Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The new SnailLoad attack uses network latency to monitor users’ web activity
Global Security

The new SnailLoad attack uses network latency to monitor users’ web activity

AdminBy AdminJuly 7, 2024No Comments4 Mins Read
SnailLoad Attack
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 28, 2024Information hallNetwork Security / Data Protection

SnailLoad attack

A group of security researchers from the Graz University of Technology has demonstrated a new side-channel attack known as SnailLoad that can be used to remotely infer a user’s web activity.

“SnailLoad exploits a bottleneck present in all Internet connections,” researchers note said in a study published this week.

“This bottleneck affects the latency of network packets, allowing an attacker to infer the current network activity of someone else’s Internet connection. An attacker can use this information to infer the websites the user visits or the videos the user watches.”

A distinctive feature of this approach is that it eliminates the need to conduct an attack-in-the-middle (AitM) attack or to be in physical proximity to a Wi-Fi connection to eavesdrop on network traffic.

Cyber ​​security

Specifically, it involves tricking the target into downloading an innocuous asset (such as a file, image, or advertisement) from a server controlled by the threat actor, who then uses the victim’s network latency as a side channel to detect Internet activity on the system. victims

To perform such a fingerprinting attack and learn what video or website a user may be viewing or visiting, the attacker takes a series of latency measurements of the victim’s network connection as content is downloaded from the server while viewing or browsing.

It then includes a post-processing step that uses a convolutional neural network (CNN) trained with traces from an identical network setup to infer with an accuracy of up to 98% for videos and 63% for websites.

In other words, due to the network bottleneck on the victim’s side, the adversary can deduce the amount of data transmitted by measuring the packet transfer time (RTT). RTT traces are unique to each video and can be used to classify the video the victim watched.

The attack is so named because the attacking server transmits the file at a snail’s pace in order to monitor the connection latency over a long period of time.

“SnailLoad requires no JavaScript, no form of code execution on the victim system, and no user interaction, just the constant exchange of network packets,” the researchers explained, adding that it “measures latency on the victim system and infers network activity on system sacrifice from delay variations.

“The primary cause of side channel is buffering at the transport path node, typically the last node before the user modem or router, due to the question of quality of service is called buffer bloat.”

The announcement comes after researchers discovered a security flaw in the way router firmware handles Network Address Translation (NAT) mapping that could be used by an attacker connected to the same Wi-Fi network as the victim to bypass built-in randomization in Transmission. Control Protocol (TCP).

Cyber ​​security

“Most routers do not strictly check TCP packet sequence numbers for performance reasons,” the researchers note. said. “Therefore, this introduces serious security vulnerabilities that attackers can exploit by creating forged reset (RST) packets to maliciously clear router NAT mappings.”

The attack essentially allows a threat actor to infer the source ports of other client connections and steal the sequence number and acknowledgment number of a normal TCP connection between the victim client and the server in order to manipulate the TCP connection.

Hijacking attacks targeting TCP can be used as a weapon to poison a victim’s HTTP web page or mount denial-of-service (DoS) attacks, according to the researchers, who said patches for the vulnerability are being prepared by the OpenWrt community as well as router vendors. like 360, Huawei, Linksys, Mercury, TP-Link, Ubiquiti and Xiaomi.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.