FBI infected PCs on a large scale to persecute alleged criminals

A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines on a large scale.

It’s not a mystery that usage of the Tor network represents a problem for investigators of law enforcement agencies and for government entities that need to track users on the popular anonymizing network. Last year the FBI dismantled the Tor hosting service Freedom Hosting in a large scale investigation on child pornography. FBI used a malicious code able to exploit a Firefox Zero-day for Firefox 17 version that allowed it to track Tor users. The malware implants a tracking cookie which fingerprinted suspects through a specific external server. The exploit is based on a Javascript that is a tiny Windows executable hidden in a variable dubbed “Magneto”. Magneto code looks up the victim’s Windows hostname and MAC address and sends the information back to the FBI Virginia server exposing the victims’s real IP address. The script sends back the data with a standard HTTP web request outside the Tor Network.  

A few days ago, operators at Tor Project revealed that an unknown entity has managed a series of relay servers to conduct a confirmation attack against the Tor network and de-anonymize its users.

“The security advisory explains that bad actors were leveraging a critical flaw in Tor to modify protocol headers in order to perform a traffic confirmation attack and inject a special code into the protocol header used by attackers to compare certain metrics from relays to de-anonymize users. The advisory reports that 115 malicious fast non-exit relays (6.4% of whole Tor network) were involved in the attack, the servers were actively monitoring the relays on both ends of a Tor circuit in an effort to de-anonymizeusers. ” I’ve reported in a previous post on the attack.

A new report disclosed by Wired suggests that agents of FBI are using a malware to identify Tor users by infecting their machines, it seems that the law enforcement agency is infecting computers as part of a large scale campaign dubbed Operation Torpedo. The tactic adopted by the FBI is simple as dangerous, the Bureau has compromised high-traffic websites using them to deliver the malicious code used to track Tor users, the infection schema is known as “drive-by download”. A court case has revealed that the FBI has used the tactic to track computers accessing the Tor network. It is difficult to verify if innocent Tor users were also infected by the the Operation Torpedo campaign, but security experts are sure that FBI and other agencies will continue to infect systems with drive-by download exploits.

“Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.” report Wired.
In reality the FBI was interested to track those Internet users, which were habitual visitors of hidden websites dealing with illegal activities like child pornography, selling drugs and weapons and murder contracts.
In 2012 the FBI discovered a site called “Pedoboard,” and successfully hacked it exploiting a poorly configuration for the administrative account. The FBI, after obtaining legal warrants to track visitors of Aaron McGrath identified the IP address of as many as 25 individuals using a malware specifically designed for the purpose.
Of course, despite the use of tracking malware could be very effective, its use have many repercussions on legal and security perspectives. It could be used to track Internet users legally visiting other suspicious sites, and don’t forget that similar malicious could be also abused by bad actors.
You could easily imagine them using this same technology on everyone who visits a jihadi forum, for example,” “And there are lots of legitimate reasons for someone to visit a jihadi forum: research, journalism, lawyers defending a case. ACLU attorneys read Inspire Magazine, not because we are particularly interested in the material, but we need to cite stuff in briefs.” said Chris Soghoian, principal technologist with the American Civil Liberties Union.
The ACLU fears that judges issuing the legal search warrants to the FBI, which make these tracking malware attacks legal due their poor knowledge of technology issue.
“A federal magistrate signed three separate search warrants: one for each of the three hidden services. The warrants authorized the FBI to modify the code on the servers to deliver the NIT to any computers that accessed the sites. The judge also allowed the FBI to delay notification to the targets for 30 days”
Let’s hope that similar tactics will be properly regulated in the future, I understand that they could be necessary to track criminals, but potential side effects could be hard to mitigate and dangerous for Internet survival.

Pierluigi Paganini

(Security Affairs –  malware, FBI)  

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

28 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

1 hour ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

23 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.