LogoLogo

Podcasts

Newsletters

Videos

People

About

Search

Risky Bulletin Newsletter

March 13, 2024

Risky Biz News: Tor launches new WebTunnel anti-censorship protocol

Written by

Catalin Cimpanu
Catalin Cimpanu

News Editor

This newsletter is brought to you by  Yubico . You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via  this RSS feed . On Apple Podcasts:

‎Risky Business News: Risky Biz News: Tor launches new WebTunnel anti-censorship protocol on Apple Podcasts
‎Show Risky Business News, Ep Risky Biz News: Tor launches new WebTunnel anti-censorship protocol - 12 Mar 2024
Apple Podcasts

The Tor Project has launched this week a new anti-censorship tool named  WebTunnel .

WebTunnel is a new type of  Tor bridge , a type of secret server that are not listed in Tor's public directory. 

Because they are not public, Tor bridges are typically used in oppressive countries to allow users to connect to the Tor network.

For the past two decades, Tor bridges have run the obfs3 and obfs4 protocol to encrypt traffic and hide it from firewalls and censors. While such an approach has worked, it was only a matter of time until censors would have caught up.

Developments in anti-Tor censorship technology have allowed some countries and private companies in recent years to achieve better results when scanning, detecting, and then blocking Tor bridges.

Tor's new WebTunnel technology takes a different approach, and instead of using its own distinct encryption pattern, it works by taking regular Tor traffic and attempting to disguise it as regular HTTPS traffic.

Tor developers say WebTunnel will make it harder for censors to detect users connecting to a Tor node because the connection will look like any other WebSocket-like HTTPS connection out there ( and there's a bunch of those ).

Developers are positive WebTunnel will work out in practice because of recent approaches to internet censorship across the globe, where countries are moving to a deny-all type of model.

Instead of trying to fingerprint suspicious traffic,  countries like China  are moving to a model where they block anything that does not look like regular internet traffic. Since Tor's obfs4 and  other anti-censorship protocols  are using their own schemes, the way forward is with projects like WebTunnel that go for hiding in plain sight.

"Right now, there are  60 WebTunnel bridges  hosted all over the world, and  more than 700 daily active users using WebTunnel  on different platforms. However, while WebTunnel works in regions like China and Russia, it does not currently work in some regions in Iran."

Breaches, hacks, and security incidents

France DDoS attacks:  French officials say DDoS attacks of an "unprecedented intensity" have targeted government websites over the past weekend. A pro-Kremlin hacktivist group named Anonymous Sudan took credit for the attacks in posts on Telegram. The same group also targeted government sites last week in Sweden, Denmark, and Israel. [ Additional coverage in  France 24 ]

Roku hacked accounts:  Streaming device maker Roku says that hackers gained access to  more than 15,000 user  accounts. The company says hackers broke into accounts where users had re-used passwords across multiple online profiles. Roku says that in some cases, the hackers attempted to purchase streaming hardware and streaming subscriptions from the compromised accounts.

Unizen crypto-heist:  Hackers have stolen  $2.1 million  worth of assets from cryptocurrency trading platform Unizen. The attackers are believed to have exploited a vulnerability in the company's smart contract. Unizen has sent a  blockchain message  to the hackers and offered a 20% white-hat bounty to the hackers. The company is willing to forget about the hack if the attackers return 80% of the stolen funds.

Unizen's white hat offer
Unizen's white hat offer

General tech and privacy

EU's use of M365:  The European Commission violated data protection rules in its use of Microsoft 365. The EU's data protection watchdog says EU bodies did not take protective measures to prevent the transfer of personal data outside the EU. The Data Protection Supervisor (EDPS) has  ordered  the European Commission to take corrective measures and become compliant by December 9 this year. EU officials must configure their Microsoft 365 systems to stop sending personal data to Microsoft and its affiliates in non-EU countries.

Microsoft CISPE complaint:  A trade group of cloud providers from Europe has  accused  Microsoft of unfair market practices. CISPE says Microsoft charges companies an extra 28% fee if they use Microsoft software on third-party cloud products. The group has threatened to file a complaint with the EU for anti-competitive practices.

Cloudflare Log Explorer:  Internet infrastructure company CloudFlare has released its Log Explorer service in  beta . It is one of the many services and features announced during the company's  Security Week  last week.

Airbnb bans indoor security cameras:  Airbnb has  banned  the use of indoor security cameras in listings globally. The ban applies to all rooms in an Airbnb rental. Previously, the platform allowed homeowners to have security cameras in common areas only. The ban also applies to cameras that are turned off but are located inside a property.

US car privacy:  Automakers are secretly collecting large quantities of data directly from customer cars as vehicle owners are avoiding installing car-related apps on their devices. According to a  New York Times  investigation, carmakers are selling this data to car insurers, which are then using it to calculate risk scores. Sold data includes all sorts of information except precise location data. This includes details such as trip lengths, hard braking, speeding habits, and other driving-related analytics.

PIGEON AI:  Something we missed last year was this new  academic paper  on PIGEON, an AI model that can pinpoint geo-locations based on images. The AI model was inspired by the popular GeoGuessr game.

Meta sues former exec:  Social media giant Meta has filed a lawsuit against a former executive for allegedly stealing private documents before leaving the company. Meta claims former vice-president T.S. Khuran moved employee pay docs and private contracts from Meta systems to his private email account before leaving the company. Khuran served as VP of Infrastructure at Meta for 12 years before moving to an unnamed AI cloud computing company. [ Additional coverage in  Bloomberg ]

Quantum-safe email:  Tuta has  enabled  quantum-safe encryption by default on all new Tuta Mail accounts.

Twitter losing bot fight:  Twitter's bot account problem is  getting   out   of   control .

Speedometer 3:   Mozilla ,  Google , and  Apple  have announced the release fo  Speedometer 3 , a universal browser benchmark tool.

Government, politics, and policy

Spyware proliferation:  US intelligence agencies have confirmed that 74 countries across the world have purchased and are using commercial spyware. In a  Senate hearing , US spy chiefs say spyware is increasingly being used to target dissidents and journalists. Officials also warned the US is struggling to counter ransomware attacks and the growing use of AI in influence operations. [ Additional coverage in  TechCrunch ]

AI crime prosecution:  The US Department of Justice  says  it will seek harsher sentences for individuals who use artificial intelligence to commit white-collar crimes. This includes using AI to commit fraud, price-fixing, and market manipulation. The sentencing guidelines will apply to both individual and corporate defendants alike.

US 2025 budget proposal:  A proposed US federal budget for fiscal year 2025 would see more than $13 billion allocated to cybersecurity projects, up from the $12.7 billion allocated in 2024. [ Additional coverage in  CyberScoop ]

Sponsor section

In this Risky Business News sponsored interview, Tom Uren talks to Derek Hanson, Yubico’s VP of Solutions Architecture and Alliances. Derek covers the different reasons organisations are investing in Passkeys, what organisations need to know to deploy them successfully, and warns that too often current deployments are too focused on authorisation rather than looking at the end user holistically.

‎Risky Business News: Sponsored: The Passkey juggernaut on Apple Podcasts
‎Show Risky Business News, Ep Sponsored: The Passkey juggernaut - 10 Mar 2024
Apple Podcasts

Cybercrime and threat intel

Threat/trend reports:  Some infosec reports covering industry threats and trends came out from  GitGuardian ,  Sophos ,  Symantec ,  IRONSCALES ,  Kaspersky , and the  ATOS Group .

2023's leaked secrets:  Developers have leaked more than 12 million secret tokens via GitHub commits last year. Almost one million of these secrets were Google API keys, according to DevSecOps company  GitGuardian . The company says that only 1.8% of the repo owners they contacted last year took steps to plug the leaks.

Muddled Libra:  Palo Alto Network has published an in-depth profile on  Muddled Libra , a threat actor that has been active since mid-2022 and joined the AlphV RaaS in 2023.

