Incident: NSA Attempts to Exploit Tor Users via Vulnerable Software

Published Date: 2013-10-04

Postmortem Analysis
Timeline 1. The software failure incident involving the NSA's attempts to develop attacks against Tor users through vulnerable software on their computers, specifically targeting the Firefox web browser used with Tor, occurred before January 2013 as indicated by the article [22160].
System 1. Firefox web browser used with Tor [22160] 2. Tor browser bundle, specifically an older version of Firefox [22160]
Responsible Organization 1. The National Security Agency (NSA) [Article 22160]
Impacted Organization 1. Journalists, activists, and campaigners in the US and Europe, as well as in China, Iran, and Syria, who rely on Tor for privacy of their communications and to avoid reprisals from the government [22160].
Software Causes 1. Exploiting vulnerabilities in the Firefox web browser used with Tor, giving the NSA full control over targets' computers [22160] 2. Developing attacks against Tor users through vulnerable software on their computers, such as the EgotisticalGiraffe technique [22160] 3. Attempting to direct traffic toward NSA-operated servers or attacking other software used by Tor users [22160]
Non-software Causes 1. The National Security Agency's repeated attempts to develop attacks against people using Tor despite the software being primarily funded and promoted by the US government itself [22160].
Impacts 1. The software failure incident involving the NSA's attempts to develop attacks against Tor users through vulnerable software on their computers had the impact of potentially compromising the privacy and security of individuals using the Tor network [Article 22160]. 2. The incident raised concerns about the NSA's actions potentially affecting internet users in the US, including activists and journalists, who rely on Tor for secure browsing and communication [Article 22160]. 3. There were implications that the NSA's efforts to target Tor users through software vulnerabilities could have unintended consequences, such as implanting malicious code on the computers of individuals who visit specific websites, potentially affecting a wide range of users beyond the intended targets [Article 22160]. 4. The incident highlighted the ongoing challenges faced by the broader internet community in ensuring user security against sophisticated attacks, emphasizing the need for continuous improvement in browser and application security to protect against surveillance and exploitation [Article 22160].
Preventions 1. Regularly updating software: Keeping software up to date with the latest security patches and fixes could have prevented the vulnerabilities exploited by the NSA in the Tor browser bundle [22160]. 2. Implementing strong security measures: Enhancing the security measures within the software to prevent unauthorized access and attacks could have mitigated the risk of exploitation by intelligence agencies [22160]. 3. Conducting thorough security audits: Regular security audits and assessments of the software could have identified potential vulnerabilities and weaknesses that could be exploited by malicious actors, such as the NSA [22160].
Fixes 1. Updating the Tor browser bundle to ensure that users are protected against vulnerabilities exploited by the NSA's EgotisticalGiraffe technique, as older exploits were fixed in Firefox 17 released in November 2012 [22160]. 2. Enhancing the security of browsers and other internet-facing applications to prevent browser exploits and attacks on individual users [22160]. 3. Continuing to develop and maintain the Tor network to combat mass surveillance and protect user anonymity against intelligence agencies [22160].
References 1. Edward Snowden [22160] 2. The National Security Agency (NSA) [22160] 3. The Guardian [22160] 4. The New York Times [22160] 5. ProPublica [22160] 6. Brazilian newspaper Globo [22160] 7. Broadcasting Board of Governors [22160]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the attack on the Tor network by the NSA with the codename EgotisticalGiraffe involved exploiting vulnerabilities in the Firefox web browser used with Tor. This incident targeted Tor users by attacking their browsers through vulnerable software on their computers [22160]. (b) The article mentions that a similar but less complex exploit against the Tor network was revealed by security researchers, leading to speculation that it had been built by the FBI or another US agency. The FBI later admitted to operating malware to target an alleged host of images of child abuse on the Tor network, although the attack also hit numerous unconnected services. This indicates that similar incidents involving exploiting vulnerabilities in software have occurred with other organizations or agencies [22160].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase: - The NSA developed attacks against people using Tor by targeting vulnerable software on their computers, specifically exploiting the Firefox web browser used with Tor [22160]. - The NSA's technique to attack Tor users through vulnerable software on their computers had the codename EgotisticalGiraffe, which involved exploiting the Tor browser bundle and vulnerabilities in an older version of Firefox [22160]. (b) The software failure incident related to the operation phase: - The NSA's efforts to attack Tor users through vulnerable software on their computers involved identifying website visitors using the protective software and executing attacks against them, indicating a failure in the operation or misuse of the system [22160]. - The FBI or another US agency operated malware to target an alleged host of images of child abuse on the Tor network, but the attack hit numerous unconnected services on the network, suggesting a failure in the operation phase [22160].
Boundary (Internal/External) within_system, outside_system (a) within_system: - The software failure incident related to the Tor service being targeted by the NSA through the EgotisticalGiraffe technique involved exploiting vulnerabilities in the Firefox web browser used with Tor, giving the agency full control over targets' computers [22160]. - The NSA's attack on Tor users through vulnerable software on their computers, codenamed EgotisticalGiraffe, involved exploiting the Tor browser bundle and vulnerabilities in an older version of Firefox [22160]. (b) outside_system: - The failure was also influenced by contributing factors originating from outside the system, such as the NSA's repeated attempts to develop attacks against people using Tor, despite the software being primarily funded and promoted by the US government itself [22160]. - The NSA's efforts to attack the Tor service, including attempts to de-anonymize users and implant malicious code on their computers, were external factors contributing to the software failure incident [22160].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The software failure incident involving the Tor service was primarily due to attacks and exploitation by the NSA through techniques like EgotisticalGiraffe, which targeted vulnerable software on users' computers [22160]. - The NSA's efforts to attack Tor users were focused on exploiting vulnerabilities in the Firefox web browser used with Tor, rather than directly compromising the core security of the Tor software or network [22160]. - The NSA's technique of attacking Tor users through vulnerable software on their computers, such as the EgotisticalGiraffe exploit, did not involve direct attacks on the Tor system itself [22160]. (b) The software failure incident occurring due to human actions: - The failure of the Tor service was exacerbated by the NSA's deliberate efforts to develop attacks against Tor users, including exploiting vulnerabilities in the Firefox web browser used with Tor [22160]. - The NSA's actions in targeting Tor users through techniques like EgotisticalGiraffe and attempting to influence the future development of Tor in conjunction with GCHQ contributed to the software failure incident [22160]. - The NSA's involvement in developing and implementing attacks against Tor users through vulnerable software on their computers can be attributed to human actions within the intelligence agency [22160].
Dimension (Hardware/Software) software (a) The articles do not provide information about a software failure incident occurring due to contributing factors originating in hardware. (b) The software failure incident in the articles is related to vulnerabilities in software, specifically the Tor browser bundle and the Firefox web browser used with Tor. The NSA developed a technique called EgotisticalGiraffe to exploit these vulnerabilities in the software to gain control over targets' computers [22160].
Objective (Malicious/Non-malicious) malicious, non-malicious (a) The software failure incident related to the Tor network, specifically the attack technique developed by the NSA known as EgotisticalGiraffe, falls under the category of a malicious software failure incident. This attack involved exploiting vulnerabilities in the Firefox web browser used with Tor to gain full control over targets' computers, including access to files, keystrokes, and online activity [22160]. (b) On the non-malicious side, the article mentions that the Tor network itself has not been compromised by the NSA, and the core security of the Tor software remains intact. The NSA's efforts to target or undermine Tor include proof-of-concept attacks and attempts to influence the future development of Tor, but there is no indication that the proposed de-anonymization technique was ever implemented [22160].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The intent of the software failure incident: - The software failure incident related to the NSA's attempts to develop attacks against Tor users through vulnerable software on their computers, specifically targeting the Firefox web browser used with Tor [22160]. - The NSA's technique, codenamed EgotisticalGiraffe, involved exploiting vulnerabilities in an older version of Firefox to gain full control over targets' computers, including access to files, keystrokes, and online activity [22160]. - The NSA's efforts to attack Tor users through vulnerable software on their computers were part of a broader strategy to counteract targets' use of technologies to hide their communications, as stated by the agency [22160]. (b) The intent of the software failure incident: - The software failure incident could be seen as an accidental decision or unintended consequence resulting from the NSA's efforts to exploit vulnerabilities in the Tor network and the Firefox browser used with Tor [22160]. - The NSA's actions to attack Tor users through vulnerable software on their computers could have unintended consequences, potentially impacting law-abiding users such as activists and journalists who rely on Tor for secure browsing [22160].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the NSA's repeated attempts to develop attacks against users of the Tor software despite the fact that Tor is primarily funded and promoted by the US government itself [22160]. This shows a lack of professional competence in the decision-making process within the NSA, as they targeted vulnerable software on users' computers instead of directly compromising the core security of the Tor software or network. (b) The software failure incident related to accidental factors is seen in the unintentional fixing of vulnerabilities in an older version of Firefox used in the Tor browser bundle. The vulnerabilities were inadvertently fixed by Mozilla Corporation in Firefox 17, released in November 2012, which the NSA had not circumvented by January 2013 when the documents were written [22160]. This accidental fix rendered certain exploits unusable against Tor users who had not updated their software, highlighting a failure due to accidental circumstances.
