Two Greek researchers seem to have surprised everyone at Black Hat Asia 2016. Dimitris Karakostas and Dionysis Zindros upgraded the BREACH attack (Browser Recognition and Exfiltration via Adaptive Compression of Hypertext) to penetrate the most common algorithms encryptionof the web.
The two PhD students who presented the BREACH attack were even released and a framework which will help hackers (with good intentions) and intelligence services spying on Facebook and Gmail.
In Black Hat Asia, the pair once again proved that the Internet can not be the term security even in the most popular online services, investing a lot of money and labor hours to protect themselves.
Η new edition του BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) είναι ακόμα πιο ισχυρή: οι hackers μπορούν να στοχεύσουν “θορυβώδη” end-points που δεν χρησιμοποιούν ισχυρούς αλγόριθμους κρυπτογράφησης, συμπεριλαμβανομένης και της aes 128 bit.
They say the new attack is also 500 times faster than the original attack.
The original BREACH attack was released at Black Hat in 2013 and received international acclaim. The attack compromised the common Deflate data compression algorithm which usesto save bandwidth in Internet communications.
Karakostas and Zedros (@dionyziz) from the National Technical University of Athens and the University of Athens described their project in the paper Practical New Developments on BREACH (PDF).
On the Black Hat Asia scene, they showed how the attack could be used to read Facebook victim's emails and Gmail emails using the "Rupture" framework, which they have developed and makes attack much simpler.
But an attack is not childish game and reported that it would take weeks to successfully breach a target.
The "Rupture" framework is open code and is developed by PhD students in the group.