TorMoil vulnerability reveals true IP from Tor Browser
Tor Project has released a security patch for Tor browser on Mac and Linux to patch the vulnerability of revealing users' true IP address.
This vulnerability was researched by Filippo Cavallarin, CEO of We Are Segment, an Italian company specializing in network security and hacking white hats.
The vulnerability he called TorMoil and reported separately to the Tor Project last week. The Tor Project developers worked with Firefox's team (Tor Browser was built based on Firefox) to provide a fix.
See also: Firefox brings the same security features as the Tor browser
Today, Tor released version 7.0.9 that patched this vulnerability. Tor Browser 7.0.9 is only available on Mac and Linux. Windows users are not affected.
Leaking IP address due to 'file: //' links
According to Cavallarin, this is actually a Firefox bug in the way the browser handles the file: // URLs, though there is no problem with Firefox, are a disaster for Tor.
The IP address may be exposed even after using Tor Browser
'Once the Tor Browser user goes to the website, the operating system can connect directly to the remote host and not through Tor Browser'. That way, Tor will not go through the switch relay and expose the real IP address.
TorMoil has not been exploited yet
'We still haven't seen this vulnerability exploited in practice,' said Tor Project. But an attacker can use reverse engineering and delete the patched code. A good programmer can easily understand how the bug works and exploit it.
Developers also said the patch to fix IP leaks is just a temporary solution, to help prevent IP leaks as quickly as possible, the file: // URL function may not work in some cases. . According to Tor developers, users can open the file: // URL by dragging and dropping the link to the new tab.
You should read it
- Anonymous browsing: can protect your privacy
- Veil: anonymous browser deletes all traces, safer than Tor
- How to delete browsing traces on Mac
- How to save web browsing history when browsing in incognito mode on Chrome browser
- The fake IP method helps you access anonymously
- How to browse common mode and anonymously with a window on Firefox
- How to make the browser always start in incognito mode
- The way Hacker uses to remain anonymous
May be interested
- GIBON extortion code spread through spama new ransomware called gibon, once again malspam (malware spread via email) attaches a malicious file and contains the download macro, installs the malicious code to blackmail the victim's computer.
- Tor Project increases users' security and privacy with the new Onion generationtor project is bringing big changes to its infrastructure to increase security and privacy for users on the onion network.
- Easily bypass the iPhone's authenticity thanks to the vulnerability on iOS 11this is certainly not the good news apple expects to receive after the iphone's launch days. a bug on ios 11 allows anyone to pass icloud authentication with the wrong password during initial screen setup.
- 25% of the 1.9 billion passwords and usernames bought on the black market are Google accountshackers often try to hack into google accounts, so google researchers have spent a year to see how they can steal user accounts.
- VNCERT issued an emergency alert warning malicious code exploiting Coinhive virtual moneythe malicious code will automatically run on the user's computer as an extension or directly in the browser to 'dig' bitcoin virtual money, monero ..., illegally use cpu, hard drive, memory ... and send it about hackers' electronic wallets.
- Malware can steal Facebook, Twitter and Gmail accountsresearchers have discovered a new and complex malware variant, based on the famous zeus bank trojan but not just stealing bank accounts.