I have just presented our paper on Zero Click SnailLoad at ESORICS 2025 in Toulouse. Thank you to all who attended my talk, also for the nice discussion!

Also thanks to @c1t for taking the picture!

#ESORICS2025 #Toulouse #SnailLoad #sidechannel

Nuisance of the day: Mobile email applications that automatically render HTML mails by default, including links, without clearly indicating where they go. "Bonus" points for loading external references without asking.
Just now, somebody showed me a fully rendered phishing mail in their web.de app.
Of course, I had to do a quick SnailLoad demo and that one works, too, with a client-side connection to the attacker server. 🤔
We investigated problematic behavior like this in our Zero-Click SnailLoad paper, so this is just yet another case.
However, I said it before and I will say it again: HTML emails are a pest, especially with external references!

#SnailLoad #phishing #tracking #email

In our new paper (accepted at ESORICS 2025), we explore how attackers can mount automated SnailLoad attacks without requiring the user to explicitly click a link to the attacker's server.
For this, we exploit the automatic handling of external references in messenger and email applications, as well as responses from home routers to TCP SYNs targeting closed ports.
The full paper is available here: https://stefangast.eu/papers/zeroclicksnailload.pdf

Thank you to Nora Puntigam, @silent_bits, @vmcall, @lavados and Johanna Ullrich for the fantastic collaboration!

#ESORICS2025 #SnailLoad

SnailLoad: the next Side-Channel Attack found by the University of Technology in Graz: https://www.snailload.com #snailload
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript

NVD - CVE-2024-39920

New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities
https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html #SnailLoad
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities

Researchers unveil SnailLoad, a new side-channel attack exploiting network latency to infer web activity remotely, achieving up to 98% accuracy in vid

The Hacker News

"New attack named SnailLoad allows a remote attacker to infer websites and videos viewed by a user without direct access to network traffic."

https://www.securityweek.com/new-snailload-attack-relies-on-network-latency-variations-to-infer-user-activity

#cybersecurity #snailload #cybersec #infosec #itsec

New SnailLoad Attack Relies on Network Latency Variations to Infer User Activity

New attack named SnailLoad allows a remote attacker to infer websites and videos viewed by a user without direct access to network traffic.

SecurityWeek
Grazer Lauschangriff braucht bloß TCP/IP - weder Malware noch Sicherheitslücke | c't Magazin https://www.heise.de/news/SnailLoad-Lauschangriff-ohne-Man-in-the-Middle-und-ohne-Code-auf-dem-Zielsystem-9775311.html #SnailLoad
Grazer Lauschangriff braucht bloß TCP/IP - weder Malware noch Sicherheitslücke

Jede aus dem Internet geladene Datei weist ein typisches Latenzmuster auf. Damit lässt sich ermitteln, welches Video oder welche Webseite ein User abruft.

heise online

By me @Forbes: SnailLoad attack methodology allows for spying without infiltrating the network or installing malware. It’s clever, but is it dangerous?

# infosec #SnailLoad #PrivacyMatters

https://www.forbes.com/sites/daveywinder/2024/06/25/new-hack-attack-slows-internet-speed-to-see-what-videos-you-watch/

New Hack Attack Slows Internet Speed To See What Videos You Watch

Security researchers reveal SnailLoad, a new spy attack that can tell the video you are watching or website you are visiting without being connected to your network.

Forbes

Während der Arbeitszeit gleichzeitig youtube-Videos und twitch-streams schauen ist das neue
"Radio an und die Unterhaltung bei laufender Dusche im Badezimmer führen": Es fügt Abhörschutz durch Rauschen hinzu. ;-)

https://www.heise.de/news/SnailLoad-Lauschangriff-ohne-Man-in-the-Middle-und-ohne-Code-auf-dem-Zielsystem-9775311.html

#SnailLoad

Grazer Lauschangriff braucht bloß TCP/IP - weder Malware noch Sicherheitslücke

Jede aus dem Internet geladene Datei weist ein typisches Latenzmuster auf. Damit lässt sich ermitteln, welches Video oder welche Webseite ein User abruft.

heise online