Trojan talks over Tor

By

Malware traffic gets anonymised, encrypted.

A trojan horse has used the Tor anonymity network to communicate with command and control servers, researchers found.

Trojan talks over Tor

The Tor communication capability was an addon function to the Bifrost backdoor trojan that allowed the malware to send stolen user data over the encrypted proxy network.

It was believed to be the first instance of malware using Tor, and while development of the Trojan appears to have stopped, researchers say use of the anonymised network was a useful concept.

The Bifrost trojan targeted all Windows operating systems. It established links to command and control servers, once it had infected a host, by launching the Internet Explorer web browser and injecting into its address space.

Compromised machines then remained under the control of remote attackers over the Tor connection.

It specifically used Tor's server-side location-hidden services function that removed the risk of eavesdropping on the network's exit nodes.

Hidden services were hosted on user computers and used internal pseudodomains that could only be routed within the Tor network.

Credit: Symantec

 

Bifrost's use of Tor to route traffic was a "novel idea", Symantec security response engineer Cathal Mullaney said.

It "adds an extra layer of stealth and security to the trojan," Mullaney said. 

"This type of behavior is very useful from a trojan’s perspective as it provides a secure communication method while keeping the remote server anonymous."

Stolen data traversing was further protected by multi-layer encryption used in the Tor network.

"This increases the difficulty of analysing the communications between the compromised computer and the remote server."

Use of Tor also hindered attempts to block Bifrost connections at firewall level because, Mullaney said, it does not use "unusual" remote ports.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Ex-student charged over Western Sydney University cyberattacks

Ex-student charged over Western Sydney University cyberattacks

SA Water plans 'once-in-a-generation' core technology uplift

SA Water plans 'once-in-a-generation' core technology uplift

WhatsApp banned on US House of Representatives devices

WhatsApp banned on US House of Representatives devices

Victoria's first government tech chief steps down

Victoria's first government tech chief steps down

Log In

  |  Forgot your password?