Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Tor network used to hide 900 botnets and darknet markets, says Kaspersky Lab

Uncovers abuse of network

Article comments

The Tor network is in danger of being swamped by criminals abusing its anonymity to hide an underworld of parasitic botnets, malicious command and control and ‘darknet’ markets, according to research from Kaspersky Lab.

Tor has long had its dark side but the scale of its use by criminals appears to have expanded quite rapidly in the last year. Kaspersky Lab had uncovered evidence of 900 services using Tor, said researcher Sergey Lozhkin, through its 5,500 plus nodes (server relays) and 1,000 exit nodes (servers from which traffic emerges).

A particular niche was the rise of underground markets that use Tor to hide their activity. “It all started from the notorious Silk Road market and evolved to dozens of specialist markets: drugs, arms and, of course, malware,” said Lozhkin.

It was here that a growing number of forums dealing in stolen card data were finding a home, he said. Predictably, trade on these markets was now based almost entirely on Bitcoins, which can’t be traced to individuals.

“Hosting C&C servers in Tor makes them harder to identify, blacklist or eliminate. Although, creating a Tor communication module within a malware sample means extra work for the malware developers. We expect there will be a rise in new Tor-based malware, as well as Tor support for existing malware,” said Sergey Lozhkin

Examples of Tor abuse are legion and include a recent Android botnet, the first ever discovered to be using Tor from that platform. Conventional botnets have also experimented with Tor. Probably the most infamous Tor parasite yet was the Silk Road market used to trade drugs, weapons, indeed anything illegal.

Tor estimates the number of clients using its relays to be around 2.5 to 3 million at any one time, each one of whch can be used to host multiple malicious services through the system. The number of clients abusing the network is probaby small as a proportion of its user base but the same is true for the rest of the Internet too.

Tor’s traffic has been prone to dramatic surges, including one in September 2013 when traffic rose from under 1 million users per day to well over five million in the space of a week.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *