{"id":175709,"date":"2017-02-07T07:51:02","date_gmt":"2017-02-07T12:51:02","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/infected-drm-files-can-reveal-tor-data-security-intelligence-security-intelligence-blog\/"},"modified":"2017-02-07T07:51:02","modified_gmt":"2017-02-07T12:51:02","slug":"infected-drm-files-can-reveal-tor-data-security-intelligence-security-intelligence-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/infected-drm-files-can-reveal-tor-data-security-intelligence-security-intelligence-blog\/","title":{"rendered":"Infected DRM Files Can Reveal Tor Data &#8211; Security Intelligence &#8211; Security Intelligence (blog)"},"content":{"rendered":"<p><p>    Cybercriminals have been using digital rights management (DRM)    files in Windows to transport malware for a while. Social    engineering was often an integral part of this process since    any attempt to open these files in Windows Media Player (WMP)    would then generate a pop-up that redirected the targets    default browser to an attacker-controlled website. That website    was the beginning of an infection.  <\/p>\n<p>    Now, attackers are using this process for more than just    malware. Researchers recently found that the Tor browser and    privacy controls can be affected by a malicious DRM file.  <\/p>\n<p>    Malicious DRM files work by causing Windows Media Player (WMP)    to generate a pop-up requesting permission to redirect the    default browser to the content providers website to find out    how to obtain the necessary play rights,     Hacker House reported. Once a user agrees, he or she is    sent to a malware-laden page and the infection process begins.    However, this only happens when users attempt to open    unlicensed files.  <\/p>\n<p>    But now, cybercriminals have devised a way for a file with a    proper DRM license to redirect the browser without so much as a    prompt. Not only could this lead to malware, but it could also    contribute to a massive loss of privacy for certain users.  <\/p>\n<p>        Bleeping Computer, reporting on the Hacker House findings,    noted that these DRM files can cause problems when opened in    the privacy-enhanced Tor browser. Attackers can capture    victims credentials surreptitiously by using cryptographically    signed DRM files.  <\/p>\n<p>    The attackers website appears legitimate to detract attention    from the fraudulent URL. Users who interact with the site risk    revealing their IP addresses or other credentials through    normal system calls. For Tor users, many of whom are using the    browser specifically to hide these details, this is a worst    case scenario.  <\/p>\n<p>    Hacker House posted a short video that showed how the malware    operators can extract a victims IP with a single click. Its    easy to see how a malicious, signed DRM file might also    silently ping an attacker-controlled URL to report a victims    status and location.  <\/p>\n<p>    Since the DRM signing process can cost around $10,000, only    cybercriminals with deep pockets can fund such a scheme. Those    who can afford it, however, have a significant advantage when    it comes to spreading malware.  <\/p>\n<p>    This social engineering scheme is sneaky enough to fool even    security-savvy Tor users. To be safe, everyone should avoid all    unknown DRM files, no matter how enticing the title may be.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securityintelligence.com\/news\/infected-drm-files-can-reveal-tor-data\/\" title=\"Infected DRM Files Can Reveal Tor Data - Security Intelligence - Security Intelligence (blog)\">Infected DRM Files Can Reveal Tor Data - Security Intelligence - Security Intelligence (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cybercriminals have been using digital rights management (DRM) files in Windows to transport malware for a while.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/infected-drm-files-can-reveal-tor-data-security-intelligence-security-intelligence-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-175709","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/175709"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=175709"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/175709\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=175709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=175709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=175709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}