TOR network: Home for malware
Posted by: Timothy Weaver on 03/06/2014 04:45 PM
[
Comments
]
According to Kaspersky Lab, the Tor anonymisation network is being used to hide 900 botnet and cybercrime-related hidden services.
Kaspersky researchers are reporting finding ChewBacca point-of-sale keylogger and the ZeuS banking malware control infrastructure, as well as the first Tor Trojan for Android.
You will find command-and-control servers, admin panels and other malware-related resource on the TOR network.
According to Kaspersky Lab, cybercriminals are increasingly moving towards the technology.
a senior security researcher at Kaspersky Lab, Sergey Lozhkin, [url=http://www.securelist.com/en/blog/8187/Tor_hidden_services_a_safe_haven_for_cybercriminals]explained[/url= “Hosting C&C servers in Tor makes them harder to identify, blacklist or eliminate, although creating a Tor communication module within a malware sample means extra work for the malware developers.”
He added: “We expect there will be a rise in new Tor-based malware, as well as Tor support for existing malware.”
Identifying the user’s IP address in Tor is difficult, if not impossible. The network can be used anonymously for human rights activists to cybercrooks. Moreover, the [url=http://blog.kaspersky.com/tor-faq]TOR[/url=] network utilizes so-called pseudo-domains, frustrating efforts to identify the resource owner’s personal information.
You will find command-and-control servers, admin panels and other malware-related resource on the TOR network.
According to Kaspersky Lab, cybercriminals are increasingly moving towards the technology.
a senior security researcher at Kaspersky Lab, Sergey Lozhkin, [url=http://www.securelist.com/en/blog/8187/Tor_hidden_services_a_safe_haven_for_cybercriminals]explained[/url= “Hosting C&C servers in Tor makes them harder to identify, blacklist or eliminate, although creating a Tor communication module within a malware sample means extra work for the malware developers.”
He added: “We expect there will be a rise in new Tor-based malware, as well as Tor support for existing malware.”
Identifying the user’s IP address in Tor is difficult, if not impossible. The network can be used anonymously for human rights activists to cybercrooks. Moreover, the [url=http://blog.kaspersky.com/tor-faq]TOR[/url=] network utilizes so-called pseudo-domains, frustrating efforts to identify the resource owner’s personal information.
Comments