Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Tor Network Hit by IP Spoofing Attack

November 12, 2024
Reading Time: 2 mins read
in Incidents
Tor Network Hit by IP Spoofing Attack

In late October 2024, the Tor network, known for its commitment to privacy and anonymity, fell victim to a coordinated IP spoofing attack targeting its non-exit relays. The attack, which led to an uptick in abuse complaints from hosting providers, involved attackers crafting spoofed IP packets that appeared to originate from legitimate Tor relays. This false identification resulted in several automated abuse reports, which accused Tor relays of engaging in unauthorized port scanning activity. The aim of the attack seemed to be to disrupt the network by causing key Tor-related IP addresses to be blacklisted by major hosting providers, such as OVH and Hetzner, effectively cutting off access to these relays. While the attack resulted in temporary disruptions, it had little lasting impact on the privacy or security of Tor users.

Upon detecting the attack, Tor directory authorities, relay operators, and the Tor Project sysadmin team mobilized quickly to address the issue. The coordinated response was crucial in managing the complaints and preventing further escalation. As part of the immediate response, affected relays were taken offline to mitigate any further damage, and relay operators worked closely with hosting providers to explain the situation and prevent the blocking of legitimate services. Despite the widespread disruptions, the Tor network’s core mission remained unimpeded, as its encryption protocols and the privacy of users were never compromised during the attack. Although certain relays were suspended, the vast majority of Tor users remained unaware of the issue, continuing to access the network securely.

The attack served to highlight the vulnerability of the Tor network to such spoofing tactics, underscoring the ongoing challenges that large decentralized networks face in safeguarding their infrastructure from malicious actors. Despite the setbacks caused by the false abuse reports, the Tor community’s resilience was evident in the swift restoration of services. Not only did operators take necessary steps to resolve the situation, but they also engaged in open collaboration with security experts like InterSecLab and GreyNoise. Their efforts enabled the identification of the origin of the spoofed IP packets, which was key to neutralizing the threat. The Tor Project issued guidelines for affected relay operators, encouraging them to use tools like OONI Probe’s “Circumvention” test to monitor network reachability and clarify the situation with hosting providers.

As the attack was gradually brought under control by November 7, 2024, the Tor Project expressed its gratitude to the community for its quick and effective response. The event also highlighted the critical importance of collaboration between relay operators, security professionals, and hosting providers to mitigate future attacks. Security experts such as Andrew Morris and Pierre Bourdon, a key relay operator, played an instrumental role in analyzing the attack’s nature and impact, contributing valuable insights that helped protect the network from future threats.

Reference:
  • Tor Network Faces Disruption from IP Spoofing Attack on Non-Exit Relays
Tags: cyber incidentsCyber Incidents 2024Cyber threatsHakutenIP Spoofing AttackNovember 2024Tor networkVulnerabilities
ADVERTISEMENT

Related Posts

InfoJobs Spain Hit By Credential Stuffing

InfoJobs Spain Hit By Credential Stuffing

June 6, 2025
InfoJobs Spain Hit By Credential Stuffing

Hack Attempt Hits German Police Phone System

June 6, 2025
InfoJobs Spain Hit By Credential Stuffing

German Dog Rescue IG Hacked For Ransom

June 6, 2025
Nervos Bridge Paused After $3.9 Million Hack

Ukraine GUR Claims Tupolev Data Theft Hack

June 5, 2025
Nervos Bridge Paused After $3.9 Million Hack

KiranaPro Startup Hacked All Data Wiped

June 5, 2025
Nervos Bridge Paused After $3.9 Million Hack

Nervos Bridge Paused After $3.9 Million Hack

June 5, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial