{"id":3912,"date":"2023-11-29T09:34:16","date_gmt":"2023-11-29T09:34:16","guid":{"rendered":"https:\/\/www.propelex.com\/?p=3912"},"modified":"2023-11-30T07:56:09","modified_gmt":"2023-11-30T07:56:09","slug":"trojan-rigged-tor-browser-bundle-drops-malware","status":"publish","type":"post","link":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/","title":{"rendered":"Trojan Rigged Tor Browser Bundle Drops Malware"},"content":{"rendered":"

Trojan Rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution. Threat actors have been using Trojanized installers for the Tor browser to distribute clipboard-injector malware that siphons money from cryptocurrency wallets. Kaspersky has detected these attacks in more than 52 countries, with most of them coming from Russia, where access to Tor is blocked.<\/p>\n

One attack, named EgotisticalGiraffe after an NSA manual for operational management procedures, exploits a type confusion vulnerability in Firefox\u2019s E4X library.<\/p>\n

EgotisticalGiraffe<\/h2>\n

According to a training presentation leaked by Snowden, EgotisticalGiraffe is a tool that allows the NSA to strip Tor\u2019s encryption. It exploits a type confusion vulnerability in the E4X library, an XML extension for JavaScript. The library is used by Firefox, and a version with the EgotisticalGiraffe flaw was included in the Tor browser bundle until recently.<\/p>\n

Because Tor is a well-designed and robust anonymity tool, it is difficult to attack it directly. Instead, the NSA attacks Tor users through vulnerabilities in their Firefox browsers. The programs that attack Tor users are called Mjoliner, Mullenize, and EgotisticalGiraffe. Each has a zoological theme.<\/p>\n

FoxAcid<\/h2>\n

The National Security Agency\u2019s (NSA) system of hacking Tor users is known as FoxAcid. The system, described in a top-secret NSA presentation leaked by Snowden, targets Tor users by exploiting vulnerabilities in their Firefox browsers. The system uses a set of secret Internet servers to identify Tor users and then attacks their computers. The attack is designed to ensure that the computer remains compromised long-term, allowing the NSA to continue eavesdropping on its targets.<\/p>\n

Specifically, the NSA\u2019s version of Firefox exploits a series of vulnerabilities in the browser\u2019s native functionality. These bugs are not related to the Tor software, but rather how the browser interacts with other services on the Internet. Once the browser is infected, it is redirected to a series of Web pages hosted on servers that mimic legitimate sites. These Web pages are designed to infect the browser with malware that can compromise a Tor connection. Security expert Bruce Schneier calls the technique \u201cman in the middle attack,\u201d which allows a server to intercept and manipulate real-time communications between two computers.<\/p>\n

Once the NSA\u2019s Quantum servers redirect the browser to a FoxAcid server, the server selects an exploit from its toolkit to use against the victim\u2019s computer. This toolkit includes both public exploits that rely on software being out of date and zero-day exploits, which are saved for the most valuable targets.<\/p>\n

If the NSA is targeting high value targets, it will likely use a rare zero-day exploit, but it might also opt to install less costly malware on the target machine. The NSA can then call back to the victim\u2019s computer, using tools such as SECONDDATE and MAGIC SQUIRREL or man-in-the-middle Wi-Fi attacks code-named QUANTUMCOOKIE and EGOTISTICALGIRAFFE.<\/p>\n

China\u2019s cybersecurity authority has warned that a US National Security Agency cyberattack targeting research institutes could be the first of many to hit the country. It has warned that government, academic and business bodies around the world should be aware of the threat and take precautions. The attack is likely linked to a Trojan horse program named Validator, which was recently found in hundreds of key information systems at Chinese research institutes.<\/p>\n

OnionDuke<\/h2>\n

Earlier this year security researcher Josh Pitts uncovered malware that uses the anonymizing Tor network to infect executable files with a backdoor. He’s now releasing the code that lets anybody rig their own Tor exit nodes to spread the malware, and he’s planning to demonstrate how to do it at next month’s Blackhat conference in Las Vegas.<\/p>\n

Pitts has been working on a new project called the Tor Backdoor Factory, which is designed to make it easy to create and distribute malicious software that can be launched through the Tor network. The site’s open source, and anyone can use it to try out different attack scenarios. He plans to release the toolkit next month, and he’s also working on a version that can be used by professional hackers.<\/p>\n

The new toolkit will allow users to create customized attacks based on the target they’re targeting, the type of information they want to steal and other factors. It’s possible to target specific regions, and the toolkit will also be able to bypass anti-virus products from big vendors like McAfee and Symantec.<\/p>\n

OnionDuke is an advanced persistent threat (APT) that aims to steal information from targets. It has been linked to the Dukes, a group of well-funded and dedicated cyber espionage hackers that has been linked to the Russian government since 2008.<\/p>\n

Infected computers are given a backdoor that connects to various command and control servers. The malware then downloads and executes additional components. The components can be found on websites that have been hacked by the attackers. The malware can then evade detection by connecting to fake domains and communicating with C&C servers using different encryption algorithms.<\/p>\n

Researchers believe that OnionDuke has been around for a long time. The timestamps analyzed by F-Secure suggest that the oldest samples are from October 2013. The malware has also been known as CozyDuke, and it’s a member of the same family as MiniDuke, which is believed to be tied to the Russian government.<\/p>\n

