Categories: HackingIntelligence

Hackers can break Tor Network Anonimity with USD 3000

Security experts Alexander Volynkin and Michael McCord will present at the next Black Hat 2014 a method to break Tor network anonymity with just USD 3000.

Is the popular Tor network broken? In the recent months, after the Showden’s revelations, many security experts have started to investigate on the possibility that the US intelligence, and not only, has found a way to compromise the Tor network. Last week I published a blog post that commented a report issued by the German broadcaster ARD in which is confirmed that the NSA XKeyscore was used to target two Germany-based Tor Directory Authority servers.

In the recent months it was also discussed about the possibility to track selected users on Tor networks with a technique known as Traffic Correlation Attack defined by the researchers led by Aaron Johnson of the Naval Research Laboratory.

Today I want to anticipate you that two hackers have announced to be able to de-anonymize Tor users easy, the two experts Alexander Volynkin and Michael McCord will present the results of their study at the next Black Hat 2014.

In the presentation they have announced, titled “YOU DON’T HAVE TO BE THE NSA TO BREAK TOR: DEANONYMIZING USERS ON A BUDGET“, the experts will show how to identify Tor users with a very small budget, just $3,000.

There is nothing that prevents you from using your resources to de-anonymize the network’s users instead by exploiting fundamental flaws in Tor design and implementation. And you don’t need the NSA budget to do so. Looking for the IP address of a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild…”  “In this talk, we demonstrate how the distributed nature, combined with newly discovered shortcomings in design and implementation of the Tor network, can be abused to break Tor anonymity,” are the statements used by the two researchers to describe their work.

I confess you to be very excited to see the presentation of the two experts, as they had anticipated, with a limited budget, it is possible to track users on Tor network, so let’s imagine the capabilities of  a persistent attacker with much more computational capability and with a “couple gigabit links”. According to the two experts a persistent adversary “with a handful of powerful servers and a couple gigabit links can de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months.”

Many readers will be very happy to read about the this discovery, in fact, Tor network is used by many criminals for illicit activities, like botnet control, sale of drugs and weapons, and distribution of porn material.

But Tor network is a precious tool to avoid censorship and the discovery of the two researchers could be abused, and probably is already happening, to persecute Tor users that adopt the anonymizing network to avoid control and the Internet monitoring.

I personally hope that the researchers will carefully disclose the results of their study, notifying to Tor’s developers how to fix potential flaw in the Tor network design.

Stay tuned if the discovery is confirmed, millions of Tor network users are at risk.

Pierluigi Paganini

(Security Affairs –  Tor Network, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

6 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

12 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

19 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

19 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

1 day ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

2 days ago

This website uses cookies.