{"id":20298,"date":"2022-10-28T12:39:04","date_gmt":"2022-10-28T16:39:04","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/onionpoison-infected-tor-browser\/20298\/"},"modified":"2022-10-31T19:58:11","modified_gmt":"2022-10-31T15:58:11","slug":"onionpoison-infected-tor-browser","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/onionpoison-infected-tor-browser\/20298\/","title":{"rendered":"Never download software from YouTube links"},"content":{"rendered":"<p>Earlier this month, Kaspersky experts published a detailed <a href=\"https:\/\/securelist.com\/onionpoison-infected-tor-browser-installer-youtube\/107627\/\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> on a threat they\u2019ve called OnionPoison. They discovered malicious code being distributed through YouTube video. The video advertised using <a href=\"https:\/\/www.torproject.org\/download\/\" target=\"_blank\" rel=\"nofollow noopener\">Tor Browser<\/a> for private browsing.<\/p>\n<p>This browser is a modified version of the Firefox browser \u2014 with maximum privacy settings. But its most important feature is that it can redirect all user data through The Onion Router (hence the name Tor) network. Data is transmitted in encrypted form through several layers of server (hence the onion in the name), where it\u2019s mixed with data of other users of the network. This method ensures privacy: websites see only the address of the last server in the Tor network \u2014 the so-called exit node \u2014 and cannot see the user\u2019s real IP address.<\/p>\n<p>But that\u2019s not all. The Tor network can also be used to bypass restricted access to certain sites. For example, in China, many \u201cWestern\u201d internet resources are blocked, so users turn to solutions such as Tor to access them. Incidentally, YouTube is also officially unavailable in China, so, by definition, the video is aimed at those looking for ways to get round the restrictions. It\u2019s likely that this was by no means the only method of distributing the OnionPoison malware, and that other links were placed on resources inside China.<\/p>\n<p>Normally, a user can download Tor Browser from the project\u2019s official website. However, this site is also blocked in China, so there\u2019s nothing unusual about people seeking alternative download sources. The YouTube video itself explains how to hide online activity using Tor, and a link is given in the description. It points to a Chinese cloud file-hosting service. Unfortunately, the version of Tor Browser located there is infected with OnionPoison spyware. So, instead of privacy, the user gets the exact opposite: all their data is revealed.<\/p>\n<div id=\"attachment_45990\" style=\"width: 1207px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/10\/28204027\/onionpoison-infected-tor-browser-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45990\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/10\/28204027\/onionpoison-infected-tor-browser-1.png\" alt=\"Screenshot of a YouTube video distributing Tor Browser infected with OnionPoison spyware\" width=\"1197\" height=\"817\" class=\"size-full wp-image-45990\"><\/a><p id=\"caption-attachment-45990\" class=\"wp-caption-text\">Screenshot of a YouTube video advertising a malicious version of Tor Browser. <a href=\"https:\/\/securelist.com\/onionpoison-infected-tor-browser-installer-youtube\/107627\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p><\/div>\n<h2>What the infected Tor Browser knows about the user<\/h2>\n<p>\nThe infected version of Tor Browser lacks a digital signature, which should be a big red flag for the security-minded user. On installing such a program, the Windows operating system displays a warning regarding this. Naturally, the official version of Tor Browser has a digital signature. The distribution contents in the infected package, however, differ very little from the original. But the minor differences are important.<\/p>\n<p>For starters, in the infected browser, some important settings have been changed when compared with the original Tor Browser. Unlike the real one, the malicious version remembers the browser history, stores temporary copies of sites on the computer, and automatically saves login credentials and all data entered into forms. Such settings already cause enough damage to privacy as it is, but it only gets worse\u2026<\/p>\n<div id=\"attachment_45989\" style=\"width: 547px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/10\/28204036\/onionpoison-infected-tor-browser-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45989\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/10\/28204036\/onionpoison-infected-tor-browser-2.png\" alt=\"Download page of Tor Browser infected with OnionPoison spyware\" width=\"537\" height=\"368\" class=\"size-full wp-image-45989\"><\/a><p id=\"caption-attachment-45989\" class=\"wp-caption-text\">Download page of Tor Browser infected with OnionPoison spyware. <a href=\"https:\/\/securelist.com\/onionpoison-infected-tor-browser-installer-youtube\/107627\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p><\/div>\n<p>One of the key Tor\/Firefox libraries was replaced with malicious code. This calls the original library, as required, to keep the browser working. And at startup it also addresses the C2 server, from where it downloads and runs another malicious program. What\u2019s more, this next stage of the attack on the user occurs only if their real IP address points to a location in China.<\/p>\n<p>This \u201csecond stage\u201d of the attack furnishes the attack organizers with as much detailed information about the user as possible, in particular:<\/p>\n<ul>\n<li>Data about their computer and installed programs.<\/li>\n<li>Their browsing history \u2014 not only in Tor Browser, but also in other browsers installed in the system, such as Google Chrome and Microsoft Edge.<\/li>\n<li>The IDs of Wi-Fi networks they connect to.<\/li>\n<li>And lastly, account data in the popular Chinese messengers QQ and WeChat.<\/li>\n<\/ul>\n<p>Such details can be used to associate any online activity with a specific user. Wi-Fi network data can even allow their location to be established rather accurately.