SnailLoad is Not Slow

12681499859?profile=RESIZE_400xResearchers at Graz University of Technology could spy on users’ online activities simply by monitoring fluctuations in the speed of their internet connection.  This vulnerability, known as SnailLoad, does not require malicious code to exploit, and the data traffic does not need to be intercepted.  All types of end devices and internet connections are affected.[1]

SnailLoad attack setup:

  • The victim communicates with a server.
  • The server has a fast Internet connection, and the victim’s last-mile connection is comparably slow.
  • The attacker’s packets to the victim are delayed if the last mile is busy.
  • In a side-channel attack, the attacker infers what website or video the user is watching.

The unsuspecting victim only needs to have a single direct contact with the attacker, for example, when visiting a website or watching a promotional video.  During this interaction, the victim unknowingly downloads an essentially harmless file.  This file, devoid of any malicious code, evades detection by security software.  The transfer of this file is painstakingly slow, providing the attacker with continuous information about the latency variation of the victim’s internet connection.  This stealthy approach allows the attacker to reconstruct the victim’s online activity, posing a threat to their privacy.

SnailLoad combines latency data with fingerprinting of online content:  “When the victim accesses a website, watches an online video or speaks to someone via video, the latency of the internet connection fluctuates in a specific pattern that depends on the particular content being used,” says Stefan Gast from the IAIK.

This is because all online content has a unique “fingerprint.”  For efficient transmission, online content is divided into small data packages that are sent one after the other from the host server to the user.  The pattern of the number and size of these data packages is unique for each piece of online content – like a human fingerprint.

The researchers collected the fingerprints of a limited number of YouTube videos and popular websites in advance for testing purposes.  When the test subjects used these videos and websites, the researchers could recognize this through the corresponding latency fluctuations.  “However, the attack would also work the other way round,” says Daniel Gruss from the IAIK: “Attackers first measure the pattern of latency fluctuations when a victim is online and then search for online content with the matching fingerprint.”

Slow internet connections make it easier for attackers:  When spying on test subjects watching videos, the researchers achieved a success rate of up to 98%  “The higher the data volume of the videos and the slower the victims’ internet connection, the better the success rate,” explains Gruss. Consequently, the success rate for spying on basic websites dropped to around 63%. “However, if attackers feed their machine learning models with more data than we did in our test, these values will certainly increase,” Gruss added.

Loophole virtually impossible to close:  “Closing this security gap is difficult.  The only option would be for providers to artificially slow down their customers’ internet connections in a randomized pattern,” said Gruss.  However, this would lead to noticeable delays for time-critical applications such as video conferences, live streams or online computer games.

 

This article is presented at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  Our services can help detect cyber threats and vulnerabilities.     For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225 or feedback@redskyalliance.com    

Reporting: https://www.redskyalliance.org/
Website: https://www.redskyalliance.com/
LinkedIn: https://www.linkedin.com/company/64265941

Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5378972949933166424

 

[1] https://www.helpnetsecurity.com/2024/06/25/snailload-security-loophole-spy-users-online-activities/

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!