Enlarge / A map of hidden services directories detected as malicious. The trust of the Tor anonymity network is in many cases only as strong as the individual volunteers whose computers form its building blocks. On Friday, researchers said they found at least 110 such machines actively snooping on Dark Web sites that use Tor to mask their operators’ identities. All of the 110 malicious relays were designated as hidden services directories, which store information that end users need to reach the “.onion” addresses that rely on Tor for anonymity. Over a 72-day period that started on February 12, computer scientists at Northeastern University tracked the rogue machines using honeypot .onion addresses they dubbed “honions.” The honions operated like normal hidden services, but their addresses were kept confidential. By tracking the traffic sent to the honions, the researchers were able to identify directories that were behaving in a manner that’s well outside of Tor rules. “Such snooping allows [the malicious directories] to index the hidden services, also visit them, and attack them,” Guevara Noubir, a professor in Northeastern University’s College of Computer and Information Science, wrote in an e-mail. “Some of them tried to attack the hidden services (websites using hidden services) through a variety of means including SQL Injection , Cross-Site Scripting (XSS) , user enumeration, server load/performance, etc.” Read 7 remaining paragraphs | Comments
Visit link:
Malicious computers caught snooping on Tor-anonymized Dark Web sites
An anonymous reader writes: On April 6, a hacking outfit going by the name of Cyber Justice Team leaked data from multiple Syrian government and private websites. The leak includes the password file from the breached server, along with MySQL host permissions, admin passwords, and a link to the 10GB compressed file, uploaded to the file sharing site MEGA. While some of the data seems to be from older data breaches, some of it is also new. This is one of the biggest leaks of Syrian government data, a regime that has remained protected against such threats due to an aggressive cyber-policy. The government has been known to secretly back the Syrian Electronic Army hacker group, who the US government recently indicted (3 members at least). Read more of this story at Slashdot.