Skip to main content

Rogue Tor node wraps executables with malware

posted onOctober 28, 2014
by l33tdawg

Josh Pitts of Leviathan Security Group has uncovered a malicious Tor exit node in Russia. The node wraps Windows executable files inside a second, malicious Windows executable. The wrapping is only attempted on uncompressed Windows PE (Portable Executable) files.

Tor is an anonymizing network which can be used, for good or ill, to hide the source of a request of a server. The recipient of the user request, in this case the site from which a file is being downloaded, would see the exit node as the originator of the communications. At no point in the path of a communication through Tor are both the real source and destination IP addresses unencrypted, and the routes through the Tor network are randomized, making eavesdropping within the network difficult at a minimum.

Source

Tags

Tor Security Viruses & Malware

You May Also Like

Recent News

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th