Wow, what a weird day.

A rather bizarre story, which is possibly a good example as to how Qubes
can help protect you from hacking, or at least spot the effects of it.

I use a sigaint address, because of a psycho ex and her corrupt cop buddies.

Anyhow, I created another sigaint address today, to keep identies
split/anonymous as much as possible, to share with a (supposed :P) friend.

It said it was successfully created, and I logged in to test it.  It was
fine.

Went out for a couple of hours (including giving my buddy, ironically also
a police officer, the email address).

When I returned home, I tried logging in again, but from a different VM. 
Failed repeatedly.  I figured I must have messed up the password.  No luck
trying other possibilities.

Eventually, I tried creating the same email address again, and it worked! 
WTF?

So I tried logging into the sigaint account for *this* address, that I use
with qubes-users.  It also failed repeatedly, until I attempted creating a
new account.  That worked!

Went to the other VM, and the other old account was there.  Two different
views of sigaint, with different accounts with the same name, from two
different VMs!!!

>From the VM that let me (re)create the two accounts, I attempted to email
sigaint's support to ask if they were having problems, and that email
repeatedly failed.  So if there is a shadow sigaint on a hacked VM, I'm
suspecting that one.

Where I was on testing, in case there's a dom0 vulnerability, I've
retreated to another OS for now, and I sent the info to sigaint support
with no problem, and this sigaint account and the other one I created seem
to be as expected.

It's entirely possible that sigaint is having server issues, and different
routes through tor hit different load-sharing servers, and it's all
innocent.  But dayum, it seemed odd.

One was a Qubes-Whonix VM, and one was a "torbrowser-launcher" package
from Debian-8 (and qubes 3.2-testing).

The latter (Debian-8/torbrowser-launcher) had JavaScript enabled on some
possibly dodgey sites, which is why it was in its own VM.  That separation
may have paid off on not getting my whole system pwned (yet again).

Creating the new sigaint account from that VM was sloppy, but might have
revealed a hack.  (Again, if it's not an innocent glitch.)

I'll report back when I hear from sigaint (if I'm talking to the real one!
:) ), in case they just had some temporary service issues or something. 
But all signs point to a VM compromise from what I've seen.

Will do a bit of amateur forensics from a safe offline OS tonight to see
if I can spot any weirdness in either of the VM's.

If it was actually compromise of the
Debian-8/3.2-testing/torbrowser-launcher VM, that would mean there's
possibly a 0-day vulnerability in there somewhere (or a boot sector virus,
or a comporomised bios, or . . .  :P).  I don't think intercepting an
.onion address in the network is possible these days.

If it is a real compromise, it is confirmation that Qubes VM separation is
one of the few hopes for sanity on this crooked thing we call the
Internet.

I think I'll go work in another industry.  This one isn't fun any more.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a0ab6b513f987b00e97594d548a79519.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.

Reply via email to