Hackers steal Bitcoin through large-scale exploit on Tor: report -

  • Intermittent Denial of Service attack is causing downtime. Looks like a kiddie 5 min rental. Waiting on a response from upstream.

BarberFerdinand

True & Honest Fan
kiwifarms.net


In brief
  • Hackers this year controlled 24% of exit relays on Tor—that's more than ever in the last five years, according to a cyber security researcher.
  • This is allowing hackers to snoop on crypto transactions and redirect Bitcoin funds to themselves.
  • "Bitcoin address rewriting attacks are not new, but the scale of their operations is," the researcher said.

Hackers this year exercised significant influence over the privacy browser Tor, according to a report by pseudonymous cyber security researchernusenu.”
And they’re using this influence to hijack cryptocurrency transactions, specifically targeting Bitcoin mixer services.
The Tor browser works by bouncing your traffic about several different anonymous relays. This means that it’s very difficult to trace your identity. When, say, a search query hits the final relay, called the “exit relay,” your data the Internet and out pops your search result.


But the researcher found that hackers at their peak operated 24% of the exit relays on the network, or 380, by May of this year. That’s the most control they’ve had over Tor exit relays in the last five years, the researcher said. Controlling these exit relays, hackers can remove encryption protocols on websites to see the users’ data and manipulate it. And they’re using the control to steal Bitcoin, said the researcher.

“It appears that they are primarily after cryptocurrency related websites—namely multiple bitcoin mixer services. They replaced bitcoin addresses in HTTP traffic to redirect transactions to their wallets instead of the user provided bitcoin address,” said nusenu.


While these sorts of man-in-the-middle attacks are not new, nor are they unique to the Tor browser, the scale of this particular attack is unprecedented, according to the report.

The researcher has been reporting the hackers’ misdeeds to Tor administrators since May and many were taken down on June 21. But the attacker still controls more than 10% of the exit relay nodes, said nusenu.


The vulnerabilities come as a shock to those for whom Tor is the gold standard of anonymity for a web browser. Tor is the interface many use to access the dark web, the underbelly of the Internet that houses drug marketplaces and other illegal activity. The browser is also used by whistleblowers and journalists trying to evade surveillance.

To fix the issue, the researcher suggests a short term solution—limiting the amount of exit relays, and a long term solution—having a certain amount of “known” operators; those may require, say, verifying email addresses or submitting physical addresses.
 
Last edited:

Lord of the Large Pants

Chicks dig giant robots.
kiwifarms.net
"Controlling these exit relays, hackers can remove encryption protocols on websites"

Er... how? Unless there's something I don't know about, having control of an exit node (or even ALL the exit nodes) won't help you strip HTTPS.
 

Vecr

"nanoposts with 90° spatial rotational symmetries"
kiwifarms.net
"Controlling these exit relays, hackers can remove encryption protocols on websites"

Er... how? Unless there's something I don't know about, having control of an exit node (or even ALL the exit nodes) won't help you strip HTTPS.

They could attempt a downgrade attack by actively interfering with the connection, if the encryption protocols are more opportunistic, than strictly required by both sides. The Tor browser is supposed to combat that problem with the https everywhere extension, but that does not work in all cases, and the user can disable it if it causes the site to "not work", letting themselves be attacked. If it's an e-mail connection, the Tor browser might not be in use at all.
 

Lord of the Large Pants

Chicks dig giant robots.
kiwifarms.net
They could attempt a downgrade attack by actively interfering with the connection, if the encryption protocols are more opportunistic, than strictly required by both sides. The Tor browser is supposed to combat that problem with the https everywhere extension, but that does not work in all cases, and the user can disable it if it causes the site to "not work", letting themselves be attacked. If it's an e-mail connection, the Tor browser might not be in use at all.
Fair enough, but the article frames it as a Tor exploit. It's not Tor that's vulnerable to a downgrade attack, it's the endpoints.

I guess if we're thinking a little more broadly I can see some way that Tor would be tangentially involved in exploits, but none of them are really the fault of Tor as such.
 

Similar threads

The alleged administrator of Bitcoin Fog kept the dark web service running for 10 years before the IRS caught up with him
Replies
7
Views
884
The rising value of Bitcoin leads to ever-higher energy consumption, researchers say.
Replies
15
Views
2K
Top