Friday, January 22, 04:10
Home security CISA and FBI warn businesses of Tor's risks

CISA and FBI warn businesses of Tor's risks

The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) issued a warning to businesses about them risks associated with Tor.


Tor software, managed by a non-profit organization Tor Project, has been created to provide anonymity to users and bypass censorship.

However, in addition to ordinary users, this software has also attracted their attention hacker, who use it to cover their tracks when carrying out illegal activities.

Some of the malicious activities carried out by malicious agents include monitoring, system breach, data mining, denial of service (DoS) attacks and dissemination. ransomware. In addition, Tor is often used to communicate with a command and control server (C&C).

Tor's use allows an attacker to hide his identity and prevent a quick recovery from one cyber attack. For this reason, the businesses they must take the necessary measures to block and monitor all traffic to and from the Tor network, in order to detect any illegal activities.

According to the protection agencies, each company should be able to understand if users want the software to be legal. activities and of course take into account the risks involved.

To detect malicious activity from Tor, businesses can use analysis based on indicators or behavior for log files. network, endpoint and security tools. Tools SIEM and the like, can help in this direction.

Η CISA In fact, some steps have been taken that companies can follow to protect themselves from the risks associated with Tor, such as controlling and analyzing traffic on a network or even blocking data entering and exiting public nodes.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Mac: How to see which model you have and when it was released

When you need support for your Mac - or want to install some kind of upgrade - you usually need to know the exact ...

Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...