{"id":175308,"date":"2017-02-06T14:53:32","date_gmt":"2017-02-06T19:53:32","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/windows-drm-files-deanonymize-tor-browser-users-virus-guides-virus-guides-blog\/"},"modified":"2017-02-06T14:53:32","modified_gmt":"2017-02-06T19:53:32","slug":"windows-drm-files-deanonymize-tor-browser-users-virus-guides-virus-guides-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/windows-drm-files-deanonymize-tor-browser-users-virus-guides-virus-guides-blog\/","title":{"rendered":"Windows DRM Files Deanonymize Tor Browser Users &#8211; Virus Guides &#8211; Virus Guides (blog)"},"content":{"rendered":"<p><p>    The Hacker House security experts have warned that downloading    and opening Windows DRM-protected files can decloak Tor Browser    users and reveal their IP addresses.  <\/p>\n<p>    The attacks via DRM-protected multimedia files in Windows have    been known for more than 10 years, though until recently,    theyve only been used to spread malware.  <\/p>\n<p>    Some of the previous attacks tried to make users open and play    DRM-protected files. Usually, these files would open in Windows    Media Player, and users would see a popup that asked them to    visit a URL to validate the files license.  <\/p>\n<p>    PC users who agreed were transferred to an authorization URL.    However, what users dont know is that hackers could modify    these links and point victims to exploit kits or malware-laced    files.  <\/p>\n<p>    The Hacker House team has found that the pop up asking users if    they wanted to visit the authorization URL would only appear    for DRM files which have not been signed with the proper tools.  <\/p>\n<p>    In case the attacker signed the DRM-protected multimedia files    with an official Microsoft SDKs such as Windows Media Encoder    or Microsoft Expression Encoder, the popup would not show, and    the users player would automatically open an Internet Explorer    instance and access the authorization URL.  <\/p>\n<p>    According to the Hacker House security experts, the cost of    properly signing DRM multimedia files ranges around $10,000, a    sum that many low-end malware authors arent willing to pay for    such a niche attack.  <\/p>\n<p>    Nevertheless, the same thing doesnt relate to determined    state-sponsored hackers or law enforcement agencies, who have    the financial and physical resources to support such an attack    infrastructure.  <\/p>\n<p>    For example, law enforcement could host properly signed    DRM-protected files on websites pretending to host child    pornography. When a user would try to view the file, the DRM    multimedia file would use Internet Explorer to ping a server    belonging to the law enforcement agency.  <\/p>\n<p>    Also, this tactic can be used to target ISIS militants trying    to view propaganda videos, illegal drug and weapons buyers    trying to view video product demos, political dissidents    viewing news videos, etc.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/virusguides.com\/windows-drm-files-deanonymize-tor-browser-users\/\" title=\"Windows DRM Files Deanonymize Tor Browser Users - Virus Guides - Virus Guides (blog)\">Windows DRM Files Deanonymize Tor Browser Users - Virus Guides - Virus Guides (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Hacker House security experts have warned that downloading and opening Windows DRM-protected files can decloak Tor Browser users and reveal their IP addresses. The attacks via DRM-protected multimedia files in Windows have been known for more than 10 years, though until recently, theyve only been used to spread malware <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/windows-drm-files-deanonymize-tor-browser-users-virus-guides-virus-guides-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-175308","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/175308"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=175308"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/175308\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=175308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=175308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=175308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}