Anonymized Botnet?



Sans has a story on botnet traffic spotted coming from the TOR network. Now, I had to refresh my memory on what TOR is, but it’s an anonymizing network, essentially a computer running TOR, would collect a list of TOR client machines on the internet and then connections to other pcs are routed through encrypted connections through several different pcs, which masks the origination of the data request. Of course, this doesn’t mean that botnets are actively making use of TOR, it could just be an inadvertant…. “route all my traffic through TOR” computer got a bug….


Of course, now that this has been reported though…. we may well start seeing intentional use of anonymizing services for malware. It certainly looks as though it could muddy the waters in a few areas. Sans is suggesting Enterprise networking setups might consider blocking TOR.

They’ve also updated to say that it appears as though this is NOT a botnet specifically making use of TOR, but a machine that is routing all traffic through TOR that has picked up a bug.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 1 - A Hardware firewall Computers can communicate over networks. (Surprise!) That's how you're reading this post. The machine that this site is hosted on is listening for requests for connection. When it receives a request it answers back with a web page. In fact, computers can listen for a great many different kinds of......
  • Computer security day.... A few days ago - while musing about the botnet take-down of Blue Security - I said something along the lines of "Make sure your pc’s are clean from “bugs” and help your friends do likewise. Spread the word, we need a “worldwide clean your computer with antivirus and antispyware......
  • How to Remove Cyber Security | Cyber Security Removal Guide Cyber Security is a rogue antivirus application. It is in the same family as totalsecurity (total security Removal Guide) and SystemSecurity. This software installs through web popups and trojan horse activity makes false claims about your system being compromised by viruses and other security problems, hijacks we browser activity claiming......
Blog Traffic Exchange Related Websites
  • 3 Steps For Better Affiliate Income From Article Marketing Affiliate Marketing is one of the interesting ways of making money online. It’s trusted and proven method too because it relays on, how well you are marketing the affiliate product to the visitors. In fact, affiliate marketers are making millions online through paid methods. But always in Internet, we have......
  • San Francisco Fishing Charter with Captain Perry (and Personal Finance Links) A couple of weeks ago, my friend San Francisco Boater on a fishing expedition. He had made friend with Captain Perry Kerson who does fishing charters in San Francisco. SF Boater suggested that we go out and see what fish we can catch. On this day, the quest was......
  • Long Term Methods To Get More Blog Traffic (Social Media) - Part II Social media network tools are emerging like anything and its a great Internet evolution too. Yes, the advancement in the social technology and how people are addicted to such social media tools ? is unpredictable. Every year the percentage of social tool users are growing in great extent. When it......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site