Meson attacker:  Cloud security firm Sysdig has detected a coordinated attack against the Meson blockchain. The company says a threat actor has flooded the blockchain with more than 6,000 nodes in an attempt to mint new Meson tokens. The Meson token is set to officially launch later this week, on March 15.  Sysdig says  the attacker has used compromised cloud accounts to deploy the nodes. At the current rate, the hacked accounts are set to rack up a bill of around $22,000/month for their legitimate owners.

ScamClub:  The ScamClub malvertising group  shifted operations  in February this year from using classic web ads to malicious video ads. The video ads work as the group's past web ads and redirect users to sophisticated financial scams. Ad security firm GeoEdge says that almost 90% of the group's malicious ads targeted mobile devices. The rest targeted desktops, consoles, and smart TVs.

ScamClub malicious video campaign

Crypto-phishing losses:  Cryptocurrency users have lost more than $100 million to phishing in the first two months of the year. Users lost  $58 million  in January and another  $46 million  in February. Attacks involved a new form of phishing kit named crypto-drainers that can hijack and automatically empty cryptocurrency wallets.

PyPI crypto-thefts:  ReversingLabs researchers  have found  seven Python packages on the official PyPI repository containing code to steal mnemonic phrases for cryptocurrency wallets. The campaign (named BIPClip) has been active for more than a year, with the oldest package dating back to December 2022. The packages posed as open-source libraries for working with mnemonic phrase formats.

Dark web market extorts its own users:  The administrator of the Incognito dark web marketplace is extorting the site's past users. Site admin Pharoah is demanding payments from $100 to $20,000 from the site's vendors and buyers. In a  message  posted on its frontpage, Pharoah mocked users for trusting the platform and threatened to publish chat logs and cryptocurrency transaction IDs. Such data would allow law enforcement to track down some of the site's vendors and buyers. The Incognito market was known for the sale of drugs, forged documents, and stolen data. The extortion comes after Pharoah exit-scammed last week and stole all user funds deposited on the platform. [ Additional coverage in  KrebsOnSecurity ]

Pharaoh's extortion message
Pharaoh's extortion message

Malware technical reports

PurpleFox:  Threat detection engineer Doomdesire has published a  blog post  on how to detect installations of the PurpleFox exploit kit.

Sponsor Section

YubiKeys slashes exposure to security breaches from phishing and credential thefts by 99.9% and reduces administrative overhead. Create your own customized Forrester Consulting Total Economic Impact™ study tailored for your organization here:  Yubi.co/TEI

APTs, cyber-espionage, and info-ops

i-SOON leak:  Hunt & Hackett looks at the leak from Chinese hacker-for-hire contractor i-SOON and its  possible ties  to at least three Chinese APTs—Poison Carp (also known as Evil Eye, Earth Empusa, EvilBamboo), Jackpot Panda, and APT41 (also known as Double Dragon, Wicked Panda, Bronze Atlas).

Dr.Web report:  Russian antivirus maker Dr.Web has published a  report  on a suspected APT report and its tooling in an attack that targeted a Russian mechanical engineering enterprise.

Vulnerabilities, security research, and bug bounty

Patch Tuesday:  Yesterday was the March 2024 Patch Tuesday. We had security updates from  Adobe ,  Microsoft ,  Cisco ,  SAP ,  QNAP ,  Zoom ,  AMD ,  Intel ,  Siemens , and  Schneider Electric . The  Android Project ,  Apple ,  Kubernetes ,  Drupal ,  VMWare ,  JetBrains ,  HikVision ,  Fortinet , and  Unbound  released security updates last week as well. This month, Microsoft patched 64 vulnerabilities, no zero-days.

TeamCity drama:  Software company JetBrains has  blamed  security firm Rapid7 for the recent wave of attacks on TeamCity servers. JetBrains says Rapid7's insistence on publishing details and a PoC for two TeamCity vulnerabilities has led to attacks on customer servers hours after a patch was out. JetBrains's accusation is the latest chapter in the drama between the two companies. Rapid7  accused   JetBrains last week of trying to bury news about the two security flaws by not telling customers the latest firmware update contained security fixes.

