	{"id":16637,"date":"2013-08-05T10:57:53","date_gmt":"2013-08-05T17:57:53","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=16637"},"modified":"2013-08-07T14:09:34","modified_gmt":"2013-08-07T21:09:34","slug":"tor-anonymity-attacked-feds-suspected","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/","title":{"rendered":"Tor Anonymity Attacked &#8211; Feds Suspected"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-Attacked.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16641\" alt=\"Tor-Attacked\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-Attacked.jpg\" width=\"500\" height=\"334\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-Attacked.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-Attacked-150x100.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-Attacked-300x200.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Some of the most noteworthy malware were likely considered a failure by their authors. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-september-26-2011-mac-flashback-trojan-horse-masquerades-as-flash-player-installer-package\/\">Flashback<\/a>, for instance, turned out to be <a href=\"http:\/\/www.computerworld.com\/s\/article\/9227260\/Mac_based_Flashback_click_fraud_campaign_was_a_bust_\">pretty much worthless<\/a> for its authors \u2013 when you\u2019re trying to stay under the radar of fraud detection, being a huge and almost-overnight success is not so good. Over the weekend, another moment of sketchy code flying into radar range occurred, which may have exposed a component of the US Government\u2019s <a href=\"http:\/\/www.wired.com\/threatlevel\/2007\/07\/fbi-spyware-how\/\" target=\"_blank\">CIPAV<\/a> data gathering tool.<\/p>\n<p>In case you\u2019re not keeping a running list of the acronyms and codenames used to describe shadowy government surveillance tools (Is there a single page for this somewhere? That\u2019d be super handy!) CIPAV stands for Computer and Internet Protocol Address Verifier. It was, at least in theory, meant to capture a variety of location data including MAC and IP address.<\/p>\n<p>The existence of the tracking tool first came to light in 2007, in a <a href=\"http:\/\/www.wired.com\/politics\/law\/news\/2007\/07\/fbi_spyware\">court filing pertaining to a high school kid<\/a> that made bomb threats. No samples were available at the time, so <a href=\"https:\/\/kevtownsend.wordpress.com\/2011\/05\/04\/fbi-cipav-spyware-and-the-anti-virus-companies\/\">AV companies were left to speculate<\/a> as to whether it would be detected. It\u2019s likely that the tool has been used to a limited extent <a href=\"http:\/\/www.wired.com\/threatlevel\/2009\/04\/fbi-spyware-pro\/\">since at least 2002<\/a>.<\/p>\n<p><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/08\/freedom-hosting\/\">This weekend<\/a>, a 0-day exploit was found that targets an <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mozilla-patches-16-vulnerabilities-with-firefox-17-upgrade\/\">older version of Firefox<\/a> that\u2019s used as part of a Tor browser package. This exploit was used to compromise a large number of \u201chidden services\u201d sites within the Tor network, effectively cutting off a significant chunk of the Tor &#8220;onion&#8221;. These compromised sites contained scripts to download a tracking tool that would identify the MAC address of the user\u2019s machine, and send this information to an IP address in northern Virginia, which would give the receiver the user\u2019s IP address as well.<\/p>\n<p>Because this exploit affected so many different sites, it attracted a lot of attention. It\u2019s unlikely that we will ever know for certain whom the real author was. Because the behavior of this script was so different from the usual financial motivation of malware, it seems likely that it was not the work of the usual suspects. And if this is indeed a tracking tool written by the government, there\u2019s probably a lot of scurrying going on right now to significantly re-write the code so as to get themselves back under criminals\u2019 radar.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/7606551@N03\/2259025329\/\">\/*dave*\/<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some of the most noteworthy malware were likely considered a failure by their authors. Flashback, for instance, turned out to be pretty much worthless for its authors \u2013 when you\u2019re trying to stay under the radar of fraud detection, being a huge and almost-overnight success is not so good. Over the weekend, another moment of [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":16643,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[553,569],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Some of the most noteworthy malware were likely considered a failure by their authors. Flashback, for instance, turned out to be pretty much worthless for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tor Anonymity Attacked - Feds Suspected - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Some of the most noteworthy malware were likely considered a failure by their authors. Flashback, for instance, turned out to be pretty much worthless for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-05T17:57:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-08-07T21:09:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"267\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg\",\"width\":400,\"height\":267},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/\",\"name\":\"Tor Anonymity Attacked - Feds Suspected - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#primaryimage\"},\"datePublished\":\"2013-08-05T17:57:53+00:00\",\"dateModified\":\"2013-08-07T21:09:34+00:00\",\"description\":\"Some of the most noteworthy malware were likely considered a failure by their authors. Flashback, for instance, turned out to be pretty much worthless for\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tor Anonymity Attacked &#8211; Feds Suspected\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Tor Anonymity Attacked &#8211; Feds Suspected\",\"datePublished\":\"2013-08-05T17:57:53+00:00\",\"dateModified\":\"2013-08-07T21:09:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#webpage\"},\"wordCount\":403,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg\",\"keywords\":[\"Feds\",\"Tor\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Some of the most noteworthy malware were likely considered a failure by their authors. Flashback, for instance, turned out to be pretty much worthless for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/","og_locale":"en_US","og_type":"article","og_title":"Tor Anonymity Attacked - Feds Suspected - The Mac Security Blog","og_description":"Some of the most noteworthy malware were likely considered a failure by their authors. Flashback, for instance, turned out to be pretty much worthless for","og_url":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-08-05T17:57:53+00:00","article_modified_time":"2013-08-07T21:09:34+00:00","og_image":[{"width":400,"height":267,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg","width":400,"height":267},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/","name":"Tor Anonymity Attacked - Feds Suspected - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#primaryimage"},"datePublished":"2013-08-05T17:57:53+00:00","dateModified":"2013-08-07T21:09:34+00:00","description":"Some of the most noteworthy malware were likely considered a failure by their authors. Flashback, for instance, turned out to be pretty much worthless for","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Tor Anonymity Attacked &#8211; Feds Suspected"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Tor Anonymity Attacked &#8211; Feds Suspected","datePublished":"2013-08-05T17:57:53+00:00","dateModified":"2013-08-07T21:09:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#webpage"},"wordCount":403,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg","keywords":["Feds","Tor"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Tor-AttackedFT.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4kl","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16637"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=16637"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16637\/revisions"}],"predecessor-version":[{"id":16699,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16637\/revisions\/16699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16643"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=16637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=16637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=16637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}