Coming soon - Get a detailed view of why an account is flagged as spam!
view details

This post has been de-listed

It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.

19
PSA: Accessing LocalMonero or AgoraDesk by entering the clearnet domain (i.e. localmonero.co) into the Tor browser without prefixing it with "https://" allows a malicious Tor exit node operator to conduct an SSL stripping attack and steal your credentials. Use the onion domains instead!
Author Summary
Alex_LocalMonero is in Mali
Post Body

We've recently experienced a series of attacks conducted by malicious Tor exit node operators.

This only affects users who input the clearnet domain (localmonero.co or agoradesk.com) without prefixing it with "https://" into their Tor browser address field. This does not affect people who access the clearnet domains through a non-Tor connection or use the onion domains localmonerogt7be.onion or agoradeska6jfxpf.onion

The attacker inserts themselves in-between the user and our servers and serves their own version of the website that steals your credentials upon login.

The reason they are able to do this is because when people enter "localmonero.co" into their Tor browser address bar they do not specify "https://" in the beginning, leading the browser to first request an unencrypted version of the site. The attacker intercepts the request and prevents our servers from serving the usual automatic redirect to HTTPS. Instead, the attacker serves the user their own version of the website over HTTP and the unsuspecting user logs in to the attacker's page and compromises their account.

If you have at any point in the past accessed our services through inputting the clearnet domain in the Tor browser, please login using the onion domain or clearnet domain on a non-Tor connection and change your password immediately for your own security. If you use that login/pass combination anywhere else, you need to change your passwords on all websites where you use that login/pass combo, as it can now be considered compromised.

In order to mitigate this attack in the long run we've already submitted a ruleset for HTTPS Everywhere, which was already merged into the master code, that will automatically rewrite http to https for LocalMonero and AgoraDesk before the request is even sent, however, it will take some time before this is deployed to the Tor browser distribution and all the users update their Tor browser software. In the short run, the only way to mitigate this is to inform people about it as much possible to minimize the bleeding.

The attacks on our services are not unique, as this seems to be an ongoing situation in the crypto services sphere. Frankly, it's very unfortunate that the Tor browser team does not enable the HTTPS Everywhere setting that always rewrites requests to https by default in their distribution, as this would have saved us from this situation altogether.

Author
Account Strength
100%
Account Age
7 years
Verified Email
Yes
Verified Flair
No
Total Karma
19,871
Link Karma
9,168
Comment Karma
9,267
Profile updated: 4 days ago
Posts updated: 7 months ago
LocalMonero Staff

Subreddit

Post Details

Location
We try to extract some basic information from the post title. This is not always successful or accurate, please use your best judgement and compare these values to the post title and body for confirmation.
Posted
4 years ago