Menu
Tor Project flags Russian 'exit node' server for delivering malware

Tor Project flags Russian 'exit node' server for delivering malware

The server used a technique to append malware to legitimate code

The Tor Project has flagged a server in Russia after a security researcher found it slipped in malware when users were downloading files.

Tor is short for The Onion Router, which is software that offers users a greater degree of privacy when browsing the Internet by routing traffic through a network of worldwide servers. The system is widely used by people who want to conceal their real IP address and mask their web browsing.

The suspicious server was an "exit node" for Tor, which is the last server in the winding chain used to direct web browsing traffic to its destination.

Roger Dingledine, Tor Project's project leader and director, wrote the Russian server has been labeled a bad exit node, which should mean Tor clients will avoid using the server.

The Russian server was found by Josh Pitts, who does penetration testing and security assessments with Leviathan Security Group. He wrote he wanted to find out how common it was to find attackers modifying the binaries of legitimate code in order to deliver malware.

Binaries from large software companies have digital signatures that can be verified to make sure the code hasn't been modified. But Pitts wrote most code isn't signed, and even further, most don't employ TLS (Transport Layer Security) during downloading. TLS is the successor to SSL (Secure Sockets Layer), which encrypts connections between a client and a server.

He suspected attackers were "patching" binaries during man-in-the-middle attacks and took a look at more than 1,110 Tor exit nodes.

Pitts only found one Tor exit node that was patching binaries. The node would modify only uncompressed portable executables, he wrote.

"This does not mean that other nodes on the Tor network are not patching binaries; I may not have caught them, or they may be waiting to patch only a small set of binaries," he wrote.

The broad lesson for users is that they should be wary of downloading code that is not protected by SSL/TLS, even if the binary itself is digitally signed, Pitts wrote.

"All people, but especially those in countries hostile to 'Internet freedom,' as well as those using Tor anywhere, should be wary of downloading binaries hosted in the clear -- and all users should have a way of checking hashes and signatures out of band prior to executing the binary," he wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags The TOR Projectsecurity

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments