Windows DRM: Now An (Unwitting) Ally In Efforts To Expose Anonymous Tor Users
from the press-'play'-to-decloak dept
In case you were wondering what other misery DRM could contribute to, Hacker House security researchers have an answer for you:
HackerHouse have been investigating social engineering attacks performed with Digital Rights Management (DRM) protected media content. Attackers have been performing these attacks in the wild to spread fake codec installers since Microsoft introduced DRM to it’s proprietary media formats.
Improperly-licensed media files will produce a pop-up, asking the user if they want to visit the originating site to obtain the rights to play the file. This popup also warns users that this is great way to pick up malware if they’re not careful. In these cases, computer users will likely be deterred from following through on the risky click.
But that only happens if it’s not licensed properly. If it is — an expensive process that runs about $10,000 — then no warning appears, leaving users open to attack by malicious fake codec installers. What would be the point of these fake installers? One possible use for the exploitation of Windows DRM is the exposure of Tor users’ information.
As these “signed WMV” files do not present any alert to a user before opening them they can be used quite effectively to decloak users of the popular privacy tool TorBrowser with very little warning. For such an attack to work your target candidate must be running TorBrowser on Windows. When opening/downloading files, TorBrowser does warn you that 3rd party files can expose your IP address and should be accessed in tails.
The $10k price tag for proper licensing is a deterrent to small-time malware purveyors. But it would only be a drop in the bucket for a well-funded government agency and/or any NGOs they employ. It’s basically the Network Investigative Technique the FBI deployed in the Playpen cases — only one able to be buried inside media files which could be scattered around like mini-honeypots.
The DRM-based attack certainly wouldn’t be limited to law enforcement agencies. It would also be deployed by spy agencies for use against terrorists (who love to share media files) and, unfortunately, by governments every bit as malicious as the software they’re deploying. The exploit could just as easily be deployed to target dissidents, journalists, and other “enemies of the state” through booby-trapped, DRM-laden files that strip away anonymity while delivering information these entities might find intriguing/useful.
Underneath it all is Microsoft’s apparently misplaced faith in properly-signed media files put together with its development kits. Rather than warn users that the redirect to the codec installer may still be risky despite the proper signature, Windows will automatically open a new browser instance and download the file with no further user interaction.
Here’s Hacker House’s explanation of the whole process: