Posted by Virus Bulletin on Oct 24, 2014
Tor provides anonymity, not security, hence using HTTPS is essential.
A security researcher has discovered a Tor exit node that was modifying binaries downloaded through it on the fly.
The researcher, Josh Pitts of Leviathan Security, has previously shown how easy it is to modify binaries downloaded over HTTP in transit, thus turning them into malware. He emphasised the importance of using HTTPS when downloading executables from a remote server.
Of course, there are other ways to protect the integrity of downloaded binaries, such as digital signatures. But whether those are verified, and what is done upon finding an invalid signature, is up to the entity executing the binary, which could be an end-user, but also Windows Update.
In a recent presentation at DerbyCon, Josh concluded by saying he worried that this technique of 'patching' binaries "might already be in use".
It now turns out he was right: scanning the exit nodes of the Tor anonymity network, Josh found one exit node based in Russia that was patching all (uncompressed) Windows executables downloaded through it by adding malware.
This is a good reminder that Tor provides anonymity, but not security. Those operating an exit node have a privileged network position, similar to that of someone running a wireless network in a coffee shop, with the difference that those running the network cannot determine the IP address of the computer making the requests.
For many attacks, such as turning downloaded binaries into malware, this difference is not an issue. Moreover, by looking at the requests you make, an adversary might be able to determine who you are. Hence using plain HTTP over Tor is usually a very bad idea.
Even when using HTTPS one should be cautious. The privileged network position could allow an exit node operator to perform the POODLE attack against SSL 3.0.
I would liken Tor to putting on Sauron's ring. The wearer is invisible to ordinary beings, like Men, but highly visible to the Nazgûl — Matthew Green (@matthew_d_green) October 24, 2014
The Tor Project has now added the malicious exit node to its blacklist, preventing Tor users from using it. Tor's Roger Dingledine warns that it is best "to have applications not blindly trust unauthenticated bits they get from the Internet".
Posted on 24 October 2014 by Martijn Grooten