This software is maintained by the Tor Project, a nonprofit organization that provides internet anonymity and anti-censorship tools. Tor (aka The Onion Router) is software that allows users to browse the web anonymously by encrypting and routing requests through multiple relay layers or nodes. Cyber threat actors can use Tor software and network infrastructure for anonymity and obfuscation purposes to clandestinely conduct malicious cyber operations., This advisory-written by the Cybersecurity Security and Infrastructure Security Agency (CISA) with contributions from the Federal Bureau of Investigation (FBI)-highlights risks associated with Tor, along with technical details and recommendations for mitigation. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CKĀ®) and Pre-ATT&CK framework.
0 Comments
Leave a Reply. |