Hacker Controlled Up to 27% of Tor Network to Steal Cryptocurrency

A hacker controlled up to 27% of the Tor network for more than a year in order to steal cryptocurrency. And in the process he “compromised” his Moscow address.

Control of the network lasted for more than 16 months. During this time, the hacker was able to intercept traffic dozens of times and carry out an attack on users who visited sites related to cryptocurrency topics.

Previously, we’ve told you about famous hacker attack on supercomputers to mine cryptocurrency. If you’ve missed it, you can read about this case here.

The essence of deception

The servers recognized outgoing traffic that was redirected to cryptocurrency resources. In addition, traffic was detected that carried out attacks with the removal of SSL. At the same time, the level of data security has decreased from HTTPS to HTTP.

Share of malicious server traffic

When did the attacks start?

According to Nusenu (the operator of the Tor node), the first signs of an attack appeared in January 2020. The hacker was able to attack the server as many as three times. And by February 2021, the volume of infrastructure created has reached 27% of the total volume of the Tor network. A little later, the network security team was able to disable the created servers. However, the hacker was able to control about 14% of the network.

Is it safe to use Tor? Or is it better to use alternatives like Utopia P2P? Read more here.

The RIPE database

Who is hiding under the hacker mask?

Nusenu also suggested who might be behind these attacks. By comparing the IP addresses using the RIPE database, he found the customer of the servers at the email address. The hosting company confirmed that the contact specified in RIPE is correct, and the physical address, which is located in Moscow, is also indicated there. However, Nusenu doubts that this physical address is real.

Hackers come up with more and more new ways of attacking. Recently, they hacked into security cameras around the world. If you are interested in what happened, read here.

Alternative to Tor

Although a few years ago Tor held a leading position, recently users are increasingly complaining about technical holes in the Tor security system.

Today, thanks to the development of technology, there are more advanced methods of protecting data on the internet. One example is the decentralized Utopia P2P ecosystem that provides free secure messaging, file sharing, browsing, and even anonymous payments. Using Utopia P2P, you can forget about incognito mode or VPNs. 

Try Utopia P2P and leave no traces on the internet!


Leave a Reply

Leave a comment

Your email address will not be published.