New security loophole allows spying on internet users’ online activity
Researchers at Graz University of Technology were able to spy on users’ online activities simply by monitoring fluctuations in the speed of their internet connection. This vulnerability, known as SnailLoad, does not require malicious code to exploit, and the data traffic does not need to be intercepted. All types of end devices and internet connections are affected.
SnailLoad attack setup
- The victim communicates with a server.
- The server has a fast Internet connection, the victim’s last-mile connection is comparably slow.
- The attacker’s packets to the victim are delayed if the last mile is busy.
- In a side-channel attack, the attacker infers what website or video the user is watching.
The unsuspecting victim only needs to have a single direct contact with the attacker – for example, when visiting a website or watching a promotional video. During this interaction, the victim unknowingly downloads an essentially harmless file. This file, devoid of any malicious code, evades detection by security software. The transfer of this file is painstakingly slow, providing the attacker with continuous information about the latency variation of the victim’s internet connection. This stealthy approach allows the attacker to reconstruct the victim’s online activity, posing a threat to their privacy.
SnailLoad combines latency data with fingerprinting of online content
“When the victim accesses a website, watches an online video or speaks to someone via video, the latency of the internet connection fluctuates in a specific pattern that depends on the particular content being used,” says Stefan Gast from the IAIK.
This is because all online content has a unique “fingerprint”. For efficient transmission, online content is divided into small data packages that are sent one after the other from the host server to the user. The pattern of the number and size of these data packages is unique for each piece of online content – like a human fingerprint.
The researchers collected the fingerprints of a limited number of YouTube videos and popular websites in advance for testing purposes. When the test subjects used these videos and websites, the researchers could recognize this through the corresponding latency fluctuations. “However, the attack would also work the other way round,” says Daniel Gruss from the IAIK: “Attackers first measure the pattern of latency fluctuations when a victim is online and then search for online content with the matching fingerprint.”
Slow internet connections make it easier for attackers
When spying on test subjects watching videos, the researchers achieved a success rate of up to 98 percent.
“The higher the data volume of the videos and the slower the victims’ internet connection, the better the success rate,” explains Gruss. Consequently, the success rate for spying on basic websites dropped to around 63 percent. “However, if attackers feed their machine learning models with more data than we did in our test, these values will certainly increase,” Gruss added.
Loophole virtually impossible to close
“Closing this security gap is difficult. The only option would be for providers to artificially slow down their customers’ internet connections in a randomised pattern,” said Gruss. However, this would lead to noticeable delays for time-critical applications such as video conferences, live streams or online computer games.
Proof-of-concept code is available on GitHub. The research paper is available here.