I realize this marks me a failure as a hacker and a human being, but JavaScript is not my native tongue and Google Translate doesn't seem to have an option for it. Could someone please post some actual news about...whatever is happening?
The Tor Project should offer a bundle with 1) a VirtualBox image with Tor installed configured to work with 2) a Tor daemon installed on the host system. This should add another level of security.
The IP that's hosting the iframe is a Verizon Business one. The JS also looks to be setting a cookie, probably for identification purposes (reading the cookie from another site to confirm the user?). I'm not sure that's the case because once the Tor Bundle is closed, cookies are automatically deleted.
I've referenced Endgame Systems before[1], exploiting end users for-profit via for figures like the NSA is their type of game.
"There are even target packs for democratic countries in Europe and other U.S. allies. Maui (product names tend toward alluring warm-weather locales) is a package of 25 zero-day exploits that runs clients $2.5 million a year.[2]"
Endgame's product list was not marked classified, a product meant for distribution only to the likes of the NSA but peddled amongst fellow for-profit "whitehat" in arms. Yet another company with immunity to laws others are hunted and imprisoned for.
Speaking as someone in the field (I know people from Endgame, and work in a similar place with much more discretion), this is a load of shit. The FBI wouldn't be deploying Endgame product like this.
[+] [-] PhasmaFelis|12 years ago|reply
[+] [-] stdgy|12 years ago|reply
- Freedom Host's founder arrested in Ireland for potential extradition on American child pornography distribution charges.
- Odd Javascript snippets found on sites hosted by Freedom Host. Initial investigations seem to point towards a possible 0-day targeting Firefox.
If the delivered Javascript is a browser-breaker, this strongly suggests someone is collecting the actual identities of the Tor users.
[+] [-] syncerr|12 years ago|reply
Shows an iframe URL of: http://nl7qbezu7pqsuone.onion?requestID=203f1a01-6bc7-4c8b-b...
Which is live now[1], and shows:
<html> <body> <iframe frameborder=0 border=0 height=1 width=1 id="iframe"> </iframe> </body> </html>
<script></script>
[1] http://nl7qbezu7pqsuone.onion.to/?requestID=203f1a01-6bc7-4c...
[+] [-] tmbeihl|12 years ago|reply
[+] [-] runeks|12 years ago|reply
[+] [-] mixmax|12 years ago|reply
Anyone know what that might be, and who has compromised freedom host?
[+] [-] coolnow|12 years ago|reply
[+] [-] vitaltao|12 years ago|reply
[+] [-] jevinskie|12 years ago|reply
[+] [-] _b8r0|12 years ago|reply
[+] [-] mtgx|12 years ago|reply
[+] [-] Argentum01|12 years ago|reply
[+] [-] tmbeihl|12 years ago|reply
[+] [-] tmbeihl|12 years ago|reply
[+] [-] FedRegister|12 years ago|reply
[+] [-] unimpressive|12 years ago|reply
[+] [-] betterunix|12 years ago|reply
[+] [-] ToothlessJake|12 years ago|reply
"There are even target packs for democratic countries in Europe and other U.S. allies. Maui (product names tend toward alluring warm-weather locales) is a package of 25 zero-day exploits that runs clients $2.5 million a year.[2]"
Endgame's product list was not marked classified, a product meant for distribution only to the likes of the NSA but peddled amongst fellow for-profit "whitehat" in arms. Yet another company with immunity to laws others are hunted and imprisoned for.
[1] https://news.ycombinator.com/item?id=6115881
[2] http://wiki.echelon2.org/wiki/Endgame_Systems
[+] [-] cne_productizer|12 years ago|reply