Abstract

From an attacker perspective it is important to control a strategic point in the network in order to interfere with network traffic from a large set of machines. However, operating one or more tor exit nodes is related with low costs. An attacker simply needs to operate exit nodes and participate in the Tor network. Besides worms and drive-by malware, we propose in this paper a new propagation vector for malicious software by abusing the Tor network. After presenting the Tor network from an attacker perspective, we describe an automated exploitation malware which is operated on a Tor exit node targeting to infect web browsers. Our experiments show that the current deployed Tor network, provides a large amount of potential victims.
PDF - Torinj : Automated Exploitation Malware Targeting Tor Users

24 May 2009

GĂ©rard Wagener & Alexandre Dulaunoy / quuxlabs.com, Radu State / University of Luxembourg.

Development and git repository