<\/p>\n<h2>Privacy risks<\/h2>\n<p>\nOnionPoison is so named because it essentially destroys the privacy provided by The Onion Router software. The consequences are obvious: all attempts to hide your online activity will, on the contrary, reveal it to the attackers. Curiously, unlike most malware of this kind, OnionPoison doesn\u2019t bother stealing user passwords. The organizers clearly have no need for them: the sole purpose of the attack is surveillance.<\/p>\n<p>Even if you don\u2019t have to use Tor Browser to protect your privacy (in most cases, a regular VPN app will suffice), the OnionPoison study offers two useful lessons in safeguarding against malicious activity. First, only download software from official sites. For those who want additional verification, many software developers publish so-called checksums. This is a kind of ID of the \u201creal\u201d program installer. You can calculate the checksum for the distribution you downloaded to make sure it matches the original.<\/p>\n<p>In the case of OnionPoison, users had to download Tor Browser from unofficial sources anyway as the official site was blocked. In such situations, checksum verification is very useful. But, as we mentioned above, the distribution had another red flag: its lack of a legitimate digital signature. If Windows displays such a warning, better to double-check everything before running the program. Or just don\u2019t run it at all.<\/p>\n<div id=\"attachment_45988\" style=\"width: 1678px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/10\/28204039\/onionpoison-infected-tor-browser-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45988\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/10\/28204039\/onionpoison-infected-tor-browser-3.png\" alt=\"The site hosted on the OnionPoison command-and-control server is visually identical to the real www.torproject.org\" width=\"1668\" height=\"685\" class=\"size-full wp-image-45988\"><\/a><p id=\"caption-attachment-45988\" class=\"wp-caption-text\">The site hosted on the OnionPoison command-and-control server is visually identical to the real www.torproject.org. <a href=\"https:\/\/securelist.com\/onionpoison-infected-tor-browser-installer-youtube\/107627\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p><\/div>\n<p>Now for the second lesson, which stems from the first. Never download programs from YouTube links! You might argue that OnionPoison poses a threat only to folks in China, and those in other countries seem unaffected. But in fact, this isn\u2019t the only attack that uses social networks as bait to hook gullible users. Another recent Kaspersky report <a href=\"https:\/\/www.kaspersky.com\/blog\/redline-stealer-self-propagates-on-youtube\/45528\/\" target=\"_blank\" rel=\"noopener nofollow\">showed<\/a> how cybercriminals infect gamers\u2019 devices and steal their data. The attackers in this case also distributed malware through YouTube. What\u2019s more, the malware compromised the victim\u2019s own YouTube channel, posting there the same video with a malicious link.<\/p>\n<p>YouTube-based attacks are partly helped by Google\u2019s prioritization of videos in search results. Attacks of this kind are another example of how ordinary, seemingly safe resources can be misused. Even an experienced user can\u2019t always distinguish a real link from a malicious one. Such \u201cinconveniences\u201d of digital life are the best possible argument for installing a high-quality security solution. Even if your natural online caution fails you, <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">security software<\/a> will identify and block the threat in good time.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Seriously, don\u2019t do it. A Kaspersky study of malware spreading in China shows why it\u2019s always a bad idea.<\/p>\n","protected":false},"author":665,"featured_media":20300,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[682,738,531,692,1663],"class_list":{"0":"post-20298","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-spyware","9":"tag-surveillance","10":"tag-tor","11":"tag-trojans","12":"tag-youtube"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/onionpoison-infected-tor-browser\/20298\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/onionpoison-infected-tor-browser\/24820\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/onionpoison-infected-tor-browser\/10240\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/onionpoison-infected-tor-browser\/27345\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/onionpoison-infected-tor-browser\/25158\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/onionpoison-infected-tor-browser\/25495\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/onionpoison-infected-tor-browser\/28049\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/onionpoison-infected-tor-browser\/27355\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/onionpoison-infected-tor-browser\/34179\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/onionpoison-infected-tor-browser\/45979\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/onionpoison-infected-tor-browser\/19695\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/onionpoison-infected-tor-browser\/20300\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/onionpoison-infected-tor-browser\/29464\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/onionpoison-infected-tor-browser\/32829\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/onionpoison-infected-tor-browser\/28622\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/onionpoison-infected-tor-browser\/25562\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/onionpoison-infected-tor-browser\/31205\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/onionpoison-infected-tor-browser\/30913\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/trojans\/","name":"trojans"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20298"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20298\/revisions"}],"predecessor-version":[{"id":20303,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20298\/revisions\/20303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20300"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}