• About
  • Advertise
  • Careers
  • Contact
Monday, February 6, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

Hackers Can Reduce Tor Network Performance For Just $17,000/mo: Research

by Cyber360 News
November 11, 2019
in Security
0
Hackers Can Reduce Tor Network Performance For Just $17,000/mo: Research
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Amongst privacy enthusiasts, the Tor network is a popular means to browse the internet anonymously. However, time and again, vulnerabilities have been found in the Tor network that allow hackers to exploit it. A new study has revealed that a hacker or a nation-sponsored bad actor can degrade the performance of the Tor network for a few thousand dollars per month.

The research has been conducted by Georgetown University and the US Naval Research Laboratory to analyze the cost for slowing down the Tor network through different methods. As per the researchers, accomplishing an attack against the entire network is a costly affair, and it would take $7.2 million per month and massive DDoS resources (512.73 Gbit/s).

jamf now

However, there are three types of bandwidth denial of service (DoS) attacks that can clog the Tor network. Thus, forcing users to abandon it owing to poor performance.

Attacking Tor Bridges Costs $17k Per Month

Instead of attacking individual Tor servers, bad actors can target Tor bridges. Tor bridges or Tor bridge relays are alternate entry points to the Tor network. These are not publically listed which makes them difficult to block.

Tor bridges are popular in countries where governments censorship bans the use of the Tor network. However, not all the Tor bridges (38) are functional right now. Out of the total 38 bridges, only 12 are operational and it would cost roughly $17,000 per month to saturate traffic in these bridges.

In case all the bridges are functional, the cost rises to $31,000 per month. It is a meager sum if a nation-state wants to stop its citizens from accessing the Tor network altogether.

jamf now

Attacking TorFlow Costs Just $2.8k Per Month

TorFlow is used to visualize the information about each Tor relay, and it’s also the network’s load balancing system. The system automatically monitors the inflow of traffic and directs it to different servers to stop servers from getting clogged.

If an attacker chooses to target TorFlow servers with constant DDoS attacks with the help of DDoS booter service, then it would cost just $2.8k per month. As per the researchers, such DDoS attacks reduce the download rate by 80%.

Attacking Tor Relay Costs Just $1.6k Per Month

The third means of attack to degrade the Tor network is attacking Tor relays. These are Tor servers that bounce traffic to keep your anonymity intact. For this type of attack, the researchers preferred exploiting vulnerabilities in the Tor protocol instead of using DDoS stressors.

By exploiting the flaws in the Tor protocol, attackers can increase the download time. This makes it ineffective for those who use the network for downloading files without revealing their IP address.

jamf now

In their analysis, the researchers found that the download time can be increased by 47% by spending just $1.6k per month. The speed can be further degraded to 120% with the cost rising to $6.3k per month.

Tor network DDoS attack cost
Source: Jansen et al

Researchers say that these methods do not affect the Tor network entirely but are enough to discourage users from using it because of its poor performance. Moreover, the costs we have seen isn’t much if a nation-state wants to drive away citizens from the Tor network.

As far as the mitigations are concerned, the researchers have suggested some changes in the Tor protocol and also recommend to move away from load balancing approached relying on centralized scanning. But what makes it difficult to achieve is that financing will be required to make these changes.

Also Read: Google Reveals 1.5% Of Chrome Users’ Passwords Are Compromised
Cyber360 News

Cyber360 News

Next Post
Google Reveals 1.5% Of Chrome Users’ Passwords Are Compromised

Google Reveals 1.5% Of Chrome Users’ Passwords Are Compromised

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In