Tor network users may have been identified by hackers

The internet privacy protecting service said it doesn’t know how much information about its users was recorded

Tracking

The anonymous internet network Tor has been hacked, allowing an unknown person or persons to track user information.

Tor is designed to protect the identity of users by distributing commands around the globe, rather than in the user's location. People who need to protect their identity, such as human rights activists and criminals, commonly use the service to try and evade government tracking.

However, it has been revealed by German media the NSA has logged the identity of many of its users living outside of the United States in the past.

The network said in a blog post, alerting users to the issue: "While we don't know when they started doing the attack, users who operated or accessed hidden services from early February through July 4 should assume they were affected."

Advertisement
Advertisement - Article continues below

It also said it doesn't know how many users of the service were affected.

Amichai Shulman, CTO of Imperva says such services are often used and abused by pirates and hardened criminals who use it to hide child pornography, drug trafficking and terrorism activities.

He said: "This in turn makes the Tor network a target for all intelligence agencies as well as some domestic security organizations. I suspect the reported attack, targeted mostly at people who operate and access Tor hidden service, is of that origin."

Fred Touchette, manager of security research at AppRiver, explained the hacker may have seen the fact the service is trying to keep people anonymous as a challenge.

"Ever since its conception people have been trying to find a way to de-anonymize the users of Tor. Oftentimes this was done to make it a stronger network and repair its issues, but other times it was in order to out its users," he said.

"One such situation comes to mind and that's the take down of The Silk Road. The Feds spent plenty of time trying to crack the code before they were able to simply take control of the servers that hosted the site."

Tor has advised its users to download and install the latest version of the software, which includes a patch for a vulnerability discovered by Carnegie Mellon University.

Advertisement
Related Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019