Tor exit node found to turn downloaded binaries into malware


Tor provides anonymity, not security, hence using HTTPS is essential.

A security researcher has

discovered

a Tor exit node that was modifying binaries downloaded through it on the fly.

The researcher, Josh Pitts of

Leviathan Security

, has previously shown how easy it is to modify binaries downloaded over HTTP in transit, thus turning them into malware. He emphasised the importance of using HTTPS when downloading executables from a remote server.

Of course, there are other ways to protect the integrity of downloaded binaries, such as digital signatures. But whether those are verified, and what is done upon finding an invalid signature, is up to the entity executing the binary, which could be an end-user, but also

Windows Update

.



In a recent

presentation

at

DerbyCon

, Josh concluded by saying he worried that this technique of ‘patching’ binaries “might already be in use”.

It now turns out he was right: scanning the exit nodes of the Tor anonymity network, Josh found one exit node based in Russia that was patching all (uncompressed)

Windows

executables downloaded through it by adding malware.

This is a good reminder that Tor provides anonymity, but not security. Those operating an exit node have a privileged network position, similar to that of someone running a wireless network in a coffee shop, with the difference that those running the network cannot determine the IP address of the computer making the requests.

For many attacks, such as turning downloaded binaries into malware, this difference is not an issue. Moreover, by looking at the requests you make, an adversary might be able to determine who you are. Hence using plain HTTP over Tor is usually a very bad idea.

Even when using HTTPS one should be cautious. The privileged network position could allow an exit node operator to perform the

POODLE

attack against SSL 3.0.

The Tor Project has now

added

the malicious exit node to its blacklist, preventing Tor users from using it. Tor’s Roger Dingledine warns that it is best “to have applications not blindly trust unauthenticated bits they get from the Internet”.

Posted on 24 October 2014 by

Martijn Grooten


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *