August 8, 2016 By Larry Loeb 2 min read

Black Hat conference attendees got to hear about a HEIST, or how “HTTP Encrypted Information can be Stolen Through TCP-Windows,” during a briefing Aug. 3.

This newly announced attack builds on the shoulders of previous attacks that use a cryptographic scheme to advance their aims. The authors noted in the introduction to their presentation that HEIST allows compression-based attacks such as CRIME and BREACH to be performed directly in the browser with no network access required.

Mechanics of a Cryptographic Scheme

“HEIST abuses weaknesses and subtleties in the browser and the underlying HTTP, SSL/TLS and TCP layers,” the introduction stated. “Combined with the fact that SSL/TLS lacks length-hiding capabilities, HEIST can directly infer the length of the plaintext message.”

HTTP/2 traffic must be immune to this sort of thing, right? Unfortunately, HTTP/2 just makes it worse: The authors noted that “HTTP/2 allows for more damaging attack techniques, further increasing the impact of HEIST.”

Guessing Game

HEIST claims it can make a decent guess as to what the plaintext of a message contains based on the length of an encrypted message. That assertion has not been widely tested yet, though HEIST’s previous methods of crypto extraction were shown to be serviceable.

It makes guesses about the plaintext content using the BREACH method. In this case, however, BREACH methods are not performed in a man-in-the-middle (MitM) situation. The need to manipulate the actual web traffic is eliminated in HEIST, so MitM isn’t necessary for the attack to succeed.

The attack can be triggered simply by a JavaScript file, which may be hidden in an web advertisement or hosted directly on a webpage. The malicious code is able to query a variety of pages that are protected by the SSL or TLS protocols. The code will then measure the precise file sizes of the transmitted encrypted data.

No Cookies for You

One of the attack’s developers told Ars Technica that “the only mitigation [the author] knows of is to disable the third-party cookies, since responses sent by the HTTPS site are no longer associated with the victim. At the moment, most web browsers by default enable the receipt of third-party cookies, and some online services don’t work unless third-party cookies are allowed.”

Just shutting down cookies to avoid individually tagged responses may seriously impair a website’s functionality. If that’s the only mitigation, there are problems aplenty here.

The shift to a network-based attack is ominous. Even in the unlikely event that changes are proposed tomorrow to correct the underlying TCP leaks, it would take a long time to see any effect on most sites. Changes in popular software like TCP take a very long time to propagate.

Someone is going to have to get very smart and figure out a way to blunt this kind of attack — before it leads to a massive problem.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today