Categories: Breaking NewsHacking

MIT researchers identify Tor hidden services with 88 percent accuracy

Researchers have successfully carried out a traffic correlation attack against the Tor Network identifying hidden services with 88 percent accuracy.

Researchers from the Massachusetts Institute of Technology (MIT) have discovered a vulnerability in Tor which lead the identification of hidden services with up to 88 percent accuracy.

The team of experts composed of researchers from MIT and the Qatar Computing Research Institute (QCRI) will present their work at the next Usenix Security Symposium.

The discovery is disconcerting, the researcher demonstrated how to unmask Tor hidden services in the Tor Network by analyzing the traffic patterns of encrypted data passing through a single machine in the Tor network.

We have explained several times the routing algorithm implemented by the Tor network, “The Onion Router“, it allows to protect traffic by adopting several layers of encryption.

Deep Web Onion_RoutingDeep Web Onion_Routing

The routing process needs that machine in the Tor network exchange a large amount of data during the establishment of a connection to a hidden service.

The researchers demonstrated that “simply by looking for patterns in the number of packets passing in each direction through a guard, machine-learning algorithms could, with 99 per cent accuracy, determine whether the circuit was an ordinary Web-browsing circuit, an introduction-point circuit or a rendezvous-point circuit.”

The team run a traffic correlation attack, a hacking technique discussed several times when facing Tor hacking.

“Furthermore, by using a Tor-enabled computer to connect to a range of different hidden services, they showed that a similar analysis of traffic patterns could identify those services with 88 per cent accuracy. That means that an adversary who lucked into the position of guard for a computer hosting a hidden service, could, with 88 per cent certainty, identify it as the service’s host.” States the MIT’s full press release .

The experts also suggested a method to mitigate the attack by masking the sequences with dummy packers in a way they all look the same.

“We recommend that [the Tor project] mask the sequences so that all the sequences look the same,” said Mashael AlSabah, an assistant professor of computer science at Qatar University, as well as a researcher at QCRI and a visiting scientist at MIT. To defend against that kind of attack, he added, Tor needed to “send dummy packets to make all five types of circuits look similar.”

“For a while, we’ve been aware that circuit fingerprinting is a big issue for hidden services,” said David Goulet, a developer with the Tor project. “This paper showed that it’s possible to do it passively – but it still requires an attacker to have a foot in the network and to gather data for a certain period of time.”

“We are considering their countermeasures as a potential improvement to the hidden service,” he added. “But I think we need more concrete proof that it definitely fixes the issue.”

Which is the comment of the Tor Project?

A spokesman for the Tor Project confirmed to The Register that the attack presented by the boffins is a known issue, anyway it is difficult to carry on.

“It’s is a known issue that hidden service circuits are noticeable in certain situations, but this attack is very difficult to execute. The countermeasures described in the paper are interesting since the authors claim that deploying some of them would neutralize their attack and better defend against hidden service circuit fingerprinting attacks in general.” said the spokesman for the Tor Project. “We need more concrete proof that these measures actually fix the issue,” the spokesman continued, adding: “We encourage peer-reviewed research into both attacks against and defenses of the Tor network.”

If you are interested to know traffic analysis and/or correlation attack techniques give a look to the post Hacking Tor Network that I wrote early this year.

Pierluigi Paganini

(Security Affairs – Tor Network,  hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

New botnet HTTPBot targets gaming and tech industries with surgical attacks

New botnet HTTPBot is targeting China's gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS …

30 seconds ago

Meta plans to train AI on EU user data from May 27 without consent

Meta plans to train AI on EU user data from May 27 without consent; privacy…

9 hours ago

AI in the Cloud: The Rising Tide of Security and Privacy Risks

Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise…

11 hours ago

Google fixed a Chrome vulnerability that could lead to full account takeover

Google released emergency security updates to fix a Chrome vulnerability that could lead to full…

11 hours ago

Nova Scotia Power discloses data breach after March security incident

Nova Scotia Power confirmed a data breach involving the theft of sensitive customer data after…

22 hours ago

Coinbase disclosed a data breach after an extortion attempt

Coinbase confirmed rogue contractors stole customer data and demanded a $20M ransom in a breach…

1 day ago