PDA

View Full Version : FBI behind Firefox zero-day compromising half of all Tor sites?




tangent4ronpaul
08-08-2013, 12:27 PM
http://blogs.computerworld.com/cybercrime-and-hacking/22595/fbi-behind-firefox-zero-day-compromising-half-all-tor-sites

People use the Tor anonymity network to protect their privacy, but perhaps as much as half of all the Onion Router sites—and Tor Mail—are potentially compromised . . . and some hackers are pointing the finger of blame at the FBI.

The owner of an Irish company, Freedom Hosting, has allegedly been providing turnkey hosting services for the Darknet, or Deep Web, which is “hidden” and only accessible through Tor .onion and the Firefox browser. The FBI reportedly called Eric Eoin Marques "the largest facilitator of child porn on the planet" and wants to extradite the 28-year-old man. About that time, Freedom Hosting went down; Tor users discovered that someone had used a Firefox zero-day to deliver drive-by-downloads to anyone who accessed a site hosted by Freedom Hosting. Ofir David, of Israeli cybersecurity firm Cyberhat, told Krebs on Security, “Whoever is running this exploit can match any Tor user to his true Internet address, and therefore track down the Tor user.”

If you’ve never visited the Hidden Wiki, then you should be fully aware that if you do, you will see things that can never be unseen. Freedom Hosting maintained servers for “TorMail, long considered the most secure anonymous email operation online,” wrote Daily Dot. “Major hacking and fraud forums such as HackBB; large money laundering operations; and the Hidden Wiki, which, until recently, was the de facto encyclopedia of the Dark Net; and virtually all of the most popular child pornography websites on the planet.”

But if you use Tor Browser Bundle with Firefox 17, you accessed a Freedom Hosting hidden service site since August 2, and you have JavaScript enabled, then experts suggest it’s likely your machine has been compromised. In fact, E Hacking News claimed that almost half of all Tor sites have been compromised by the FBI.

“It’s very likely that this is being operated by an LEA and not by blackhats,” according to analysis by Vlad Tsyrklevich. “It just sends identifying information to some IP in Reston, Virginia,” he told Wired. “It’s pretty clear that it’s FBI or it’s some other law enforcement agency that’s U.S.-based.”

The Tor Project blog first reported that a large number of hidden service addresses disappeared from the Tor network around midnight on August 4. Mozilla had issued a security advisory back on June 25, which was echoed on the Tor Project blog on August 5, stating that old Tor Browser Bundles are vulnerable. “An attack that exploits a Firefox vulnerability in JavaScript has been observed in the wild. Specifically, Windows users using the Tor Browser Bundle (which includes Firefox plus privacy patches) appear to have been targeted.”

“Tor Browser Bundle users should ensure they're running a recent enough bundle version, and consider taking further security precautions,” the Tor Project advised. Those security precautions include keeping the Tor Browser Bundle up-to-date, disabling JavaScript as Firefox zero-days will continue to be released into the wild, and potentially switching to a “live system” like Tails. The critical security announcement also stated, “Really, switching away from Windows is probably a good security move for many reasons.”

Open Watch reported, “The execution of malicious JavaScript inside the Tor Browser Bundle, perhaps the most commonly used Tor client, comes as a surprise to many users. Previously, the browser disabled JavaScript execution by default for security purposes.” It was changed “by developers in order to make the product more useful for average internet users. As a result, however, the application has become vastly more vulnerable to attacks such as this.”

Numerous hackers, security experts and researchers are tearing apart and analyzing the malicious payload code. The FBI may not be the culprit here, but the timing of the attack which delivered “a weaponized exploit to Firefox users running Windows systems,” does seem suspicious. Of course, after all the NSA spying drama . . . people might be inclined to automatically accuse the government of more surveillance and censorship.

-t

tangent4ronpaul
08-08-2013, 12:36 PM
Advice on Tor use in wake of Freedom Hosting compromise
http://www.net-security.org/secworld.php?id=15359

In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific users, the Tor Project has advised Tor users to keep their Tor Browser Bundle (TBB) updated, switch away from Windows, and disable JavaScript.

"An attack that exploits a Firefox vulnerability in JavaScript has been observed in the wild. Specifically, Windows users using the Tor Browser Bundle (which includes Firefox plus privacy patches) appear to have been targeted," Roger Dingledine, one of the original developers of Tor and director of The Tor Project, wrote in a security advisory released on Monday.

"To be clear, while the Firefox vulnerability is cross-platform, the attack code is Windows-specific. It appears that TBB users on Linux and OS X, as well as users of LiveCD systems like Tails, were not exploited by this attack," he pointed out, and added that "it's reasonable to conclude that the attacker now has a list of vulnerable Tor users who visited those hidden services."

While there are TBB versions in which the vulnerability has been patched even before the attack - 2.3.25-10; 2.4.15-alpha-1; 2.4.15-beta-1; and 3.0alpha2, to be exact - Dingledine says that users need to realize the this wasn't the first Firefox vulnerability, nor will it be the last, and that they should consider disabling JavaScript, even though this will make some websites not work as expected.

He also pointed out that even though JavaScript is the biggest, many other vectors remain for vulnerabilities in Firefox, including CSS, SVG, XML, and so on.

"Consider switching to a 'live system' approach like Tails. Really, switching away from Windows is probably a good security move for many reasons," he advises. "Be sure to keep up-to-date in the future. Tor Browser Bundle automatically checks whether it's out of date, and notifies you on its homepage when you need to upgrade. Recent versions also add a flashing exclamation point over the Tor onion icon."

In the meantime, researchers analyzing the JavaScript exploit in question claim that it sends the the victim’s MAC address and Windows hostname to a server on an IP address belonging to US defense contractor SAIC and is part of several blocks of IP addresses allocated by the company to the NSA.

UPDATE:

Bitdefender added detection against the Tor Browser Bundle exploit to its products.

"As the exploit is, we judge the probability of it being used in other attacks by other actors as high. So far, a handful of installed Bitdefender instances in France and the Dominican Republic have reported detection of the exploit," they shared.

(so in the interests of "protecting us" the feds are making us vulnerable to criminals. That's interesting.)

-t

AngryCanadian
08-08-2013, 12:43 PM
Even if the FBI may not have done it the whole group anonymous is no doubt an NSA/FBI brand.

presence
08-08-2013, 01:27 PM
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html

Microsoft BugsMicrosoft Corp. (MSFT) (http://www.bloomberg.com/quote/MSFT:US), the world’s largest software company,



provides intelligence agencies
with information about bugs
in its popular software
before it publicly releases a fix,



according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.


Redmond, Washington-based Microsoft and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.


Frank Shaw (http://topics.bloomberg.com/frank-shaw/), a spokesman for Microsoft, said those releases occur in cooperation with multiple agencies and are designed to give government “an early start” on risk assessment and mitigation.
In an e-mailed statement, Shaw said there are “several programs” through which such information is passed to the government, and named two which are public, run by Microsoft and for defensive purposes.