6.5 C
New York
Wednesday, January 20, 2021

Tor Network: A large-scale attack to steal cryptocurrencies

Must Read

Why the inaugural looks of Kamala Harris and Jill Biden matter?

Find out which brands experts choose and why it's relevant for them to choose one or the other style The...

Cradle of the Arab Spring: Tunisia engulfed by unrest

The authorities have deployed the national army in several provinces to protect government agencies. For the fourth day, Tunisia is...

A new solution to the mystery of Loch Ness Monster named

The legendary Nessie monster may be a species of "ancient sea turtle" that entered the lake during the end...
Aakash Molpariya
Aakash started in Nov 2018 as a writer at Revyuh.com. Since joining, as writer, he is mainly responsible for Software, Science, programming, system administration and the Technology ecosystem, but due to his versatility he is used for everything possible. He writes about topics ranging from AI to hardware to games, stands in front of and behind the camera, creates creative product images and much more. He is a trained IT systems engineer and has studied computer science. By the way, he is enthusiastic about his own small projects in game development, hardware-handicraft, digital art, gaming and music. Email: aakash (at) revyuh (dot) com

Someone is taking over Tor, since January there has been a group of hackers working tirelessly to hijack the private network, considered one of the most secure in the world, and currently control more than 10% of the exit nodes that allow intercepting the traffic of the network.

According to a report by independent security researcher nusenu, who has been monitoring the Tor network for years, more than 23% of the Tor network’s throughput capacity has been attacking Tor users.

Nusenu has been warning about the growing problem of malicious relays within the Tor network since December 2019, but so far this year has only gotten worse.

When we use a traditional browser our computer connects directly to the server of the website that we want to visit through a relatively simple route (PC> ISP router> Web server). With Tor, that path is much less direct and much more complex: the so-called Onion Routing.

Explained in the simplest possible way, Onion Routing calculates a more or less random route and makes the traffic go through several intermediate nodes, encrypting the message in several layers like those of an onion. Only the last node in the path can decrypt the message from the previous node, and the process is repeated several times.

The exit nodes or “exit relays” are the last hop in the chain of 3 relays and it is the only type of relay that gets to see the connection with the real destination chosen by the Tor browser user. It is these nodes that are being attacked. Depending on the protocol used (http vs. https), the exit node can see and manipulate the content that is transferred.

The Tor network consists of more than 7,000 nodes in its overlay network, and the hacking group that is attacking it has managed to operate 380 Tor exit nodes, which put the risk of traffic being compromised in one of four possibilities for each Tor user.

Tor has been fighting the problem, but despite three separate attempts to get rid of the malicious nodes, the group still controls more than 10% of the exit nodes to this day. The objective seems to be the theft of cryptocurrencies since hackers have launched attacks targeting users of cryptocurrency websites such as Bitcoin.

- Advertisement -
- Advertisement -

Latest News

Why the inaugural looks of Kamala Harris and Jill Biden matter?

Find out which brands experts choose and why it's relevant for them to choose one or the other style The...
- Advertisement -

More Articles Like This

- Advertisement -