Tor

Pierluigi Paganini July 16, 2015
TeslaCrypt 2.0 ransomware comes with significant improvements

Researchers at Kaspersky Lab have discovered a new strain of TeslaCrypt ransomware, version 2.0,  which was improved in a significant way. Malware researchers at Kaspersky detected a new strain of the TeslaCrypt ransomware (Trojan-Ransom.Win32.Bitman.tk), so-called TeslaCrypt 2.0, which includes a number of improvements. This ransomware also encrypts video game files, but the most significant improvement […]

Pierluigi Paganini July 02, 2015
Unknowns are cloning and booby trapping hundreds of Dark Web sites

Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. The “ahmia.fi” project census Dark Web websites, aka hidden services, by providing search engine functionalities by indexing the content present on the Tor network. Nurmi noticed an anomalous number of clones of hundreds […]

Pierluigi Paganini July 01, 2015
NIT, the Flash code the FBI used to deanonymize pedo’s on Tor

A look to the “NIT Forensic and Reverse Engineering Report, Continued from January 2015”. NIT code was used by the FBI to deanonymize Tor users. On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process […]

Pierluigi Paganini June 09, 2015
Vawtrak Uses Tor2Web making hard to track down its servers

Security experts at Fortinet uncovered a new strain of the Vawtrak banking Trojan is implementing an obscuring mechanism based on the Tor2Web service. The authors of the banking Trojan Vawtrak are adopting a new tactic to hide the traffic to its servers,  they are exploiting  the Tor2Web service to masquerade malicious connections. In the past, criminal crews behind […]

Pierluigi Paganini June 07, 2015
PunkSPIDER, the crawler that scanned the Dark Web

Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited  by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]

Pierluigi Paganini May 23, 2015
Astoria, the Tor client designed to beat the NSA surveillance

A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and reduce the efficiency of timing attacks. Tor and Deep web are becoming terms even popular among Internet users, the use of anonymizing network is constantly increasing for this reason intelligence agencies are focusing their efforts in its monitoring. […]

Pierluigi Paganini May 02, 2015
Tor Browser 4.5 released! It comes with many improvements

Tor Browser 4.5 released! It comes with many improvements for security, privacy and usability. Download it to protect your online privacy. Are you a frequent visitor of the deep web? Is the Tor Network a necessity for your online anonymity? You must download the new release for the Tor Browser, Tor Browser 4.5, that was designed with a […]

Pierluigi Paganini April 26, 2015
Dark Web Email Service SIGAINT hacked by the Intelligence

The Dark Web email service SIGAINT suffered a major attack that involved 70  exit nodes, a circumstance that suggests Government operation. Law enforcement and Intelligence agencies are always involved in the infiltration of Darknets and related services with the primary intent to monitor bad actors and de-anonymize users. The Tor-Based Dark Web Email Service SIGAINT is one […]

Pierluigi Paganini April 18, 2015
TheRealDeal black Marketplace Offers Zero-Day Exploits

A new deep web marketplace dubbed TheRealDeal has appeared and it is offering a platform for both sellers and buyers of the zero-day exploits. The anonymity ensured by the Dark Web and black markets it hosts is an element of attractive for cyber criminal and intelligence agencies. Black markets offer a wide range of illegal products and services, despite normal people believes that drugs and […]

Pierluigi Paganini April 04, 2015
Bugs in Tor exploited to run DoS against black markets

A severe vulnerability  in Tor network was exploited by attackers to run denial of service attacks against two underground black markets. An operator of an underground black market hosted on the Tor network revealed that hit site suffered a DoS attack that exploited a flaw in Tor architecture. The event is not isolated, a similar […]