Two Greek researchers seem to be amazed at everyone in Black Hat Asia 2016. Dimitris Karakostas and Dionysis Zedros upgraded BREACH (Browser Reconnaissance and Exfiltration through Adaptive Compression of Hypertext) to permeate the most common Web encryption algorithms.
The two PhD students who presented the BREACH attack were even released and a framework which will help hackers (with good intentions) and intelligence services spying on Facebook and Gmail.
In Black Hat Asia, the pair once again proved that the Internet can not be the term security even in the most popular online services, investing a lot of money and labor hours to protect themselves.
The new version of BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is even more powerful: hackers can target "noisy" end-points that do not use strong encryption algorithms, including AES 128 bit.
They say the new attack is also 500 times faster than the original attack.
The original BREACH attack was released to Black Hat at 2013 and was internationally recognized. The attack offended the common Deflate data compression algorithm used to save bandwidth on Internet communications.
On the Black Hat Asia scene, they showed how the attack could be used to read Facebook victim's emails and Gmail emails using the “Rupture” framework, which they have developed and makes attack much simpler.
An attack, however, is not a toy and said it would take weeks to successfully break a target.
The “Rupture” framework is open source and is developed by Ph.D. students of the group.