Thursday, August 21, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Technology and Engineering

New security loophole allows spying on internet users visiting websites and watching videos

June 24, 2024
in Technology and Engineering
Reading Time: 3 mins read
0
SnailLoad Logo
66
SHARES
598
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT
ADVERTISEMENT

Internet users leave many traces on websites and online services. Measures such as firewalls, VPN connections and browser privacy modes are in place to ensure a certain level of data protection. However, a newly discovered security loophole allows bypassing all of these protective measures: Computer scientists from the Institute of Applied Information Processing and Communication Technology (IAIK) at Graz University of Technology (TU Graz) were able to track users’ online activities in detail simply by monitoring fluctuations in the speed of their internet connection. No malicious code is required to exploit this vulnerability, known as “SnailLoad”, and the data traffic does not need to be intercepted. All types of end devices and internet connections are affected.

SnailLoad Logo

Credit: IAIK – TU Graz

Internet users leave many traces on websites and online services. Measures such as firewalls, VPN connections and browser privacy modes are in place to ensure a certain level of data protection. However, a newly discovered security loophole allows bypassing all of these protective measures: Computer scientists from the Institute of Applied Information Processing and Communication Technology (IAIK) at Graz University of Technology (TU Graz) were able to track users’ online activities in detail simply by monitoring fluctuations in the speed of their internet connection. No malicious code is required to exploit this vulnerability, known as “SnailLoad”, and the data traffic does not need to be intercepted. All types of end devices and internet connections are affected.

Attackers track latency fluctuations in the internet connection via file transfer

Attackers only need to have had direct contact with the victim on a single occasion beforehand. On that occasion, the victim downloads a basically harmless, small file from the attacker’s server without realising it – for example while visiting a website or watching an advertising video. As this file does not contain any malicious code, it cannot be recognised by security software. The transfer of this file is extremely slow providing the attacker with continuous information about the latency variation of the victim’s internet connection. In further steps, this information is used to reconstruct the victim’s online activity.

“SnailLoad” combines latency data with fingerprinting of online content

“When the victim accesses a website, watches an online video or speaks to someone via video, the latency of the internet connection fluctuates in a specific pattern that depends on the particular content being used,” says Stefan Gast from the IAIK. This is because all online content has a unique “fingerprint”: for efficient transmission, online content is divided into small data packages that are sent one after the other from the host server to the user. The pattern of the number and size of these data packages is unique for each piece of online content – like a human fingerprint.

The researchers collected the fingerprints of a limited number of YouTube videos and popular websites in advance for testing purposes. When the test subjects used these videos and websites, the researchers were able to recognise this through the corresponding latency fluctuations. “However, the attack would also work the other way round,” says Daniel Gruss from the IAIK: “Attackers first measure the pattern of latency fluctuations when a victim is online and then search for online content with the matching fingerprint.”

Slow internet connections make it easier for attackers

When spying on test subjects who were watching videos, the researchers achieved a success rate of up to 98 per cent. “The higher the data volume of the videos and the slower the victims’ internet connection, the better the success rate,” says Daniel Gruss. Consequently, the success rate for spying on basic websites dropped to around 63 per cent. “However, if attackers feed their machine learning models with more data than we did in our test, these values will certainly increase,” says Daniel Gruss.

Loophole virtually impossible to close

“Closing this security gap is difficult. The only option would be for providers to artificially slow down their customers’ internet connections in a randomised pattern,” says Daniel Gruss. However, this would lead to noticeable delays for time-critical applications such as video conferences, live streams or online computer games.

The team led by Stefan Gast and Daniel Gruss has set up a website describing SnailLoad in detail. They will present the scientific paper on the loophole at the conferences Black Hat USA 2024 and USENIX Security Symposium.

This research is anchored in the Field of Expertise “Information, Communication & Computing“, one of five strategic foci of TU Graz.



Method of Research

Data/statistical analysis

Subject of Research

Not applicable

Share26Tweet17
Previous Post

UMass Amherst scientists to help launch the future of RNA research and biomedicine

Next Post

Circulating microRNAs likely as effective as A1C for predicting type 2 diabetes in youth, according to OU study

Related Posts

blank
Technology and Engineering

SLAS Technology Introduces AI-Enhanced Diagnostics and Advanced Laboratory Innovations

August 21, 2025
blank
Medicine

New Bacterial Protein Drives Nitrous Oxide Reduction

August 21, 2025
blank
Technology and Engineering

Ozone Exposure Linked to Kawasaki Disease in Children

August 21, 2025
blank
Medicine

Electron Flow Matching Advances Reaction Mechanism Prediction

August 21, 2025
blank
Technology and Engineering

Early Screen Multitasking Risks Preschoolers’ Executive Function

August 21, 2025
blank
Technology and Engineering

Seeking Signs: If Aliens Explore Space As We Do, We Should Listen for Their Calls to Other Planets

August 21, 2025
Next Post
Jeanie Tryggestad, M.D.

Circulating microRNAs likely as effective as A1C for predicting type 2 diabetes in youth, according to OU study

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27536 shares
    Share 11011 Tweet 6882
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    951 shares
    Share 380 Tweet 238
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    508 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    311 shares
    Share 124 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Iran’s Parkinson’s Disease Registry: Key Findings Revealed
  • SLAS Technology Introduces AI-Enhanced Diagnostics and Advanced Laboratory Innovations
  • Chung-Ang University Researchers Develop Paper Electrode-Based Soft Robots That Crawl
  • Amputation Doesn’t Alter the Brain’s Body Map: Memories of the Lost Persist

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4,859 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading