Tor exit node found to turn downloaded binaries into malware

Posted by   Virus Bulletin on   Oct 24, 2014

Tor provides anonymity, not security, hence using HTTPS is essential.

A security researcher has discovered a Tor exit node that was modifying binaries downloaded through it on the fly.

The researcher, Josh Pitts of Leviathan Security, has previously shown how easy it is to modify binaries downloaded over HTTP in transit, thus turning them into malware. He emphasised the importance of using HTTPS when downloading executables from a remote server.

Of course, there are other ways to protect the integrity of downloaded binaries, such as digital signatures. But whether those are verified, and what is done upon finding an invalid signature, is up to the entity executing the binary, which could be an end-user, but also Windows Update.

In a recent presentation at DerbyCon, Josh concluded by saying he worried that this technique of 'patching' binaries "might already be in use".

It now turns out he was right: scanning the exit nodes of the Tor anonymity network, Josh found one exit node based in Russia that was patching all (uncompressed) Windows executables downloaded through it by adding malware.

This is a good reminder that Tor provides anonymity, but not security. Those operating an exit node have a privileged network position, similar to that of someone running a wireless network in a coffee shop, with the difference that those running the network cannot determine the IP address of the computer making the requests.

For many attacks, such as turning downloaded binaries into malware, this difference is not an issue. Moreover, by looking at the requests you make, an adversary might be able to determine who you are. Hence using plain HTTP over Tor is usually a very bad idea.

Even when using HTTPS one should be cautious. The privileged network position could allow an exit node operator to perform the POODLE attack against SSL 3.0.

The Tor Project has now added the malicious exit node to its blacklist, preventing Tor users from using it. Tor's Roger Dingledine warns that it is best "to have applications not blindly trust unauthenticated bits they get from the Internet".

Posted on 24 October 2014 by Martijn Grooten



Latest posts:

Nominations opened for sixth Péter Szőr Award

Virus Bulletin is seeking nominations for the sixth annual Péter Szőr Award.

Haroon Meer and Adrian Sanabria to deliver VB2019 closing keynote

New additions to the VB2019 conference programme include a closing keynote address from Thinkst duo Haroon Meer and Adrian Sanabria and a talk on attacks against payment systems.

Free VB2019 tickets for students

Virus Bulletin is excited to announce that, thanks to generous sponsorship from Google Android, we are able to offer 20 free tickets to students who want to attend VB2019.

VB2018 paper: Lazarus Group: a mahjong game played with different sets of tiles

The Lazarus Group, generally linked to the North Korean government, is one of the most notorious threat groups seen in recent years. At VB2018 ESET researchers Peter Kálnai and Michal Poslušný presented a paper looking at the group's various…

Book your VB2019 ticket now for a chance to win a ticket for BSides London

Virus Bulletin is proud to sponsor this year's BSides London conference, which will take place next week, and we have a number of tickets to give away.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.