Modern field guide to security and privacy

Opinion: The value of unmasking Tor's dark side

The identity shrouding Tor browser is a godsend for many people – including criminals – trying to avoid detection online. But using it doesn't erase everyone's digital footprints, giving researchers many clues for hunting down Tor's more nefarious users.

|
Ueslei Marcelino/Reuters

The anonymizing browser Tor is an ideal tool for political activists – especially those living in repressive countries – and journalists dealing with sensitive information or anyone who wants to navigate the Web with a strong layer of security and privacy.

But because of the secrecy it affords users, unfortunately Tor has also become the province of criminal hackers, online drug dealers, child pornographers, and merchants of malicious software. That's why being able to monitor what happens under the shelter of Tor – to the best of our abilities – is increasingly important for cybersecurity firms to determine where the bad guys are going, how they are operating, and what they are planning on doing next. 

While many might think this undermines the intent of Tor and threatens the integrity of the service, it's critical to identify illicit use of Tor to have insight into hacker targets and techniques. That information is so valuable that numerous others have attempted to break the anonymity that Tor provides, but that's not necessary, or warranted. There are enough identifiers that exist on the edges of Tor – through its entry points – to track many people who use it to shroud their activities. 

Regardless of anyone's reasons for using Tor, one thing to remember while using it is that it doesn't provide bulletproof security. 

In fact, my firm recently honed in on a specific hacker group that unsuccessfully used Tor to hide its activities. We identified their e-mails, passwords, connections, and the geographic regions where they operated. We know their hacker handles and where they like to trade their information on the open Web. 

What often opens up Tor users to being compromised – and therefore tracked – is that the service is only as private as the actual website users visit and services they are using while logged into Tor. 

Even though Tor masks Internet traffic to keep users' identities hidden, it still works by connecting to the same Internet that we all use. This happens with Tor exit nodes – the gateways where encrypted Tor traffic hits the Internet. Because these addresses are identifiable (an excellent service is available here), we are able to search for their usage elsewhere on the Web. They may show up in a piece of malware code, in a traffic log indicating a distributed denial of service (DDoS) attack or in some more interesting places as well.

Our analysts have identified all known Tor exit node internet protocol (IP) addresses and executed a massive, automated scan of the entire Web for any references for them. 

The results were shocking. We were able to uncover multiple databases for illegal hacking and DDoS services as well as references to hundreds of users who were likely using Tor in hopes for anonymity. However, we were able to tie these "anonymous" users to specific individuals by cross-referencing the information we found with other uniquely identifying data such as hacker nicknames, personal e-mail addresses, passwords, and using this information to conduct link and network analysis.

In short, we were able to trace criminal hackers from the edges of Tor to the open Web social media sites, services, and hacker groups they connected with elsewhere on the Internet. As a result, we gained a fuller picture of their activities, habits, and the other illegal services – and practices – they're involved in.

"There are multiple lessons here. For one, Tor can't cloak all Internet activities. There are many solid references for how to cleverly use Tor data – find them and follow them."

Christopher Ahlberg is the cofounder and chief executive officer of the threat intelligence firm Recorded Future, which received funding from Google Ventures, IA Ventures, and the CIA backed venture capital outfit In-Q-Tel. 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Opinion: The value of unmasking Tor's dark side
Read this article in
https://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0720/Opinion-The-value-of-unmasking-Tor-s-dark-side
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe