• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

    eufy Solo IndoorCam C24  (2K, 2-Cam Kit, Plug-in) for $75
  • eufyCam 2 Pro Add-on Camera for $169

    eufyCam 2 Pro Add-on Camera for $169
  • KyotoUI Pro Version: Lifetime License for $49

    KyotoUI Pro Version: Lifetime License for $49
  • Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228

    Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228
  • Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

    Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Why you shouldn’t download programs from YouTube links

Oct 29, 2022 by iHash Leave a Comment


Earlier this month, Kaspersky experts published a detailed report on a threat they’ve called OnionPoison. They discovered malicious code being distributed through YouTube video. The video advertised using Tor Browser for private browsing.

This browser is a modified version of the Firefox browser — with maximum privacy settings. But its most important feature is that it can redirect all user data through The Onion Router (hence the name Tor) network. Data is transmitted in encrypted form through several layers of server (hence the onion in the name), where it’s mixed with data of other users of the network. This method ensures privacy: websites see only the address of the last server in the Tor network — the so-called exit node — and cannot see the user’s real IP address.

But that’s not all. The Tor network can also be used to bypass restricted access to certain sites. For example, in China, many “Western” internet resources are blocked, so users turn to solutions such as Tor to access them. Incidentally, YouTube is also officially unavailable in China, so, by definition, the video is aimed at those looking for ways to get round the restrictions. It’s likely that this was by no means the only method of distributing the OnionPoison malware, and that other links were placed on resources inside China.

Normally, a user can download Tor Browser from the project’s official website. However, this site is also blocked in China, so there’s nothing unusual about people seeking alternative download sources. The YouTube video itself explains how to hide online activity using Tor, and a link is given in the description. It points to a Chinese cloud file-hosting service. Unfortunately, the version of Tor Browser located there is infected with OnionPoison spyware. So, instead of privacy, the user gets the exact opposite: all their data is revealed.

Screenshot of a YouTube video distributing Tor Browser infected with OnionPoison spyware

Screenshot of a YouTube video advertising a malicious version of Tor Browser. Source

What the infected Tor Browser knows about the user

The infected version of Tor Browser lacks a digital signature, which should be a big red flag for the security-minded user. On installing such a program, the Windows operating system displays a warning regarding this. Naturally, the official version of Tor Browser has a digital signature. The distribution contents in the infected package, however, differ very little from the original. But the minor differences are important.

For starters, in the infected browser, some important settings have been changed when compared with the original Tor Browser. Unlike the real one, the malicious version remembers the browser history, stores temporary copies of sites on the computer, and automatically saves login credentials and all data entered into forms. Such settings already cause enough damage to privacy as it is, but it only gets worse…

Download page of Tor Browser infected with OnionPoison spyware

Download page of Tor Browser infected with OnionPoison spyware. Source

One of the key Tor/Firefox libraries was replaced with malicious code. This calls the original library, as required, to keep the browser working. And at startup it also addresses the C2 server, from where it downloads and runs another malicious program. What’s more, this next stage of the attack on the user occurs only if their real IP address points to a location in China.

This “second stage” of the attack furnishes the attack organizers with as much detailed information about the user as possible, in particular:

  • Data about their computer and installed programs.
  • Their browsing history — not only in Tor Browser, but also in other browsers installed in the system, such as Google Chrome and Microsoft Edge.
  • The IDs of Wi-Fi networks they connect to.
  • And lastly, account data in the popular Chinese messengers QQ and WeChat.

Such details can be used to associate any online activity with a specific user. Wi-Fi network data can even allow their location to be established rather accurately.

Privacy risks

OnionPoison is so named because it essentially destroys the privacy provided by The Onion Router software. The consequences are obvious: all attempts to hide your online activity will, on the contrary, reveal it to the attackers. Curiously, unlike most malware of this kind, OnionPoison doesn’t bother stealing user passwords. The organizers clearly have no need for them: the sole purpose of the attack is surveillance.

Even if you don’t have to use Tor Browser to protect your privacy (in most cases, a regular VPN app will suffice), the OnionPoison study offers two useful lessons in safeguarding against malicious activity. First, only download software from official sites. For those who want additional verification, many software developers publish so-called checksums. This is a kind of ID of the “real” program installer. You can calculate the checksum for the distribution you downloaded to make sure it matches the original.