Duration temporary The software failure incident related to the Tor service can be considered as a temporary failure. The NSA developed attacks against Tor users through vulnerable software on their computers, specifically targeting the Firefox web browser used with Tor. This attack, codenamed EgotisticalGiraffe, exploited vulnerabilities in an older version of Firefox to gain control over targets' computers [22160]. However, it is important to note that the fundamental security of the Tor service itself remained intact despite these attacks. The NSA's attempts to de-anonymize Tor users were described as having "no success" in response to specific requests, indicating that the core security of the Tor software or network was not compromised [22160].
Behaviour omission, value, other (a) crash: The articles do not mention any instance of the software crashing. (b) omission: The software failure incident related to omission is seen in the NSA's attempts to attack Tor users through vulnerable software on their computers. The NSA's technique, codenamed EgotisticalGiraffe, involved exploiting vulnerabilities in the Firefox web browser used with Tor to gain control over targets' computers. This attack was targeted at specific Tor users who were identified by the NSA, and the attack was executed against their browsers [22160]. (c) timing: The articles do not mention any instance of the software performing its intended functions too late or too early. (d) value: The software failure incident related to value is evident in the NSA's efforts to attack Tor users through vulnerable software on their computers. By exploiting vulnerabilities in the Firefox web browser used with Tor, the NSA gained full control over targets' computers, including access to files, keystrokes, and online activity. This incorrect performance of the software's intended functions led to a breach of privacy and security for the targeted users [22160]. (e) byzantine: The articles do not mention any instance of the software behaving erroneously with inconsistent responses and interactions. (f) other: The software failure incident also involves the NSA's efforts to undermine the security and privacy provided by the Tor network. Despite not compromising the core security of the Tor software or network, the NSA's proof-of-concept attacks and attempts to de-anonymize Tor users demonstrate a significant threat to the intended functions of the software in maintaining anonymity and privacy for its users [22160].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident related to the Tor service being targeted by the NSA and GCHQ had consequences related to property. The NSA developed attacks against Tor users through vulnerable software on their computers, with one technique called EgotisticalGiraffe targeting the Firefox web browser used with Tor. This attack gave the agency full control over targets' computers, including access to files, keystrokes, and online activity [22160]. Additionally, the NSA's efforts to implant malicious code on the computers of Tor users visiting particular websites could impact journalists, researchers, or individuals accidentally stumbling upon targeted sites, potentially leading to harm to their data or property [22160].
Domain information (a) The failed system in this incident is related to the information industry, specifically in the context of online privacy and security software. The software in question is Tor, which is a tool designed to protect online anonymity and is used by journalists, activists, campaigners, and individuals in countries with internet censorship to maintain the privacy of their communications [22160]. The National Security Agency (NSA) and the UK counterpart GCHQ have made repeated attempts to develop attacks against Tor users, indicating that the software failure incident is within the information industry sector. (b) N/A (c) N/A (d) N/A (e) N/A (f) N/A (g) N/A (h) N/A (i) N/A (j) N/A (k) N/A (l) N/A (m) N/A

Sources

Back to List