" We firmly believe that releasing the full technical details of a vulnerability and the exploit steps simultaneously with its fix is entirely unethical and harmful to our customers,  provided that enough details are made publicly available to allow customers to fully understand the risks and protect themselves against the vulnerability."

iwd vulnerability:  SPR researcher Alex Radocea has published  details  on CVE-2024-28084, a memory corruption vulnerability in the iNet Wireless Daemon (iwd) WiFi firmware.

MS Outlook RCE:  NetSPI researchers have published  details  on   CVE-2024-21378 , an RCE they found in the Microsoft Outlook client. The issue was fixed in February.

NextChat unpatched bug:  Horizon3 has  published details  about an unpatched SSRF vulnerability in NextChat, a generative AI chatbot widget. Researchers say they disclosed the vulnerability after the vendor failed to release a patch in almost three months. Tracked as CVE-2023-49785, the vulnerability can allow threat actors to read files on servers that run the NextChat widget. Horizon3 says the NextChat app is currently installed on more than 7,500 internet-connected servers.

Google bug bounty:  Google paid more than  $10 million  to security researchers last year for vulnerability reports across its products. The sum is down from the $12 million the company paid to researchers in 2022. The money went to 632 researchers, with the highest bounty last year being $113,337. More than $3.4 million was awarded for Android bugs and another $2.1 million for Chrome vulnerabilities.

Chart of yearly payouts for the Google VRP

Infosec industry

Symantec+Carbon Black:  Broadcom has  merged  Carbon Black into its Symantec cybersecurity division. The two brands will continue to operate separately. Broadcom acquired the Carbon Black Black last year as part of its $69 billion acquisition of VMware. The company initially planned to sell off Carbon Black. Broadcom previously acquired Symantec for $10.7 billion in August 2019.

Risky Business Podcasts

In this edition of Between Two Nerds, Tom Uren and The Grugq look at recent efforts to disrupt ransomware gangs and discuss what could make these efforts more effective.

Recent Newsletters

  • Risky Bulletin: Kaleidoscope ad fraud network infects 2.5mil new devices each month
  • Risky Bulletin: France says Russian influence operations are getting better, achieving results
  • It's Like Signal, but Dumb
  • Risky Bulletin: Microsoft joins industry crackdown on bulk email senders
  • Risky Bulletin: Six-years-old backdoor comes to life to hijack Magento stores

Recent Videos

  • Risky Business Weekly (790): Bye bye Signal-gate, hello TeleMessage-gate
  • BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs
  • PRODUCT DEMO: Dropzone, the AI SOC analyst
  • Between Two Nerds: How hacking tools evolve
  • Srsly Risky Biz: Security vendors are constantly attacked

Recent Podcasts

  • Risky Bulletin: Kaleidoscope ad fraud network infects 2.5m devices a month
  • Sponsored: What really goes down on Blackhat wifi networks
  • Risky Bulletin: France says Russia's influence operations are achieving results
  • Wide World of Cyber: How state adversaries attack security vendors
  • Srsly Risky Biz: US Cyber Command to be unleashed
Risky Business Media

Risky Business

  • Home
  • Podcasts
  • Newsletter
  • Video
  • Sitemap

Risky Business Media

  • About
  • People
  • Advertising
  • Sponsor Enquiries: sales@risky.biz

Risky Connections

  • Risky Business on Apple Podcasts
  • Risky Business on Spotify
  • Risky Bulletin on Apple Podcasts
  • Risky Bulletin on Spotify
  • YouTube
  • LinkedIn

Risky Contacts

Risky Business Media Pty Ltd
PO Box 774
Byron Bay NSW 2481
General Email: editorial@risky.biz

© Risky Business Media 2007–2025. All rights reserved.
ABN 73 618 465 517