Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Russia Offers Over $100k for Defeating Tor Network Anonymity

Russia is looking for hackers to help take down the anonymity of the Tor network.

Russia is looking for hackers to help take down the anonymity of the Tor network.

In a posting to Russia government’s procurement portal earlier this month, the country’s Ministry of Internal Affairs (MVD) offered a 3.9 million rubles (roughly $109,000 USD) reward for research on methods for identifying Tor users.

Originally posted July 11, the posting was updated July 25 to remove specific information about what the offer is about. The competition is only open only to Russian citizens and requires an application fee of 195,000 rubles (roughly $5,500 USD). Proposals are due August 13, and the proposals will be assessed August 20.

Tor was originally a project of the U.S. Naval Research Laboratory, and works by directing Internet traffic through a worldwide network of several thousand relays. The software is widely used by political activists, journalists and Internet users concerned with privacy, but it is used by criminals seeking to hide their identities as well. As a result, law enforcement agencies, including the FBI, have tried to find ways to identify users as part of investigations. The network is also the target of intelligence operations as well.

“It is certainly interesting as a publicity stunt, but it is likely to take a lot more than $100,000 worth of research or incentive to motivate someone to break Tor,” said Chester Wisniewski, senior security advisor at Sophos. “It would be a great way to thumb your nose at the US government, but if that is your goal you wouldn’t need the rubles, would you?”

Tor security was in the news last week after the organizers of the Black Hat USA conference announced that a presentation on unmasking the identities of hundreds of thousands of Tor clients and thousands of hidden services was cancelled. 

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...