Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
The attack code exploited a memory-management vulnerability, forcing Firefox to send a unique identifier to a third-party server using a public IP address that can be linked back to the person's ISP. The exploit contained several hallmarks of professional malware development, including 'heap spraying' techniques to bypass Windows security protections and the loading of executable code that prompted compromised machines to send the identifying information to a server located in Virginia, according to an analysis by researcher Vlad Tsrklevich."
Posted Aug 5, 2013 23:29 UTC (Mon)
by bjacob (guest, #58566)
[Link] (10 responses)
Posted Aug 5, 2013 23:36 UTC (Mon)
by bjacob (guest, #58566)
[Link] (9 responses)
http://www.mozilla.org/security/announce/2013/mfsa2013-53...
So was Torbrowser using an *unsupported* Firefox release until now ?! That seems to defeat the point of a would-be anonymizing browser.
Posted Aug 5, 2013 23:49 UTC (Mon)
by JoeBuck (subscriber, #2330)
[Link] (2 responses)
Posted Aug 5, 2013 23:53 UTC (Mon)
by k8to (guest, #15413)
[Link] (1 responses)
Posted Aug 6, 2013 17:54 UTC (Tue)
by rahvin (guest, #16953)
[Link]
Posted Aug 6, 2013 0:53 UTC (Tue)
by cesarb (subscriber, #6266)
[Link] (1 responses)
No.
https://blog.torproject.org/blog/tor-security-advisory-ol...
If that blog post says the truth (and I have no reason to doubt it), and I am reading it correctly, a fixed version had already been released more than a month ago.
Posted Aug 6, 2013 1:10 UTC (Tue)
by bjacob (guest, #58566)
[Link]
Posted Aug 6, 2013 6:08 UTC (Tue)
by gmaxwell (guest, #30048)
[Link] (3 responses)
See also: https://www.torproject.org/projects/torbrowser/design/
Posted Aug 6, 2013 6:51 UTC (Tue)
by pabs (subscriber, #43278)
[Link] (2 responses)
Posted Aug 6, 2013 9:53 UTC (Tue)
by tialaramex (subscriber, #21167)
[Link] (1 responses)
It's like password masking, using rot13 on the stored password doesn't make it difficult for bad guys to find the original password but it means someone who happens to glance at the config file is much less likely to come away with "MoonMoonForPresident" seared into their memory. Or think of it like the lock on a typical bathroom door. Can I open the lock from the "wrong" side with the tools in my pocket? Yes I can. But people don't, because they don't want to walk in someone using the toilet, the feeble lock is a prompt to remind us of a social convention and nothing more.
TOR is a big deal, to get any benefit users have to understand what it is and is not doing, and what that means for how they use a browser. Just labelling it "Super private mode" would be false advertising. Not to mention that then obviously TOR will be incredibly slow for everyone so they'll presumably switch it back off again and pronounce the whole thing a "waste of time".
Posted Aug 6, 2013 10:01 UTC (Tue)
by pabs (subscriber, #43278)
[Link]
Posted Aug 6, 2013 18:32 UTC (Tue)
by brouhaha (subscriber, #1698)
[Link] (4 responses)
Posted Aug 6, 2013 19:01 UTC (Tue)
by job (guest, #670)
[Link] (3 responses)
Posted Aug 6, 2013 21:16 UTC (Tue)
by JoeBuck (subscriber, #2330)
[Link] (2 responses)
Posted Aug 6, 2013 22:03 UTC (Tue)
by raven667 (subscriber, #5198)
[Link]
These folks aren't super-human either and secrecy hides much incompetence, sure they _could_ have done what you say but isn't it more likely that the person who set this up just didn't think about it or didn't personally have access to budget for new resources to hide this.
Posted Aug 6, 2013 23:02 UTC (Tue)
by job (guest, #670)
[Link]
Yes, because of the comparably restricted payload and the nature of the websites it is likely it there is some law agency behind it, probably North American. There leaves us with a handful, plus whatever private contractors that offer these services.
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers are going to focus on whatever version Tor bundles, since non-expert Tor users are going to use the setup that makes it easy.
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
The NSA folks aren't fools. I think that this attack was designed to be discovered, along with the NSA address, because it would have been so easy to use a machine anywhere on the net, or more than one, to receive the unique IDs. I can think of two possibilities: to scare people away from Tor, or to make it appear as if the NSA is the culprit.
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
