A severe vulnerability  in Tor network was exploited by attackers to run denial of service attacks against two underground black markets. An operator of an underground black market hosted on the Tor network revealed that hit site suffered a DoS attack that exploited a flaw in Tor architecture. The event is not isolated, a similar […]
Internet users that want to create a new account on Twitter through the Tor network must now provide a phone number to verify their identity. A few days ago, Twitter announced plans to begin tracking users via their mobile phone number, a measure that the company consider necessary in order to fight the trolls. Following the […]
Security Experts at Microsoft discovered a new variant of CryptoWall 3.0 ransomware that adopts I2P Anonymity Network for C&C Communications. A new version of CryptoWall ransomware has been detected in the wild by experts at Microsoft, just a week after I reported that Ciscoâs Talos Security Intelligence and Research Group detected a new strain of the same […]
Security experts collected further evidences of the link between the CosmicDuke, Miniduke and OnioDuke Advanced Persistent Threat campaigns. Researchers at F-Secure firm are constantly monitoring the cyber espionage campaigns MiniDuke, CosmicDuke and OnionDuke and provided an interesting update on the hacking operation. Below a short description of the campaigns: MiniDuke: Kaspersky Lab and Hungaryâs Laboratory of Cryptography and System Security, or CrySyS, […]
A new collection of documents leaked by Snowden and disclosed by the Der Spiegel reveals the difficulties of Intelligence agencies to de-anonymize Tor users A new collection of NSA documents crawled by the Edward Snowden was leaked online during the weekend, the German news agency Der Spiegel has published online a dump of PDF files […]
Operation Tornado is the first time that FBI deployed a tracking code broadly against every visitor to a website, instead of targeting a particular user. The Wired portal has published a detailed post to describe how the FBI used a collection of freely available exploits and hacking tool to de-anonymize users in the Tor network. Wired revealed […]
Prime Minister Cameron announced that a newborn cyber unit composed by officials from GCHQ and NCA will fight online pedophiles even in the Deep Web. Prime Minister David Cameron has revealed that national intelligence agencies will join the efforts to track and arrest online abusers and pedophiles. The British Prime Minister announced that the British Intelligence […]
The Digital Citizens Alliance Security provided data related to the growth of dark markets like Evolution after the operation Onymous operated by police. Recently law enforcement in a joint effort against cybercrime, dubbed operation Onymous, seized dozens of black markets on Tor Networks. While all the the underground marketplaces in the DeepWeb, including Silk Road 2.0, went […]
Speaking before the House Armed Services Committee the US Defense is worried by the capabilities of the ISIS members for keeping their communications covert. Last week American officials had yet another meeting to discuss about the difficulties to track the ISIS militants, emblematic is the case of the alleged death of its leader Abu Bakr al Baghdadi disproved by […]
Experts at F-Secure discovered a link between the crew operating a rogue Tor node used to spread OnionDuke malware and MiniDuke APT. A few weeks ago the security research Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded by the users with malware. The researcher informed officials […]