In the case of OnionPoison, users had to download Tor Browser from unofficial sources anyway as the official site was blocked. In such situations, checksum verification is very useful. But, as we mentioned above, the distribution had another red flag: its lack of a legitimate digital signature. If Windows displays such a warning, better to double-check everything before running the program. Or just don’t run it at all.

The site hosted on the OnionPoison command-and-control server is visually identical to the real www.torproject.org

The site hosted on the OnionPoison command-and-control server is visually identical to the real www.torproject.org. Source

Now for the second lesson, which stems from the first. Never download programs from YouTube links! You might argue that OnionPoison poses a threat only to folks in China, and those in other countries seem unaffected. But in fact, this isn’t the only attack that uses social networks as bait to hook gullible users. Another recent Kaspersky report showed how cybercriminals infect gamers’ devices and steal their data. The attackers in this case also distributed malware through YouTube. What’s more, the malware compromised the victim’s own YouTube channel, posting there the same video with a malicious link.

YouTube-based attacks are partly helped by Google’s prioritization of videos in search results. Attacks of this kind are another example of how ordinary, seemingly safe resources can be misused. Even an experienced user can’t always distinguish a real link from a malicious one. Such “inconveniences” of digital life are the best possible argument for installing a high-quality security solution. Even if your natural online caution fails you, security software will identify and block the threat in good time.





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: download, links, programs, shouldnt, youtube

Special Offers

  • eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

    eufy Solo IndoorCam C24  (2K, 2-Cam Kit, Plug-in) for $75
  • eufyCam 2 Pro Add-on Camera for $169

    eufyCam 2 Pro Add-on Camera for $169
  • KyotoUI Pro Version: Lifetime License for $49

    KyotoUI Pro Version: Lifetime License for $49
  • Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228

    Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228
  • Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

    Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

Jan 28, 2023 By iHash

eufyCam 2 Pro Add-on Camera for $169

Jan 28, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

Jan 28, 2023Ravie LakshmananServer Security / DNS The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could lead to a denial-of-service (DoS) condition. “A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions and […]

The Nominees for the 2023 Cybersecurity Defender of the Year Award in EMEA

The Nominees for the 2023 Cybersecurity Defender of the Year Award in EMEA

Cybersecurity professionals are often perceived as sole practitioners, plying their craft in dimly lit rooms. Nothing could be further from the truth, as one of the keys to being a successful cybersecurity professional is the ability to collaborate and, more importantly, to share knowledge as far and wide as possible. At Cisco, we have formed […]

KyotoUI Pro Version: Lifetime License for $49

Expires January 25, 2123 23:59 PST Buy now and get 50% off KEY FEATURES The KyotoUI Kit was developed with the goal of supporting any web project, resulting in the creation of a block system that supports all use cases. KyotoUI has everything you need in a single file to build modern and simple interfaces. […]

Apple iPad mini 4, 64GB (Refurbished: Wi-Fi Only) for $193

Expires January 27, 2123 23:59 PST Buy now and get 11% off KEY FEATURES Put the power of a PC in the palm of your hand with the Apple iPad Mini 4 Tablet. With iOS 9 and Apple A8 chip in 1.5 GHz processing speeds, this tablet has the power to handle just about any […]

eufy Security SoloCam L40 for $169

Expires January 04, 2123 21:35 PST Buy now and get 0% off KEY FEATURES Capture Every Detail: Clarity is key when it comes to keeping watch over your home. See exactly whats happening in crisp 2K high-definition video. Security That Shines: As soon as the ultra-sensitive motion detector is triggered, the 600-lumen spotlight lights up […]

Introducing approximate nearest neighbor search in Elasticsearch 8.0

Elastic Stack 8.6.1 released | Elastic Blog

Elastic Stack 8.6.1 released English简体中文한국어日本語FrançaisDeutschEspañolPortuguês Version 8.6.1 of the Elastic Stack was released today. We recommend you upgrade to this latest version over the 8.6.0 minor release. The 8.6.1 release addresses a recent Elastic Cloud issue where a rolling restart would fail for some users. For details of the issues that have been fixed and […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT