Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Vulnerability Etag: the anonymity of Tor at risk

A recent discovery shows how the Etag HTTP header can be exploited to reveal the hidden IP address of Tor services

This pill is also available in Italian language

Tor is known for providing a higher level of anonymity online, making it difficult for users to be identified and tracked. However, a recent discovery has exposed a possible vulnerability. This comes from the use of an HTTP header called Etag, which can potentially reveal the true IP address of a service.

Etag functionality and vulnerability

The Etag is a unique identifier generated by a server when a client requests a specific resource. The client uses it to check whether the requested resource is up-to-date or not, thus saving traffic and speeding up downloads. However, the Etag may contain information about the server, such as the IP address, the time, or a hash. This can become a tracking tool when you request the same resource from different Tor hidden services on the same server.

The Etag and the RagnarLocker case

A recent study identified the RagnarLocker ransomware group exploiting this vulnerability . Using curl and torsocks tools to compare Etags, the researchers were able to reveal the IP address of RagnarLocker's Tor service. They found that all Etags were identical and contained a hash of the server's IP address. This made it possible to determine the real address and location of the server. The revealed IP address was later linked to a RagnarLocker attack on video game company Capcom.

Implications and countermeasures

This method could be used both by malicious actors to de-anonymize Tor users and hidden service providers, and by law enforcement agencies to combat illegal activity. However, it must be considered that there are ways to mitigate this vulnerability. For example, one can disable the Etag on the server or use a proxy to change the Etag in transit, thus increasing the protection of anonymity.

Follow us on Facebook for more pills like this

06/17/2023 22:21

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated