Hackers unravel the FSB who violated Tor

Hackers managed to breach SyTech, an external partner of the FSB, (Russia's national intelligence service), and obtained information about their hacking projects. One of them was its de-anonymization s of the Tor network.

The breach took place last weekend, on July 13, when a group of hackers named 0v1ru$ broke into Active Directory of SyTech from where they gained access to the company's entire network.

The hackers stole 7.5 TB of data, of which posted snapshots on Twitter and later shared the stolen data with the digital revolution, another hacking group that disbanded Quantum, another FSB external partner, last year.

hackers

The secret projects of FSB

According to Russian media, the records show that SyTech has been working since 2009 on many projects for FSB and its partner Quantum.

These projects are listed below:

  • Nautilus – a project to collect data from social networks (such as Facebook, MySpace and LinkedIn).
  • Nautilus-S - a project to de-anonymize Tor network traffic with the help of malicious servers.
  • Reward – a project for her διείσδυση σε δίκτυα P2P, το πρωτόκολλο που χρησιμοποιείται στα torrents.
  • Mentor - a project for monitoring and retrieving emails on servers of Russian companies.
  • Hope - a project to explore the topology of the Russian Internet and how it connects to other countries' networks.
  • Tax-3 - a project to create a closed intranet for the storage of information by extremely sensitive politicians, judges and local government officials, separate from the rest of the state networks.

The BBC , το οποίο έλαβε τα δεδομένα που διέρρευσαν, ισχυρίζεται ότι υπήρχαν και άλλα παλαιότερα προγράμματα για την έρευνα άλλων πρωτοκόλλων δικτύου όπως το Jabber (instant ), το ED2K (eDonkey) και το OpenFT ( businesses).

Other files posted from her account Digital Revolution Twitter claims that the FSB is monitoring students and retirees.

But although most projects seem to be only for research with modern technology, there are some that appear to have been tested in the real world.

The first is Nautilus-S, to de-anonymize Tor network traffic. BBC Russia he says that work on Nautilus-S began in 2012. Two years later, in 2014, academics from Karlstad University in Sweden, published a paper which detailed the use of malicious on the Tor network they were trying to decrypt the traffic.

The identified 25 malicious servers, 18 of which were located in Russia and were running Tor version 0.2.2.37, the same one described in the leaked files.

______________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).