Firefox and Tor release critical 0-day patch originating in FBI code

The security world woke up Tuesday, November 29 to alarming reports of a 0-day vulnerability affecting Firefox and the anonymous browser Tor. The news first broke when an anonymous admin of the getting access to VirtualAlloc in kernel32.dll." In plain English, when a Windows machine used Firefox or Tor with Javascript enabled, the 0-day exploit allowed malicious code to be run at any time due to a memory corruption vulnerability.

As the news began to spread about this dangerous exploit, security researchers began to notice similarities in the code to another exploit that the FBI utilized. One such security professional gave his analysis via Tweets, which are screen capped below:

The 2013 FBI code was able to decrypt user identities who visited child porn sites via Tor. It would then transmit non-proxy IP addresses, MAC addresses, and other data to a main server in an attempt to apprehend the criminals. While there has been no confirmation as to whether or not the FBI is involved in this new 0-day, it would not surprise me if that was the case. It is not uncommon knowledge that the authorities use cyber solutions that not only help catch dangerous people, but also open up normal citizens to dangerous hacks (see: the iPhone San Bernardino incident). Even if the FBI is not involved in this new exploit; its code was still used to create a dangerous and potentially catastrophic cyber incident.

I say "potentially" because, thanks to the due diligence of researchers and coders, patches have been released by both Firefox and Tor. As Tor pointed out in their patch notes, the security flaw has been utilized already by some malicious hackers, but the damage was not as great as it could have been.

This incident teaches us is that when it comes to cyber crime and cyber security, a set of standards must be adhered to. There are rules of engagement in war, and now that the FBI is playing with fire via exploits, there needs to be an updated rules of engagement in fighting the cyber war. Security experts want criminals brought to justice, but we also don't want the rights of regular citizens compromised in the process.

Photo credit: wordfence, @TheWack0lian, Cliff


Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Published by
Derek Kortepeter

Recent Posts

Microsoft 365 troubleshooting: Diagnostic tools at your fingertips

Many Exchange Server troubleshooting tools don’t work with Microsoft 365. Fortunately, Microsoft has a bunch…

3 days ago

LSU hospitals latest health system hit by cyberattack

The LSU hospital system has experienced a breach of patient data after a cyberattack as…

3 days ago

Business email compromise cybercrime group members busted

Business email compromise cyberattacks have been on the rise, and now some allegedly prominent players…

4 days ago

Making retail mobile e-commerce apps more secure

Many e-commerce mobile apps are insecure, opening the businesses that use them to severe risks.…

5 days ago

With eyes on the ‘Zoom boom,’ Microsoft launches Teams apps for meetings

Microsoft continues to leverage its hot Microsoft Teams. With an eye on the popularity of…

5 days ago

Exchange 2019 and 2013: Is coexistence possible? Yes, here’s how

Exchange 2019 and 2013 coexistence can be achieved, but the road is winding and filled…

5 days ago