

onion web traffic. The bot connects to the hidden service passing through the Tor2Web proxy pointing to an onion address that identifies the C&C server that remains hidden. The routing mechanism relies on the Tor2Web proxy to redirect.

2017 – MACSPY – Remote Access Trojan as a service on Dark web.Many types of malware are directly controlled by servers hosted on both Tor and I2P, and it is quite easy to find Ransom-as-a-Service (RaaS) in the darknets.īelow just a few examples of malware that were discovered in the last 12 months leveraging darknets for their operations: In just three years the situation has completely changed, almost any ransomware today relies on hidden services in the Tor network for the payment infrastructure. The results were surprising, the number of malware that were using darknet was limited, with a prevalence of Tor-based malicious code.įigure 1 – Malware using C&C in the Dark Web (Security Affairs 2015) Just three years ago I made a rapid analysis to determine the number of malicious codes that were exploiting both the Tor network and the I2P dark net to hide their command and control servers. The use of dark nets represents a design choice for malware developers that use them to hide the command and control servers.
