EFF: Phony HTTPS Everywhere Extension Used in Fake Tor Browser
Phony HTTPS Everywhere Extension Used in Fake Tor Browser ESET researchers recently discovered a false “ trojanized ” version of Tor Browser that collectively stole $40,000 USD in Bitcoin. This does not mean that Tor or Tor Browser itself is compromised in any way. It only means that attackers found a new, insidious way to create and distribute a fake version of the Tor Browser. In this case, attackers also faked EFF’s own HTTPS Everywhere extension using a modified manifest.json file with a few settings changes. The attackers used a fake HTTPS Everywhere extension in their campaign because Tor does in fact package the HTTPS Everywhere and No Script extensions into its browser. Including details like normal extensions in the trojanized version of Tor could prevent eagle-eyed users from catching red flags that indicate they’re using a fake browser. Nefarious HTTPS Everywhere Code The manifest.json file in web extensions states explicit permissions and scope of activity the we