Anonymized Botnet?



Sans has a story on botnet traffic spotted coming from the TOR network. Now, I had to refresh my memory on what TOR is, but it’s an anonymizing network, essentially a computer running TOR, would collect a list of TOR client machines on the internet and then connections to other pcs are routed through encrypted connections through several different pcs, which masks the origination of the data request. Of course, this doesn’t mean that botnets are actively making use of TOR, it could just be an inadvertant…. “route all my traffic through TOR” computer got a bug….


Of course, now that this has been reported though…. we may well start seeing intentional use of anonymizing services for malware. It certainly looks as though it could muddy the waters in a few areas. Sans is suggesting Enterprise networking setups might consider blocking TOR.

They’ve also updated to say that it appears as though this is NOT a botnet specifically making use of TOR, but a machine that is routing all traffic through TOR that has picked up a bug.

Related Posts

Blog Traffic Exchange Related Posts
  • Giving the gift of PC security Brian Krebs at the securityfix has a good article for those that are getting a new pc for Christmas (or those that know someone who is.) He has a nice outline of setting up limited privilege user accounts, installing windows updates, using a firewall and using antivirus. This is a......
  • 10 things to do before hooking a Linux PC up to the net An editor at tech republic gave a challange not too long ago to Linux users to step up and offer articles along the lines of the top 10 things to do before hooking a linux pc up to the internet. Click to read the first of these submissions (I don't......
  • How to Remove Cyber Security | Cyber Security Removal Guide Cyber Security is a rogue antivirus application. It is in the same family as totalsecurity (total security Removal Guide) and SystemSecurity. This software installs through web popups and trojan horse activity makes false claims about your system being compromised by viruses and other security problems, hijacks we browser activity claiming......
Blog Traffic Exchange Related Websites
  • Family Managment Made Simple I do my best to be organized when it comes to matters of our little family. I keep binders for a lot of things including a medical binder which holds all of our medical information. I'm always looking for new ways to keep track of our family information, and......
  • Traffic Building Tips To Make Your Blog A Popular Destination The problem with many "instant traffic" solutions to getting more traffic to a blog is that they're not sustainable and don't show you how to create quality traffic that lasts. What follows are some proven strategies that will enable you to generate targeted visitors to your blog who will keep......
  • Comparison Between Free Of Charge And Paid Web Comparison between free of charge and paid Web security software has turn into a main subject of discussion amongst probably the most of all computer users recently. Numerous people who have employed both free of charge as well as paid Web security software place their strong opinions. Although many people......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site