Snowden revealed the existence of Skynet, a system designed by the NSA for online monitoring of terrorists and suspects through metadata analysis. Skynet is a real system designed by the NSA for online monitoring through metadata analysis, this is the last revelation made by the journalist Glenn Greenwald through the website The Intercept. The Intercept revealed the existence of a secret program called Skynet, […]
Cyber criminals are abusing even more Tor Network for illegal activities, from botnet management to money laundering, the number of services is increasing. Tor network is even more used by cyber criminals to cover their illegal activities, the Tor community has observed, for example an alarming increase in the number of malware that abuse of […]
Microsoft has uprooted Tor Browser from more than 2 Million Systems to eradicate Sefnit botnet. It has done it silently without user agreement. It was August 2013 when security experts noted a spike in Tor traffic network caused by cybercriminals activities, the malware specialists discovered a botnet based on Mevade malware, in mid-August the number […]
Kaspersky Lab experts have discovered a new Tor-based banking trojan named “ChewBacca”Â, it is the last malware exploiting Tor network. Tor network is a territory of exploration for cybercriminals that are increasing their attention in the popular anonymizing network for make more resilient malicious botnets. The principal advantages for adoption of hidden service in a […]
Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features including Bitcoin mining. Atrax is the name of the last crimekit that is sold in the underground market, its particularity is the capability to exploit Tor networks to communicate with Command & Control infrastructure. Jonas […]
Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the real responsible for the spike observed in the number of users directly connected to the Tor network? In an article I wrote recently I analyzed the impact on the use […]
As can be imagined and anticipated the soar of Bicoin value has attracted the interest of cybercrime, recently we read of malware authors and botmasters that trying to exploit new and old channels to steal virtual currency or mine it using computational resources of the victims. Security experts from Kaspersky Lab found variant of malware spread via […]
On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor. There are pro and cons for this design choice, of course the greatest advantage resides in the difficulty for the localization of the […]