Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

DNS Data Can Help Attackers Deanonymize Tor Users

Researchers have disclosed a theoretical attack scenario that could allow global or semi-global adversaries to leverage Domain Name System (DNS) traffic to deanonymize Tor users.

Researchers have disclosed a theoretical attack scenario that could allow global or semi-global adversaries to leverage Domain Name System (DNS) traffic to deanonymize Tor users.

The web traffic of nearly 2 million users who want to remain anonymous passes through the Tor network’s roughly 7,000 relays each day. While Tor is generally efficient in protecting an individual’s privacy, experts have identified some theoretical and practical attack methods that could expose users.

One practical attack method, which led to the identification of many alleged criminals that had used the Tor network, involved setting up many new relays. Other attack methods, which are more difficult to carry out on a large scale, involve global adversaries that have the ability to monitor the traffic that enters and exits the Tor network, which enables them to link individual users to the websites they visit.

Studies on these so-called correlation attacks have focused on observing TCP flows, including HTTP requests, BitTorrent connections and IRC sessions. However, a group of researchers from the KTH Royal Institute of Technology, Karlstad University and Princeton University have demonstrated that these types of attacks can be made even more efficient by using DNS.

The new attack method, dubbed “DefecTor,” relies on DNS traffic to improve precision. According to researchers, attackers can use a combination of DNS monitoring and known website fingerprinting techniques to launch more efficient correlation attacks.

These DNS-based attacks require a global or semi-global adversary that is capable of observing traffic entering and exiting the Tor network. One such entity is Google, which at one point handled more than 40 percent of all DNS requests exiting the Tor network. Google can also monitor some traffic entering the anonymity network via its Fiber service, and guard relays occasionally run in the company’s cloud. Researchers noted that Internet companies OVH and OpenDNS also have some visibility, but they cannot compare to Google.

Experiments have shown that DefecTor attacks are most efficient against websites that are infrequently visited via Tor. This can include censored websites and sites dedicated to activists and whistleblowers, which are typically accessed by users in most need of protection.

The DefecTor attack method does not pose an immediate threat and the Tor Project is already working on making website fingerprinting attacks more difficult to carry out. However, exit relay operators could mitigate such attacks by avoiding the use of public DNS resolvers, such as the ones provided by Google and OpenDNS, and instead rely on the resolvers provided by their Internet service provider (ISP) or run their own resolvers.

Advertisement. Scroll to continue reading.

“Website fingerprinting attacks have long been a concern for the Tor network. The attacks that we present in this paper show that, when incorporating DNS query traffic, these attacks become even more accurate and powerful. We hope these findings underscore the urgency of eventually deploying strong defenses against fingerprinting attacks on the Tor network,” researchers said in their paper.

Related: Firefox, Tor Browser Vulnerable to Malicious Add-on Attacks

Related: Many Tor Relays Found Snooping on Dark Web Services

Related: Tor Rival Riffle Promises Anonymity Improvements

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.