My next class:
Cloud Security for LeadersOnline | US EasternFeb 10th - Feb 14th 2025

Botnet traffic using TOR

Published: 2006-07-12. Last Updated: 2006-07-13 04:51:39 UTC
by Jason Lam (Version: 2)
0 comment(s)
A reader (AnthraX101) recently wrote to us about seeing botnet traffic leaving TOR network towards Internet. We are not sure at this point whether the botnets itself uses TOR or just a specific machine configured to route everything through TOR. Either way, if malware start using TOR to report back centrally, it might make detecting them more difficult. From an incident handler perspective, it makes pinpointing the victims more difficult.

For the Enterprise security folks, it might be time for you to consider blocking the use of TOR.

Update:

After working with REN-ISAC on this, we have determined this specific instance is not a TOR enabled botnet, the traffic likely was configured to flow thru TOR on the host.


Keywords:
0 comment(s)
My next class:
Cloud Security for LeadersOnline | US EasternFeb 10th - Feb 14th 2025

Comments


Diary Archives