CALL US

+91 8219776763

Tor false application attacks "dark web" of users | Cyberops

Tor false application attacks “dark web” of users

By Prempal Singh 0 Comment July 15, 2017

Malicious application disguised as a modified version of the Tor Browser is used by scammers to lure visitors to the underground trading platform The Rodeo.

The application detected a journalist publications BleepingComputer Lawrence Abrams (Lawrence Abrams), distributed through videos on YouTube, teaching users how to make purchases at The Rodeo. In a video posted to guide users to download Rodeo Browser application allegedly designed specifically to enable visitors to access the site.

Actually Rodeo Browser is a simple interface that simulates the design Tor. Rodeo Browser is written in .NET, and has very little functionality. The only thing that works in the annex – it’s a drop-down menu in the settings containing the option to download site The Rodeo. When you click on Rodeo Browser option simulates a connection to a bogus website th3rod3o3301jtxy.onion.

resource design replicates the classic model of any trading platform in the darknet, but, apparently, is nothing more than fraud. In order to use the Service, users need to register and log in. As indicated in the resource, all orders are encrypted using PGP keys, but journalists did not find any evidence of this. To attract buyers site offers a wide selection of goods – from drugs, weapons and counterfeit money to hacking services and counterfeit credit cards. Payment is made in Bitcoin.

In fact, all of the content that users see on The Rodeo, is derived from the text files that are stored on remote FTP and web-server. For example, journalists discovered text files for all manufacturers of products appearing on the website, as well as options in the menu resource.

In addition, the identified folder for each user who is registered on the website (138). The folders contain all private passwords and user messages unencrypted. While users can send orders to different vendors actually receives them one and the same person. It provides victims of bitcoin address for payment orders, which will never be delivered.

Tor (The Onion Router) – free and open-source software for implementing the second generation of the so-called onion routing. It is a system of proxy servers, allows you to install an anonymous network connection, secure listening. With the help of Tor users can remain anonymous on the Internet when you visit websites, blogging, sending instant messages and email, as well as when working with other applications that use the TCP protocol.

error: Content is protected by Cyberops !!