Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
The Internet Privacy

A Mysterious Threat Actor Is Running Hundreds of Malicious Tor Relays (therecord.media) 44

Since at least 2017, a mysterious threat actor has run thousands of malicious servers in entry, middle, and exit positions of the Tor network in what a security researcher has described as an attempt to deanonymize Tor users. The Record reports: Tracked as KAX17, the threat actor ran at its peak more than 900 malicious servers part of the Tor network, which typically tends to hover around a daily total of up to 9,000-10,000. Some of these servers work as entry points (guards), others as middle relays, and others as exit points from the Tor network. Their role is to encrypt and anonymize user traffic as it enters and leaves the Tor network, creating a giant mesh of proxy servers that bounce connections between each other and provide the much-needed privacy that Tor users come for. Servers added to the Tor network typically must have contact information included in their setup, such as an email address, so Tor network administrators and law enforcement can contact server operators in the case of a misconfiguration or file an abuse report. However, despite this rule, servers with no contact information are often added to the Tor network, which is not strictly policed, mainly to ensure there's always a sufficiently large number of nodes to bounce and hide user traffic.

But a security researcher and Tor node operator going by Nusenu told The Record this week that it observed a pattern in some of these Tor relays with no contact information, which he first noticed in 2019 and has eventually traced back as far as 2017. Grouping these servers under the KAX17 umbrella, Nusenu says this threat actor has constantly added servers with no contact details to the Tor network in industrial quantities, operating servers in the realm of hundreds at any given point. The actor's servers are typically located in data centers spread all over the world and are typically configured as entry and middle points primarily, although KAX17 also operates a small number of exit points. Nusenu said this is strange as most threat actors operating malicious Tor relays tend to focus on running exit points, which allows them to modify the user's traffic.

KAX17's focus on Tor entry and middle relays led Nusenu to believe that the group, which he described as "non-amateur level and persistent," is trying to collect information on users connecting to the Tor network and attempting to map their routes inside it. In research published this week and shared with The Record, Nusenu said that at one point, there was a 16% chance that a Tor user would connect to the Tor network through one of KAX17's servers, a 35% chance they would pass through one of its middle relays, and up to 5% chance to exit through one.
While all signs point to a nation-level and well-resourced threat actor who is behind this group, neither Nusenu nor the Tor Project wanted to speculate.
This discussion has been archived. No new comments can be posted.

A Mysterious Threat Actor Is Running Hundreds of Malicious Tor Relays

Comments Filter:
  • by Powercntrl ( 458442 ) on Friday December 03, 2021 @08:37PM (#62045233) Homepage

    There’s very little incentive for an average person to run a Tor exit node. It eats up your bandwidth and there’s a good likelihood you’ll have to answer nastygrams from your ISP (and they’re generally not all that understanding either, since people use “..but I’m running a Tor exit node!” as a plausible deniability excuse for their own illegal actions - piracy, spam, etc.)

    So yeah, naturally the network is going to have a problem with nodes run as government honeypots, since they have the resources and an agenda (de-anonymize criminals and catch ‘em). Same thing basically happened to Bitcoin - it was supposed to be a peer-to-peer network of just regular people running their machines to help secure the network, but then greed took over and now there’s really no reason (or profit) for an average person to mine Bitcoin on a single machine.

    • by tlhIngan ( 30335 )

      Thereâ(TM)s very little incentive for an average person to run a Tor exit node. It eats up your bandwidth and thereâ(TM)s a good likelihood youâ(TM)ll have to answer nastygrams from your ISP (and theyâ(TM)re generally not all that understanding either, since people use âoe..but Iâ(TM)m running a Tor exit node!â as a plausible deniability excuse for their own illegal actions - piracy, spam, etc.)

      Not to mention having to answer CAPTCHAs every other website because they use c

    • Since at least 2017, a mysterious threat actor...

      Sooner than at least 2017?

  • We will find out (Score:5, Interesting)

    by Papaspud ( 2562773 ) on Friday December 03, 2021 @08:40PM (#62045241)
    all of the TOR servers are either law enforcement or government agencies, they know everything you are doing..
    • by NagrothAgain ( 4130865 ) on Friday December 03, 2021 @09:07PM (#62045283)
      I'm guessing it's either the NSA, Interpol, China, or Russia. Whichever three it's not, most likely each have their own set of servers doing the same thing.
      • by Shag ( 3737 )

        I'm guessing it's either the NSA, Interpol, China, or Russia. Whichever three it's not, most likely each have their own set of servers doing the same thing.

        Given who created Tor in the first place, and what sorts of things people like to use it for, and which government agencies those people get surprise visits from, I'm not thinking NSA, but a different three-letter agency in the US government.

    • by Nahor ( 41537 )

      As long as the traffic goes through multiple non-cooperating agencies, then that's fine.That's the whole point of onion routing. Problems arise when the whole chain is controlled by only entity, which is, at least in part, what KAX17 seems to be trying.

  • (N)ational (S)tate (A)ctor
  • by Nocturrne ( 912399 ) on Friday December 03, 2021 @09:49PM (#62045353)

    No really... there are people that don't know this?

  • Does running your Tor browser over a VPN reduce or eliminate the risk of being traced?

    • It adds an element, but typically once there is enough known traffic de-anonymizing becomes possible. If governments want to spend the resources it is not particularly expensive, likely a few hundred to a few thousand dollars, expensive in aggregate but cheap per individual as they have a comprehensive system in place.
    • TOR reduces blanket surveillance. If a well enough resourced organisation or agency targets you, they can de-anonymise you easily & without you knowing so that they know who's talking to whom, when & where but not what about.
    • by ledow ( 319597 )

      Depends on what the endpoints are.

      The endpoint being a machine that's identifiable to you? Whoops. You're no better off. Maybe even worse-off.

      VPNs don't really solve much in terms of anonymity at all. You generally have to tell someone who you are in order to get one. That person - and you - can see everything you do over the VPN.

      And despite assurances from dozens of "We'll never tell anyone" VPN providers, they almost universally turn out to be either doing exactly that on the quiet anyway, usually at

  • by cstacy ( 534252 ) on Saturday December 04, 2021 @02:06AM (#62045747)

    The malicious exit nodes have a different profile, so that it doesn't look like they are related. They are slightly more trouble to operate, too. Bur behind the scenes, all the entry-traverse-exit information is correlated.

    Tor has been compromised for decades.

  • Similar projects happening for a long time: https://www.theregister.com/2017/08/25/brazilians_waxed_for_slurping_tor_addresses/ [theregister.com]
  • I've always been amused that anybody thinks a system/service designed primarily to help people hide their tracks when doing nefarious things, wouldn't be overrun by law enforcement and nation states? The notion that Tor really exists to help Chinese dissidents is a farce. It's just a front to cover criminal activity. The only safe VPN is one you set up yourself.

    • This is a ubiquitous piece of remarkably BAD ADVICE.

      Anonymity requires a "forest". If you are running a personally set up VPN, then the only person using it is you! Tracing back through a possible list of ONE is not a difficult undertaking.

      The matching recurring argument when this is pointed out is, "Oh but my VPN/VPS is using Amazon, millions of people use Amazon." That's like arguing that millions of people use the Internet. ONLY YOU are using that particular IP address. There is no forest unless others a

  • ... starts with "C" and rhymes with "hina".
  • Sounds a bit like Government scare mongering.

Utility is when you have one telephone, luxury is when you have two, opulence is when you have three -- and paradise is when you have none. -- Doug Larson

Working...