Two Greek researchers seem to have surprised everyone at Black Hat Asia 2016. Dimitris Karakostas and Dionysis Zindros upgraded the attack BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) για να διαπερνά τους πιο κοινούς algorithms encryptionof the web.
The two PhD students who presented the BREACH attack were even released and a framework which will help hackers (with good intentions) and intelligence services spying on Facebook and Gmail.
In Black Hat Asia, the pair once again proved that the Internet can not be the term security even in the most popular online services, investing a lot of money and labor hours to protect themselves.
The new version of BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is even more powerful: hackers can target "noisy" end-points that do not use strong encryption algorithms, including AES 128 bit.
They say the new attack is also 500 times faster than the original attack.
The original BREACH attack was launched at Black Hat in 2013 and succeeded international identification. The attack compromised the common Deflate data compression algorithm used to save bandwidth in Internet communications.
Karakostas and Zedros (@dionyziz) from the National Technical University of Athens and the University of Athens described their project in the paper Practical New Developments on BREACH (PDF).
On the Black Hat Asia scene, they showed how the attack could be used to read Facebook victim's emails and Gmail emails using the "Rupture" framework, which they have developed and makes attack much simpler.
An attack, however, is not a toy and said it would take weeks to successfully break a target.
The "Rupture" framework is open source and is developed by Ph.D. students of the group.