The Tor network is increasingly used by malicious users

Security researchers from who monitor the activities of cybercriminals on the Darknet, and particularly the Tor network, have discovered that the number of activities taking place over the anonymous network is increasing.

According to Kaspersky Lab researcher, Lozhkin, there are currently about 900 Tor hidden services with 5,500 nodes and 1,000 exit nodes.
Thu

Cybercriminals are attracted to the Tor network for a variety of reasons. It allows them to create anonymous underground forums and markets, and they can use it to build malware (C&C) infrastructure that is difficult to disrupt.

Examples of malware that use the Tor network to communicate with C&C are ZeuS, Chewbacca, and even more recently Backdoor..Torec.a (ένα Trojan).

Using Tor for malware has advantages as well as drawbacks. The fact that Tor-based malware is larger in size and more difficult to grow makes it more rare, but not that it does not exist. Lozhkin believes that their number will soon increase.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).