CozyDuke has been linked to targeted attacks against NATO and European government agencies. It has been described as a data-mining<\/a> APT and shares commands and control infrastructure with other APTs including MiniDuke and OnionDuke.<\/p>\n","protected":false},"excerpt":{"rendered":"

Trojan Rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution. Threat actors have been using Trojanized installers for the Tor browser to distribute clipboard-injector malware that siphons money from cryptocurrency wallets. Kaspersky has detected these attacks in more than 52 countries, with most of them coming […]<\/p>\n","protected":false},"author":3,"featured_media":3913,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[47],"tags":[],"acf":[],"yoast_head":"\nTrojan Rigged Tor Browser Bundle Drops Malware - Propelex<\/title>\n<meta name=\"description\" content=\"Trojan-rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trojan Rigged Tor Browser Bundle Drops Malware - Propelex\" \/>\n<meta property=\"og:description\" content=\"Trojan-rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Propelex\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T09:34:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-30T07:56:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.propelex.com\/wp-content\/uploads\/2023\/11\/Trojan-Rigged-Tor-Browser-Bundle-Drops-Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mansoor Yusaf\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansoor Yusaf\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/\"},\"author\":{\"name\":\"Mansoor Yusaf\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1\"},\"headline\":\"Trojan Rigged Tor Browser Bundle Drops Malware\",\"datePublished\":\"2023-11-29T09:34:16+00:00\",\"dateModified\":\"2023-11-30T07:56:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/\"},\"wordCount\":921,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.propelex.com\/#organization\"},\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/\",\"url\":\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/\",\"name\":\"Trojan Rigged Tor Browser Bundle Drops Malware - Propelex\",\"isPartOf\":{\"@id\":\"https:\/\/www.propelex.com\/#website\"},\"datePublished\":\"2023-11-29T09:34:16+00:00\",\"dateModified\":\"2023-11-30T07:56:09+00:00\",\"description\":\"Trojan-rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.propelex.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trojan Rigged Tor Browser Bundle Drops Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.propelex.com\/#website\",\"url\":\"https:\/\/www.propelex.com\/\",\"name\":\"Propelex\",\"description\":\"Business focused cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.propelex.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.propelex.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.propelex.com\/#organization\",\"name\":\"Propelex\",\"url\":\"https:\/\/www.propelex.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg\",\"contentUrl\":\"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Propelex\"},\"image\":{\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1\",\"name\":\"Mansoor Yusaf\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g\",\"caption\":\"Mansoor Yusaf\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trojan Rigged Tor Browser Bundle Drops Malware - Propelex","description":"Trojan-rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/","og_locale":"en_US","og_type":"article","og_title":"Trojan Rigged Tor Browser Bundle Drops Malware - Propelex","og_description":"Trojan-rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution.","og_url":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/","og_site_name":"Propelex","article_published_time":"2023-11-29T09:34:16+00:00","article_modified_time":"2023-11-30T07:56:09+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.propelex.com\/wp-content\/uploads\/2023\/11\/Trojan-Rigged-Tor-Browser-Bundle-Drops-Malware.jpg","type":"image\/jpeg"}],"author":"Mansoor Yusaf","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mansoor Yusaf","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#article","isPartOf":{"@id":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/"},"author":{"name":"Mansoor Yusaf","@id":"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1"},"headline":"Trojan Rigged Tor Browser Bundle Drops Malware","datePublished":"2023-11-29T09:34:16+00:00","dateModified":"2023-11-30T07:56:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/"},"wordCount":921,"commentCount":0,"publisher":{"@id":"https:\/\/www.propelex.com\/#organization"},"articleSection":["Blogs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/","url":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/","name":"Trojan Rigged Tor Browser Bundle Drops Malware - Propelex","isPartOf":{"@id":"https:\/\/www.propelex.com\/#website"},"datePublished":"2023-11-29T09:34:16+00:00","dateModified":"2023-11-30T07:56:09+00:00","description":"Trojan-rigged Tor Browser Bundle drops malware. Stay vigilant against cybersecurity threats, and secure your online anonymity with caution.","breadcrumb":{"@id":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.propelex.com\/trojan-rigged-tor-browser-bundle-drops-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.propelex.com\/"},{"@type":"ListItem","position":2,"name":"Trojan Rigged Tor Browser Bundle Drops Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.propelex.com\/#website","url":"https:\/\/www.propelex.com\/","name":"Propelex","description":"Business focused cybersecurity","publisher":{"@id":"https:\/\/www.propelex.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.propelex.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.propelex.com\/#organization","name":"Propelex","url":"https:\/\/www.propelex.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg","contentUrl":"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg","width":"1024","height":"1024","caption":"Propelex"},"image":{"@id":"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1","name":"Mansoor Yusaf","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.propelex.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g","caption":"Mansoor Yusaf"}}]}},"_links":{"self":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts\/3912"}],"collection":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/comments?post=3912"}],"version-history":[{"count":1,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts\/3912\/revisions"}],"predecessor-version":[{"id":3914,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts\/3912\/revisions\/3914"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/media\/3913"}],"wp:attachment":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/media?parent=3912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/categories?post=3912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/tags?post=3912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}