Anonymized Botnet?



Sans has a story on botnet traffic spotted coming from the TOR network. Now, I had to refresh my memory on what TOR is, but it’s an anonymizing network, essentially a computer running TOR, would collect a list of TOR client machines on the internet and then connections to other pcs are routed through encrypted connections through several different pcs, which masks the origination of the data request. Of course, this doesn’t mean that botnets are actively making use of TOR, it could just be an inadvertant…. “route all my traffic through TOR” computer got a bug….


Of course, now that this has been reported though…. we may well start seeing intentional use of anonymizing services for malware. It certainly looks as though it could muddy the waters in a few areas. Sans is suggesting Enterprise networking setups might consider blocking TOR.

They’ve also updated to say that it appears as though this is NOT a botnet specifically making use of TOR, but a machine that is routing all traffic through TOR that has picked up a bug.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove Cyber Security | Cyber Security Removal Guide Cyber Security is a rogue antivirus application. It is in the same family as totalsecurity (total security Removal Guide) and SystemSecurity. This software installs through web popups and trojan horse activity makes false claims about your system being compromised by viruses and other security problems, hijacks we browser activity claiming......
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
  • How to Remove APCSecure | APCSecure Removal Guide APCSecure is yet another rogue antivirus application from the prolific and annoying wini family of rogues. This particular variant also comes with a rootkit called TDL3. Trojans are used to promote this rogue antivirus and you will likely find that it will create multiple empty files on your computer that......
Blog Traffic Exchange Related Websites
  • Security - The Blackhole Of Internet Businesses Nowadays, we can see most of businesses are taking advantage over the World Wide Web (known as the Internet) to market and promote their products and services. It is a must for any businesses to integrate their operations onto the Internet to make sure that they can become the best......
  • Is Cloud Computing Genuinely A Fantastic Strategy? I am positive that if you are visiting this page, you will be interested in wired tree support. People of us in the IT world are generally in favor of all the recent developments in the personal computer know-how discipline. For instance, the explosion of the Internet from a handful......
  • Long Term Methods To Get More Blog Traffic (Social Media) - Part II Social media network tools are emerging like anything and its a great Internet evolution too. Yes, the advancement in the social technology and how people are addicted to such social media tools ? is unpredictable. Every year the percentage of social tool users are growing in great extent. When it......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site