Tor Network: A large-scale attack to steal cryptocurrencies

Tor Network: A large-scale attack to steal cryptocurrencies

Someone is taking over Tor, since January there has been a group of hackers working tirelessly to hijack the private network, considered one of the most secure in the world, and currently control more than 10% of the exit nodes that allow intercepting the traffic of the network.

According to a report by independent security researcher nusenu, who has been monitoring the Tor network for years, more than 23% of the Tor network’s throughput capacity has been attacking Tor users.

Nusenu has been warning about the growing problem of malicious relays within the Tor network since December 2019, but so far this year has only gotten worse.

When we use a traditional browser our computer connects directly to the server of the website that we want to visit through a relatively simple route (PC> ISP router> Web server). With Tor, that path is much less direct and much more complex: the so-called Onion Routing.

Explained in the simplest possible way, Onion Routing calculates a more or less random route and makes the traffic go through several intermediate nodes, encrypting the message in several layers like those of an onion. Only the last node in the path can decrypt the message from the previous node, and the process is repeated several times.

The exit nodes or “exit relays” are the last hop in the chain of 3 relays and it is the only type of relay that gets to see the connection with the real destination chosen by the Tor browser user. It is these nodes that are being attacked. Depending on the protocol used (http vs. https), the exit node can see and manipulate the content that is transferred.

The Tor network consists of more than 7,000 nodes in its overlay network, and the hacking group that is attacking it has managed to operate 380 Tor exit nodes, which put the risk of traffic being compromised in one of four possibilities for each Tor user.

Tor has been fighting the problem, but despite three separate attempts to get rid of the malicious nodes, the group still controls more than 10% of the exit nodes to this day. The objective seems to be the theft of cryptocurrencies since hackers have launched attacks targeting users of cryptocurrency websites such as Bitcoin.

SHARE
Previous articleThe findings show how 600,000 Americans saved their lives from Covid 19
Next articleJustin Gaethje reveals how he plans to beat Khabib
Aakash Molpariya
Aakash started in Nov 2018 as a writer at Revyuh.com. Since joining, as writer, he is mainly responsible for Software, Science, programming, system administration and the Technology ecosystem, but due to his versatility he is used for everything possible. He writes about topics ranging from AI to hardware to games, stands in front of and behind the camera, creates creative product images and much more. He is a trained IT systems engineer and has studied computer science. By the way, he is enthusiastic about his own small projects in game development, hardware-handicraft, digital art, gaming and music. Email: aakash (at) revyuh (dot) com