• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cyber Attacks

Operation OnionPoison: pushing backdoored Tor Browser to chineses users

Kaspersky warns about a malicious version of the Tor Browser that can be downloaded through YouTube video description.

Gert Van de VenbyGert Van de Ven
November 11, 2022
in Cyber Attacks, Cybercrime, Malware, News, Threat Intelligence
0
Kaspersky warns about a malicious version of the Tor Browser that can be downloaded through YouTube video description.

 

During regular threat hunting activities, Kaspersky identified malicious Tor Browser installers. According to their telemetry, all the victims targeted by these installers are located in China. Because the Tor Browser website is blocked, individuals from China have to download Tor from third-party websites. Somebody posted a malicious Tor installer link on a popular Chinese-language YouTube channel dedicated to internet anonymity. The description offers a link to the malicious Tor Browser installer in a screenshot of the video. More than 180,000 people subscribe to the channel, and the video with the malicious link has a view count of over 64,000. According to Kaspersky, the malicious campaign started in March 2022, following the posting of the video in January.

The authorised Tor Browser is of course configured to be more private than the malicious one. The infected Tor Browser stores browsing history and data entered into web pages in addition to the original one. The malicious Tor Browser includes spyware that collects personal information from a variety of libraries and sends it to a command and control server. In addition to spying on victim machines, the spyware can also execute shell commands, giving the attacker full control over the machine.

An initial infection using youtube SEO poisonning

Victims of the OnionPoison campaign may be led to the malicious video through a YouTube search for ‘Tor浏览器’ (Tor Browser in Chinese). The video is listed as the first result for the ‘Tor Browser’ query (Tor Browser in Chinese) using Search Engine Poisoning. It contains two links:

  • one directs users to the official Tor Browser website
  • another directs users to a malicious Tor Browser installer executable hosted on a Chinese cloud-sharing service.

Since China forbids the Tor website, chinese users must navigate to the cloud-sharing service to download the browser.

The intrusion vector is very interesting, as a lot of threat actor rely on phishing to infect their target. Yet, here, an alternative social engineering vector has been exploited. All detections of the OnionPoison campaign appear to be geographically located in China, based on Kaspersky research.

Malware attacks on the Tor Project

The threat actor uses anonymization software to lure targets. They planted a link on a popular YouTube channel. Unlike common stealers, OnionPoison implants do not automatically collect users’ passwords, cookies, or wallets. Rather, they gather data, such as browsing histories, social media account numbers, and Wi-Fi networks, that can be used to identify victims.

The attackers can use the stolen browser history data to identify victims, contact them through social networks, and threaten to report them to authorities if they have committed illegal activities. In the past, law enforcement agencies, such as the FBI, have used 0-days to identify Tor users involved in darknet cybercrime. A similar case involved the distribution of OnionDuke malware through injections on unencrypted HTTP connections on TOR exit nodes.

It is important to always download software from official websites in order to avoid becoming infected with OnionPoison implants. If that’s not an option, verify the authenticity of installers downloaded from third-party sources by checking their cryptographic signatures. The best way to avoid infection with OnionPoison implants regardless of the actor’s motives is to always download software from official websites. A genuine installer should bear a valid signature. The company name indicated in its certificate should match the name of the software creator. To download the official and latest version of Tor Browser, always download it from the official Tor Project page.

Cyberespionage campaign are a vicious danger. Unlike ransomware attacks, they do not take immediate effect and are less visible. Yet they can have huge impact on privacy and personal safety.

Tags: CyberespionageData AbuseGeopoliticsGlobal SurveillanceHuman & SocietiesIntrusion VectorPersonal DataSEO PoisoningSpywareTor Project

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}