I’m running Whonix on VirtualBox. Last time I used it, I didn’t do anything unusual apart from web browsing using Tor browser and a separate vanilla Firefox installation. No other applications were started, no terminal commands issued. I then shut down the VM, and few weeks later started it again. Tor browser was no longer opening (the separate vanilla Firefox installation is fine), so I investigated and found that the following files in ~/.tb/tor-browser/Browser/ have had each byte overwritten with ^@.
Sorry if this wasn’t clear, but it’s not just lots; every byte, of every file in that list, has been overwritten with ^@. I’ve uploaded platform.ini here, if you wish to have a look at it: bashupload. com/IPn0y/platform.ini
You’re not supposed to to open these files in a text editor.
Comparing hashsums (sha512sum) with a pristine version of the same Tor Browser version or binary diff (vbindiff) might be useful if you wish to really compare this.
But even if there are differenes, how useful is that information? Users are unable to perform Malware Audits.
I should have clarified this earlier, ^@ is the null control character. Since it’s a non-graphic control character, the contents won’t be displayed if I copy/paste it here.
But see the below terminal output which illustrates the fact that each byte has been overwritten with the null character:
[workstation user ~]% sha512sum Browser-corrupted/platform.ini
03e2695772435c0f22dc16a9b84775391a436a58d0a40eb14103c8465302a5a8b017f67e16551ea1b75c90c62fba83371241eaee86d9cfb62cdd910a82abbbc0 Browser-corrupted/platform.ini
[workstation user ~]% for a in $(seq 178); do printf '\0'; done > foo; sha512sum foo
03e2695772435c0f22dc16a9b84775391a436a58d0a40eb14103c8465302a5a8b017f67e16551ea1b75c90c62fba83371241eaee86d9cfb62cdd910a82abbbc0 foo
I’m not really a meaningful attack target and this could just be a bug. I’ve just never heard of something like this happen before, so I thought it would be a good idea to mention it.