referenced article is so important, so people are informed that they might have unintentionally been infected despite the precautions taken to protect their machines.

Hope that is not too muddled to understand. :)


16 posted on 10/24/2014 8:53:06 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Kackikat
Seriously this is all greek to me or should I say geek...what this means?

As I understand it, there are internet nodes that can operate anonymously, bypassing the standard nodes normally used. These TOR "nodes" will allow a user to operate anonymously by acting as a PROXY sending on the users' requests, with a spoofed address, and then handling the return responses and returning them to the correct addressing, and not leave a traceable trail of where the users goes on the Internet.

A few of the "exit nodes," those returning the data to the user, are intercepting upgrade packets for software or operating system security upgrades, and secretly acting as Man-in-the-middle servers, taking the incoming packets from their originating true servers coming from, say Microsoft, adding malware, and then sending them on to the users. They are apparently also spoofing the security certificates in some way. That is difficult to believe.

Does that help?

17 posted on 10/24/2014 8:54:30 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Utilizer

It was probably a government node.


18 posted on 10/24/2014 11:21:18 PM PDT by zeugma (The act of observing disturbs the observed.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome

Not only can you wack the vm if it is comprised, you can alsocreate it so that state information is never saved. That way, it is always a pristine image each time it boots.


19 posted on 10/24/2014 11:23:58 PM PDT by zeugma (The act of observing disturbs the observed.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Utilizer
I bet Steve Gibson's Fingerprint service would have caught this attack.

http://www.computerworld.com/article/2475102/cybercrime-hacking/steve-gibson-s-fingerprint-service-detects-ssl-man-in-the-middle-spying.html

It's good that the modified Windows update files failed their integrity checks and were not installed, but they should never have been downloaded at all.

I just checked, and Windows fixit file downloads are from http://diagnostics.support.microsoft.com. That's not even an https connection.

20 posted on 10/25/2014 1:24:45 AM PDT by TChad (The Obamacare motto: Dulce et decorum est pro patria mori.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-23 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson