IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Tor network users may have been identified by hackers

The internet privacy protecting service said it doesn’t know how much information about its users was recorded

Tracking

The anonymous internet network Tor has been hacked, allowing an unknown person or persons to track user information.

Tor is designed to protect the identity of users by distributing commands around the globe, rather than in the user's location. People who need to protect their identity, such as human rights activists and criminals, commonly use the service to try and evade government tracking.

However, it has been revealed by German media the NSA has logged the identity of many of its users living outside of the United States in the past.

The network said in a blog post, alerting users to the issue: "While we don't know when they started doing the attack, users who operated or accessed hidden services from early February through July 4 should assume they were affected."

It also said it doesn't know how many users of the service were affected.

Amichai Shulman, CTO of Imperva says such services are often used and abused by pirates and hardened criminals who use it to hide child pornography, drug trafficking and terrorism activities.

He said: "This in turn makes the Tor network a target for all intelligence agencies as well as some domestic security organizations. I suspect the reported attack, targeted mostly at people who operate and access Tor hidden service, is of that origin."

Fred Touchette, manager of security research at AppRiver, explained the hacker may have seen the fact the service is trying to keep people anonymous as a challenge.

"Ever since its conception people have been trying to find a way to de-anonymize the users of Tor. Oftentimes this was done to make it a stronger network and repair its issues, but other times it was in order to out its users," he said.

"One such situation comes to mind and that's the take down of The Silk Road. The Feds spent plenty of time trying to crack the code before they were able to simply take control of the servers that hosted the site."

Tor has advised its users to download and install the latest version of the software, which includes a patch for a vulnerability discovered by Carnegie Mellon University.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

19 Nov 2021
Iranian hackers ramp up attacks against IT services sector
hacking

Iranian hackers ramp up attacks against IT services sector

19 Nov 2021
TikTok phishing campaign tried to scam over 125 influencer accounts
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

18 Nov 2021

Most Popular

Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022
The top programming languages you need to learn for 2022
Careers & training

The top programming languages you need to learn for 2022

23 Jun 2022