Podcast
Root Causes 46: Patching Browsers for TLS Fingerprinting Attacks


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 22, 2019
In a new variant on a known attack, a Russian Advanced Persistent Threat has begun applying patches to Chrome and Firefox to enable TLS fingerprinting even after the malware is removed from a system. To learn more about this new development, join our hosts as they explain how this attack works, its significance, and where the criminals may go from here.
Podcast Transcript
Lightly edited for flow and brevity.
So, the news, and I actually learned about this from ZDNet on October 4, is that the Russian hacker group, Turla group, which is widely considered to be - - well, widely to be believed to be a state-sponsored, you know, advanced, persistent threat, and is also one of the most advanced APTs in the world. Turla group it was found was actually patching Chrome and Firefox in order to install a persistent TLS fingerprinting mechanism. So, maybe for starters, we should explain what TLS fingerprinting is.
So, what TLS fingerprinting is, is, oh, a TLS session is encrypted by its nature, right? TLS/SSL means that it's encrypted at the host. It's decrypted at the server, or, you know, at the two ends and there's not really any way for any man in the middle to see what's going on and so, you can't really make sense of the encrypted traffic. But you can learn things about the encrypted traffic. Like who's talking to whom? How long are they talking? How frequently? What are the patterns behind their conversations? What are the larger patterns of the people they talk to? And so, TLS fingerprinting in and of itself is a form of threat. People can use it. Especially people like APTs can use it to collect information about people's online usage patterns, which they can then use to design their own attacks or to get more clarity on what's going on with the targets that they're seeking to harm. And the fundamental way that this is accomplished is that people actually install their own recognizable, very short, recognizable sequences of bits in those TLS sessions and then when they see TLS sessions with those sequences of bits, they know it's one of theirs that they're tracking and they know they know who the unique individual is. And you know, this is what's going on with this attack from the Turla group. They get these - - they put their malware on a system and then the malware causes these - - sorry, the malware turns around and it installs these patches into the browsers and what the browsers do is the browsers put these little signifiers. And so, TLS tracking, it's not, certainly not the most common or the most talked about technique, but that in and of itself is not a new technique. What's new and interesting in this case is this concept of actually patching the browsers.

