Remove tag tor
article thumbnail

Tor Project’s Bug Smash Fund raises $86K in August

Security Affairs

The Tor Project has raised $86,000 for a Bug Smash fund that it will use to pay developers that will address critical flaws in the popular anonymizing network. The Tor Project has raised $86,000 for a Bug Smash fund that was created to pay developers that will address critical security and privacy issues in the popular anonymizing network.

Privacy 81
article thumbnail

Tor Project released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android

Security Affairs

A new version of the popular Tor Browser was released by the Tor Project, it is Tor Browser 8.5.1 The Tor Project has released Tor Browser 8.5.1 can be downloaded for free from the Tor Browser download page and from the distribution directory. “Tor Browser 8.5.1 “Tor Browser 8.5.1

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quebec shuts down thousands of sites as disclosure of the Log4Shell flaw

Security Affairs

Query our API for "tags=CVE-2021-44228" for source IP addresses and other IOCs. Exploitation occurring from ~100 distinct hosts, almost all of which are Tor exit nodes. Tags available to all users and customers now. threatintel — Bad Packets (@bad_packets) December 10, 2021.

Libraries 110
article thumbnail

BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands

Security Affairs

They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network. and recently introduced a search by stolen victim’s passwords, and confidential documents leaked in the TOR network. The notorious cybercriminal syndicate BlackCat competes with Conti and Lockbit 3.0.

article thumbnail

ALPHV/BlackCat ransomware gang claims to have stolen data from Creos Luxembourg S.A.

Security Affairs

Despite the fact Blackcat and Alpha have completely different URLs in TOR Network, the scripting scenarios used on their pages are identical, and likely developed by the same actors. The group was the pioneer of search in the indexed stolen data – allowing customers and employees of the affected companies to check exposed data.

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Spur.us , a startup that tracks proxy services, told KrebsOnSecurity that the Internet addresses Lumen tagged as the AVrecon botnet’s “Command and Control” (C2) servers all tie back to a long-running proxy service called SocksEscort. SocksEscort[.]com com , is what’s known as a “SOCKS Proxy” service. .”

Analytics 196
article thumbnail

TrickBot operators continue to update their malware to increase resilience to takedown

Security Affairs

.” Experts also observed important differences between the lists of plugin server configurations, TrickBot operators have apparently eliminated the Tor plugin services and have added the new <psrva> tags, likely obfuscated IPs. This technique was also implemented by the Bazar backdoor.