Anonymized Botnet?



Sans has a story on botnet traffic spotted coming from the TOR network. Now, I had to refresh my memory on what TOR is, but it’s an anonymizing network, essentially a computer running TOR, would collect a list of TOR client machines on the internet and then connections to other pcs are routed through encrypted connections through several different pcs, which masks the origination of the data request. Of course, this doesn’t mean that botnets are actively making use of TOR, it could just be an inadvertant…. “route all my traffic through TOR” computer got a bug….


Of course, now that this has been reported though…. we may well start seeing intentional use of anonymizing services for malware. It certainly looks as though it could muddy the waters in a few areas. Sans is suggesting Enterprise networking setups might consider blocking TOR.

They’ve also updated to say that it appears as though this is NOT a botnet specifically making use of TOR, but a machine that is routing all traffic through TOR that has picked up a bug.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove APCSecure | APCSecure Removal Guide APCSecure is yet another rogue antivirus application from the prolific and annoying wini family of rogues. This particular variant also comes with a rootkit called TDL3. Trojans are used to promote this rogue antivirus and you will likely find that it will create multiple empty files on your computer that......
  • 10 things to do before hooking a Linux PC up to the net An editor at tech republic gave a challange not too long ago to Linux users to step up and offer articles along the lines of the top 10 things to do before hooking a linux pc up to the internet. Click to read the first of these submissions (I don't......
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
Blog Traffic Exchange Related Websites
  • 5 Easy Coin Collecting Mistakes Coin collecting is something that is fun for all ages and all personalities, as individuals can find their own reasons to want to have a collection. Each collection is unique and reflects the personality of the collector. If you are thinking about getting into coin collecting you are going to......
  • 3 Steps For Better Affiliate Income From Article Marketing Affiliate Marketing is one of the interesting ways of making money online. It’s trusted and proven method too because it relays on, how well you are marketing the affiliate product to the visitors. In fact, affiliate marketers are making millions online through paid methods. But always in Internet, we have......
  • Comparison Between Free Of Charge And Paid Web Comparison between free of charge and paid Web security software has turn into a main subject of discussion amongst probably the most of all computer users recently. Numerous people who have employed both free of charge as well as paid Web security software place their strong opinions. Although many people......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site