Anonymity network hacked with sophisticated traffic correlation technique Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project’s director, Roger Dingledine.Dingledine said that it’s possible the attack wasn’t carried out with malicious intent, although the effect is harmful in any case, potentially weakening Tor’s encryption and making it more vulnerable to a state actor attempting to compromise it.+MORE ON NETWORK WORLD: Superclass: 14 of the world’s best living programmers | Zero-day flaws found in Symantec’s Endpoint Protection +“If the attack was a research project, it was deployed in an irresponsible way because it puts users at risk indefinitely into the future,” he said, suggesting that the researchers behind a recently-cancelled talk scheduled for Black Hat 2014 may be behind the attack. “In fact, we hope they were the ones doing the attacks, since otherwise it means somebody else was,” Dingledine wrote.The researchers in question are part of a team at Carnegie Mellon University that “works closely with the Department of Homeland Security,” according to a Washington Post report by Andrea Peterson from last week on the cancellation of the Black Hat talk. *Tor operates as a large-scale proxy network, encrypting and routing web communications through a series of randomized hosts around the world to protect the identities of users and obfuscate their activities from surveillance. Tor also provides the option of so-called hidden services, which uses servers configured to only accept incoming connections from the Tor network, allowing for secure email and the like.Tor is reliant on volunteers to host relay nodes, allowing anyone to sign up and turn their computer into a part of the network. The attackers took advantage of this facet of Tor, adding relays running malicious software to the system, specifically targeting hidden services. Malicious relays sent specially encoded extra data in signal headers, allowing other attacking nodes to identify which users were requesting which hidden service.It’s a type of traffic correlation attack, according to Tor – the principle is to modify the message sent into the system and watch for a message with that modification coming out the other end. It’s a bit more sophisticated than previous attempts, however, which targeted application-level payloads, rather than headers.“Those attacks don’t work in the other direction (from the exit relay back towards the client), because the payload is still encrypted at the entry guard,” Dingledine wrote. “But because this new approach modifies (‘tags’) the cell headers rather than the payload, every relay in the path can see the tag.”The Tor project has since removed the offending nodes, and pushed a software update that prevents the specific type of attack used from functioning. The principle, however, remains intact, and Dingledine warned that similar techniques are likely viable. “So the good news is traffic confirmation attacks aren’t new or surprising,” he said. “But the bad news is that they still work.” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe