Your new post is loading...
Your new post is loading...
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Last week, user Virgil Griffith went onto the Tor-talk mailing list and announced Onion City, a Dark Web search engine that allows regular web users to delve into the Dark Web.
The search engine delves into the anonymous Tor network, finds .onion sites and makes them available to regular users on the ordinary World Wide Web.
Up to now the best way to search for .onion sites has been to get on the Tor network using something like the Tor browser, but Onion City effectively does that bit for you so you can search from the comfort of your favourite, insecure web browser.
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.
So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
|
Scooped by
Gust MEES
|
The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week.
Cybercrime, just like any other illegal activity, is hard to eradicate completely. Whenever illegal services are taken down, the gap created will always be filled by other criminals willing to profit from the opportunity. The reality we have to accept is that there will always be demand for such services.
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
|
Scooped by
Gust MEES
|
Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.
The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
|
Scooped by
Gust MEES
|
If you control enough of the Tor network, it’s possible to get a kind of bird’s eye view of the traffic being routed through it. It was clear that Tor thought the Carnegie Mellon researchers were responsible. The researchers refused to talk to the press, but a conference spokesperson told Reuters the talk was canceled because the researchers hadn’t cleared the release of their work through their department, the Software Engineering Institute, which is funded by the Defense Department.
At the time, many assumed that the university pulled the plug on the talk because of the gray legal zone it was in, with the researchers casually intercepting Web traffic. But maybe it got pulled because the researchers were revealing a law enforcement technique that the government did not want publicized. If nothing else, it’s highly likely the information the researchers collected about “drug dealers and child pornographers” made its way into law enforcement hands. McCord said he was “unable to comment on the matter.” Carnegie Mellon’s SEI declined comment about the canceled talk and about whether it had provided information from the research to law enforcement.
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Cyber criminals can infiltrate your mobile devices with the just discovered first "TOR Trojan for Android".
|
Scooped by
Gust MEES
|
The feds have caught up to the Silk Road. The underground website long known for drug trafficking was seized by the FBI who also arrested the owner on three criminal counts.
|
Scooped by
Gust MEES
|
In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript ai...
Those who use online anonymizing technologies to obscure their location are assumed to be non-US persons and should thus continue to be targeted by surveillance. That's one of many revelations comi...
|
Scooped by
Gust MEES
|
|
|
Scooped by
Gust MEES
|
Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.
Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
|
Scooped by
Gust MEES
|
Das Tor-Netzwerk: Dort tummeln sich Whistleblower, Aktivisten, politisch Verfolgte, aber auch Drogenhändler oder Pädophile. Alle wollen dort aus unterschiedlichen Motiven ihre Anonymität bewahren. Es gibt aber Zweifel an der Effektivität der Anonymisierung.
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.
Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of suspects hiding behind the Tor anonymity network.
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
C’est dans un message diffusé sur le blog du système d’anonymisation TOR que l’on apprend, du moins que nous avons la confirmation, du piratage du système TOR. Comme nous vous l’indiquions sur zataz, voilà une dizaine de jours, nous nous étonnions de la disparition d’une conférence dédiée à la surveillance de TOR lors du Black Hat 2014 de Las Vegas. La conférence de d’Alexander Volynkin et Michael McCord devait revenir sur les moyens de rendre beaucoup moins anonymes les utilisateurs du système. TOR, donc, via son blog explique que ce “4 juillet, nous avons trouvé un groupe de relais dont le but supposé était de contourner l’anonymat des utilisateurs. Il semble qu’ils ciblaient les internautes qui utilisent Tor pour accéder ou exploiter des services cachés. Les attaques entraînaient la modification des en-tête de Tor pour s’effectuer.” Bref, nous revoilà avec le coup de 2007 et la lecture des données passant par les ordinateurs permettant à TOR de fournir l’anonymat tant recherché. Une technique d’espionnage démontrée par Dan Egerstad qui avait permis de révéler des centaines de données sensibles d’ambassades ou encore du Dalaïlama.
Article original appartenant à zataz.com : ZATAZ Magazine » Piratage de TOR confirmé par… TOR http://www.zataz.com/piratage-de-tor-confirme-par-tor/#ixzz38zXP7urA Follow us: @zataz on Twitter
|
Scooped by
Gust MEES
|
Das Anonymisierungsnetzwerk TOR wird inzwischen auch durch Online-Kriminelle gern genutzt. Kaspersky Lab kennt mittlerweile etwa 900 Dienste der Online-Kriminalität, die sich im so genannten Darknet verstecken. Dazu zählen etwa Kommando-Server für Bot-Netze.
|
Scooped by
Gust MEES
|
Das Federal Bureau of Investigation (FBI) hat den Untergrund-Online-Marktplatz für Drogen Silk Road geschlossen. Über die Plattform konnten unter anderem Heroin, Kokain und Crystal Meth gegen die virtuelle Währung Bitcoin erworben werden.
Tous les accès corrompus au réseau maillé TOR l'ont été grâce à une faille du TOR Bundle exploitée sur Windows. Une solution : switchez, affirme l'équipe derrière TOR.
Via Frederic GOUTH
|
Scooped by
Gust MEES
|
Keeping their botnet's C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified...
|
Scooped by
Gust MEES
|
The Trojan in question has DDoS and Bitcoin-mining capabilities, but it's main function is to steal banking credentials. The botnet operator spreads the malware via the Usenet discussion forum, which is also a popular platform for distributing pirated content. In order to hide its malicious nature, the file "weighs" 15MB, a great part of which is junk data. The rest consists of a ZeuS bot, a Tor client for Windows, the CGMiner bitcoin mining tool, and a copy of a DLL file used by CGMiner for CPU and GPU hash cracking. Read more, a MUST: http://www.net-security.org/malware_news.php?id=2357
|
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR