In a two-part series, TheRecord has confirmed Tor exit nodes are being used SSL Stripping attacks, SSL Downgrade attacks, and other man-in-the-middle (MITM) activity. These types of attacks occur when a web browser visiting a website is supposed to be redirected to the secure TLS (HTTPS) version of the site, but instead it uses unencrypted HTTP or an older version of SSL that is vulnerable to attack. Tor exit nodes are always in a position to relay network traffic for Tor users to Internet servers, so if the traffic is not encrypted to the website, the exit node can spy on the traffic. Some 27% of Tor exit relays have been shown to have acted in this capacity at one time, before maintainers at the Tor Project noticed and took action, taking that number down to 3% or 4% temporarily. The analyst Nusenu described the infrastructure on the ISP OVH and a newly observed network “Nice IT Services Group.” Nusenu sums up the exploitation and danger stating “They perform person-in-the-middle attacks on Tor users by manipulating traffic as it flows through their exit relays. They (selectively) remove HTTP-to-HTTPS redirects to gain full access to plain unencrypted HTTP traffic without causing TLS certificate warnings.”
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security