Anonymized Botnet?



Sans has a story on botnet traffic spotted coming from the TOR network. Now, I had to refresh my memory on what TOR is, but it’s an anonymizing network, essentially a computer running TOR, would collect a list of TOR client machines on the internet and then connections to other pcs are routed through encrypted connections through several different pcs, which masks the origination of the data request. Of course, this doesn’t mean that botnets are actively making use of TOR, it could just be an inadvertant…. “route all my traffic through TOR” computer got a bug….


Of course, now that this has been reported though…. we may well start seeing intentional use of anonymizing services for malware. It certainly looks as though it could muddy the waters in a few areas. Sans is suggesting Enterprise networking setups might consider blocking TOR.

They’ve also updated to say that it appears as though this is NOT a botnet specifically making use of TOR, but a machine that is routing all traffic through TOR that has picked up a bug.

Related Posts

Blog Traffic Exchange Related Posts
  • The Great Cyberwar It went un-noticed by most people for a few years. After all, the ones that were affected were just those that were "asking for it". Where to start. Let's see, back in the day there were some that sent out messages to other peoples computers and even when people tried......
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
  • Computer security software nets $2.6 Billion over last two years. SecurityFix is talking about the computer security industry. Further, computer users spend $9 billion a year on computers repairs from spyware and antivirus. This reminds me of a recent story of a man that threw out a perfectly good machine because it was infested with spyware. For starters, I do......
Blog Traffic Exchange Related Websites
  • Is Cloud Computing Genuinely A Fantastic Strategy? I am positive that if you are visiting this page, you will be interested in wired tree support. People of us in the IT world are generally in favor of all the recent developments in the personal computer know-how discipline. For instance, the explosion of the Internet from a handful......
  • 3 Steps For Better Affiliate Income From Article Marketing Affiliate Marketing is one of the interesting ways of making money online. It’s trusted and proven method too because it relays on, how well you are marketing the affiliate product to the visitors. In fact, affiliate marketers are making millions online through paid methods. But always in Internet, we have......
  • Battling Conventional Telecom and Media Providers Yesterday I prevailed in my little struggle with AT&T over saving money on our landline telephone. Since I was unable to fully downgrade our service using online account management, I connected to the site as a potential new customer so I could engage the online, real-time chat person/robot. When she/it......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site