{"id":2516,"date":"2021-04-23T22:35:31","date_gmt":"2021-04-24T03:35:31","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=2516"},"modified":"2021-04-23T22:35:31","modified_gmt":"2021-04-24T03:35:31","slug":"botnets-using-tor-a-threat-exploited-by-criminals","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/","title":{"rendered":"Botnets using Tor, A threat exploited by criminals"},"content":{"rendered":"\n<p>Tor botnets are not a totally new concept, as they have been talked about since Defcon 18. However, over the last year we have been able to confirm some interesting facts regarding the use of these ideas in real botnets. This hidden Tor service protocol allows users to develop services, typically web servers, that can only be accessed from the Tor network via a random hostname ending with the fake .onion domain extension.<\/p>\n\n\n\n<p>One of these botnets that appeared were known as Atrax and Agent.PTA which use Web servers, not IRC, hidden in the Tor network for command and control purposes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tor Botnets Atrax and Agent.PTA<\/h2>\n\n\n\n<p>Atrax can download, run and inject malicious files into browser processes. Its functionality can be extended with plug-ins that are locally encrypted with an AES key generated with hardware parameters of each infected computer, it also comes with a Tor client component that manages to inject itself into the local browser to route the command and control traffic of the malware over the Tor network.<\/p>\n\n\n\n<p>ESET researchers were able to trick the Atrax command-and-control server into sending two additional plug-ins to a malware-infected test system. One of them was designed to steal input information on Web forms and the other could steal passwords.<\/p>\n\n\n\n<p>Agent.PTA is part of a malware family known since 2012, ESET researchers claimed. However the Tor functionality is a new added capability. In addition to being a Trojan with simple functions to intercept data from web forms and the ability to download additional functions. Furthermore, the Trojan can activate a proxy by SOCKS5 upon receiving a special command from the C&amp;C.<\/p>\n\n\n\n<p>These botnets have grown over time mostly because these types of botnets make it very difficult to investigate and track the location of the C&amp;C.<\/p>\n\n\n\n<p>Related topics:<br><a href=\"https:\/\/truxgoservers.com\/blog\/gafgyt-is-a-botnet-that-uses-mirai-ddos-modules\/\">Gafgyt is a botnet that uses Mirai DDoS modules<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/freakout-a-botnet-targeting-linux\/\">FreakOut \u2013 A Botnet targeting Linux<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tor botnets are not a totally new concept, as they have been talked about since Defcon 18. However, over the last year we have been able to confirm some interesting facts regarding the use of these ideas in real botnets. This hidden Tor service protocol allows users to develop services, typically web servers, that can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2518,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-2516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Botnets using Tor, A threat exploited by criminals - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Tor botnets are not something new and criminals use them to hide the real position of their command and control servers.....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Botnets using Tor, A threat exploited by criminals - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Tor botnets are not something new and criminals use them to hide the real position of their command and control servers.....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-24T03:35:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/botnet-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"Botnets using Tor, A threat exploited by criminals\",\"datePublished\":\"2021-04-24T03:35:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/\"},\"wordCount\":324,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/botnet-1.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/\",\"name\":\"Botnets using Tor, A threat exploited by criminals - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/botnet-1.png\",\"datePublished\":\"2021-04-24T03:35:31+00:00\",\"description\":\"Tor botnets are not something new and criminals use them to hide the real position of their command and control servers.....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/botnet-1.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/botnet-1.png\",\"width\":640,\"height\":420},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-using-tor-a-threat-exploited-by-criminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Botnets using Tor, A threat exploited by criminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Botnets using Tor, A threat exploited by criminals - Truxgo Server Blog","description":"Tor botnets are not something new and criminals use them to hide the real position of their command and control servers.....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/","og_locale":"es_MX","og_type":"article","og_title":"Botnets using Tor, A threat exploited by criminals - Truxgo Server Blog","og_description":"Tor botnets are not something new and criminals use them to hide the real position of their command and control servers.....","og_url":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-04-24T03:35:31+00:00","og_image":[{"width":640,"height":420,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/botnet-1.png","type":"image\/png"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"Botnets using Tor, A threat exploited by criminals","datePublished":"2021-04-24T03:35:31+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/"},"wordCount":324,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/botnet-1.png","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/","url":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/","name":"Botnets using Tor, A threat exploited by criminals - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/botnet-1.png","datePublished":"2021-04-24T03:35:31+00:00","description":"Tor botnets are not something new and criminals use them to hide the real position of their command and control servers.....","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/botnet-1.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/botnet-1.png","width":640,"height":420},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/botnets-using-tor-a-threat-exploited-by-criminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Botnets using Tor, A threat exploited by criminals"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=2516"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2516\/revisions"}],"predecessor-version":[{"id":2528,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2516\/revisions\/2528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/2518"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=2516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=2516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=2516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}