![]() |
A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: General (https://sinister.ly/Forum-General) +--- Forum: World News (https://sinister.ly/Forum-World-News) +--- Thread: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 (/Thread-A-Threat-Actor-Has-Been-Running-Hundreds-of-Malicious-Tor-Relays-Since-2017) |
A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - Drako - 12-07-2021 Well, I guess nobody is anonymous. Even while using Tor. Quote:Since at least 2017, a mysterious threat actor has run thousands of malicious servers in entry, middle, and exit positions of the Tor network in what a security researcher has described as an attempt to deanonymize Tor users. Now, if you don't know how Tor relays work or what they are, here's the rundown: Tor functions like an onion. You have to send a connection through many 'layers' to get from point A, to point B. And those layers are known as 'Tor relays'. These relays are open source, and can be ran by anybody. This leaves a small window open for attackers. This attacker, KAX17, is using these malicious relays to gather information on users, and map their routes. Quote:Nusenu said this is strange as most threat actors operating malicious Tor relays tend to focus on running exit points, which allows them to modify the user’s traffic. For example, a threat actor that Nusenu has been tracking as BTCMITM20 ran thousands of malicious Tor exit nodes in order to replace Bitcoin wallet addresses inside web traffic and hijack user payments. To me, this sounds like an undercover operation to de-anonymize any would-be criminals running things like drugs on the Tor network. Having this much consistent server power, and without any known stream of revenue, this sounds very likely to me. Source - https://therecord.media/a-mysterious-threat-actor-is-running-hundreds-of-malicious-tor-relays/ RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - Dismas - 12-07-2021 If KAX17 can do it on a minuscule level, 3-letter organizations can as well. I've always maintained that you could be better off with a VPN outside of intelligence agreements. RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - Drako - 12-07-2021 (12-07-2021, 03:37 AM)Dismas Wrote: If KAX17 can do it on a minuscule level, 3-letter organizations can as well. I've always maintained that you could be better off with a VPN outside of intelligence agreements. Agreed. Go with something that has a real reputation for privacy like Mullvad or iVPN. ![]() RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - DrangBrang - 12-07-2021 yeah agree seems like undercover operation RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - mothered - 12-07-2021 I've never used Tor purely on Its own. It's a poor decision to do so. Tor over VPN and VPN over Tor (at the least) for added layers of anonymity. Primary and secondary DNS server encryption, Is also part of the equation. RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - echo_blini - 12-30-2021 (12-07-2021, 03:42 PM)mothered Wrote: I've never used Tor purely on Its own. It's a poor decision to do so.How do you keep websites from timing out through all that? Tor even without a VPN seems to be slow enough to timeout frequently on many sites. RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - ConcernedCitizen - 12-31-2021 (12-30-2021, 10:50 PM)echo_blini Wrote:Honestly, this Sybil attack isn't uncommon and the Tor Project struggles to keep up with it sometimes. The KAX17 isn't the first or last major attempt to de-anonymize darknet users.(12-07-2021, 03:42 PM)mothered Wrote: I've never used Tor purely on Its own. It's a poor decision to do so.How do you keep websites from timing out through all that? Tor even without a VPN seems to be slow enough to timeout frequently on many sites. Here's a very detailed post by Nusenu about the threat landscape and how to protect yourself. Mostly, just use a VPN. You will have encrypted traffic from the exit node. Turn on the VPN, then connect to the Tor network. You can find guides on going the other way but it's not recommended. Yes, it's slower, but it isn't really noticeable when your internet speeds are not dialup. Also, don't simply block entire countries' nodes. That should be a given. Problematic nodes are automatically banned from the network if they fail to meet specific criterion. RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - laininthewired - 12-31-2021 Quote:To me, this sounds like an undercover operation to de-anonymize any would-be criminals running things like drugs on the Tor network. ![]() RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - mothered - 12-31-2021 (12-30-2021, 10:50 PM)echo_blini Wrote: How do you keep websites from timing out through all that? Tor even without a VPN seems to be slow enough to timeout frequently on many sites.Seldom do I experience timeouts. Sure, It's a lot slower than running Tor per se, but for the most part, It serves my needs well. If certain sites don't load for you, try creating a new circuit. RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 - Marshland - 01-14-2022 Honestly I had no idea this was possible. I wonder how they would be able to manipulate the traffic. Pretty scary stuff |