Tuesday, August 4, 11:51
Home security CISA and FBI warn businesses of Tor's risks

CISA and FBI warn businesses of Tor's risks

The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) issued a warning to businesses about them risks associated with Tor.

Tor

Tor software, managed by a non-profit organization Tor Project, has been created to provide anonymity to users and bypass censorship.

However, in addition to ordinary users, this software has also attracted their attention hacker, who use it to cover their tracks when carrying out illegal activities.

Some of the malicious activities carried out by malicious agents include monitoring, system breach, data export, denial of service (DoS) attacks, and dissemination. ransomware. In addition, Tor is often used to communicate with a command and control server (C&C).

Tor's use allows an attacker to hide his identity and prevent a quick recovery from one cyber attack. For this reason, the businesses they must take the necessary measures to block and monitor all traffic to and from the Tor network, in order to detect any illegal activities.

According to the protection agencies, each company should be able to understand if users want the software to be legal. activities and of course take into account the risks involved.

To detect malicious activity from Tor, businesses can use analysis based on indicators or behavior for log files. network, endpoint and security tools. Tools SIEM and the like, can help in this direction.

Η CISA In fact, some steps have been taken that companies can follow to protect themselves from the risks associated with Tor, such as controlling and analyzing traffic on a network or even blocking data entering and exiting public nodes.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

Google: Prohibits ads related to hacked political content!

Shortly before this year's US presidential election in November, Google announced a new policy for ...

NetWalker ransomware: Over $ 25 Million in Gang Profits Since March

NetWalker ransomware operators are estimated to have earned over $ 25 million from ransom payments made by their victims ...

Elon Musk: "Obviously the aliens built the pyramids"

On Friday, Elon Musk tweeted: "Apparently the aliens built the pyramids," and garnered more than 500.000 likes.
00:01:54

Microsoft Edge behaves like malware

Microsoft has switched to aggressive marketing tactics trying to get Windows 10 users to adopt the new browser ...

Cyble: warns of 199 data breaches

Carrying out its well-established research on the dark web and deep web, Cyble detected 199 data breaches on various websites and companies ....

Microsoft Cortana bids farewell to Android and iOS

In a statement released on July 31, the company said it would withdraw the Cortana virtual assistant from iOS devices and ...

2gether: Hacking attack on cryptocurrency trading platform

2gether revealed that it was hacked, during which approximately 1,2 million Euros in cryptocurrencies were stolen from investment accounts in cryptocurrencies ....

Google: 11 zero day vulnerabilities were identified in the first half of 2020

According to the Google Project Zero team, 11 zero day vulnerabilities were identified, which were exploited by malicious agents, within the first ...

Linux Kernel 5.8: Released with countless improvements and changes

Recently, Linus Torvalds announced the release of the Linux 5.8 kernel. According to him, the new kernel ...

Moldovan pleaded guilty to creating FastPOS malware!

A 30-year-old man from Moldova pleaded guilty to creating FastPOS malware that infects POS systems worldwide ....