An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this “would not prevent copycat attackers from the more than 100 exit nodes in operation.”
Net Security reports that the exit node was “adding malicious code to the binaries in question – code that made their computers open a port to send HTTP requests to and receive commands from a remote server.” The error was found by security researcher Josh Pitts, who created a tool to test for this and presented it at DerbyCon, but the discovery of the rogue node proves that this kind of attack is actively being used.
Tor users targeted with exit node malware
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.