{"id":3585,"date":"2020-01-07T13:36:41","date_gmt":"2020-01-07T12:36:41","guid":{"rendered":"https:\/\/werle.pro\/?p=3585"},"modified":"2020-01-07T13:36:44","modified_gmt":"2020-01-07T12:36:44","slug":"ssi-tls-kaspersky-analysis-of-encryption-busting-reductor-malware","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2020\/01\/07\/ssi-tls-kaspersky-analysis-of-encryption-busting-reductor-malware\/","title":{"rendered":"SSI TLS &#8211; Kaspersky analysis of encryption-busting Reductor malware"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3584 alignnone size-full\" src=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/10\/shutterstock_password_sniffer3961537608478822994.jpg?resize=520%2C345&#038;ssl=1\" width=\"520\" height=\"345\" srcset=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/10\/shutterstock_password_sniffer3961537608478822994.jpg?w=520&amp;ssl=1 520w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/10\/shutterstock_password_sniffer3961537608478822994.jpg?resize=200%2C133&amp;ssl=1 200w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/10\/shutterstock_password_sniffer3961537608478822994.jpg?resize=512%2C340&amp;ssl=1 512w\" sizes=\"(max-width: 520px) 100vw, 520px\" data-recalc-dims=\"1\" \/><\/p>\n<p>The Register UK<\/p>\n<h3 class=\"title\">Kaspersky warns of encryption-busting Reductor malware, infection manipulates browsers to snoop on TLS comms<\/h3>\n<div class=\"byline\">\n<h5>By <a class=\"alt_colour dcl\" href=\"https:\/\/www.theregister.co.uk\/Author\/Shaun-Nichols\" target=\"_top\" title=\"Read more by this author\" rel=\"noopener noreferrer\">Shaun Nichols in San Francisco<\/a><\/h5>\n<h4>3rd October 2019 23:36 GMT<\/h4>\n<p>Kaspersky says it has uncovered a new malware infection that is able to decode encrypted TLS traffic without the need to intercept or manipulate it.<\/p>\n<p>Known as Reductor, the malware was spotted in April<br \/>\nof this year and is believed to be the work of an espionage-focused hacking crew known as Turla. The malware is thought to be connected to an earlier trojan called &lsquo;COMpFun&rsquo;.<\/p>\n<p>What makes Reductor unique,<br \/>\nsays Kaspersky&rsquo;s team, is its ability to manipulate TLS certificates. This, in turn allows the infection to present other malware installers as legitimate software.<\/p><\/div>\n<p><a href=\"https:\/\/www-theregister-co-uk.cdn.ampproject.org\/c\/s\/www.theregister.co.uk\/AMP\/2019\/10\/03\/kaspersky_reductor_malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.theregister.co.uk\/AMP\/2019\/10\/03\/kaspersky_reductor_malware\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Register UK Kaspersky warns of encryption-busting Reductor malware, infection manipulates browsers to snoop on TLS comms By Shaun Nichols in San Francisco 3rd October 2019 23:36 GMT Kaspersky says it has uncovered a new malware infection that is able to decode encrypted TLS traffic without the need to intercept or manipulate it. Known as &#8230; <a title=\"SSI TLS &#8211; Kaspersky analysis of encryption-busting Reductor malware\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2020\/01\/07\/ssi-tls-kaspersky-analysis-of-encryption-busting-reductor-malware\/\" aria-label=\"Read more about SSI TLS &#8211; Kaspersky analysis of encryption-busting Reductor malware\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-VP","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3585"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3585"}],"version-history":[{"count":2,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3585\/revisions"}],"predecessor-version":[{"id":3587,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3585\/revisions\/3587"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}