Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

This article is more than 1 year old

Lizard Squad gang moves from PlayStation, Xbox Live attacks to Tor

Floods network with 3,000 relays, project devs shrug

The developers of Tor, the software that tries to mask netizens' identities on the internet, have downplayed the arrival of 3,000 new relays – which are courtesy of a gang of mischief-makers.

Tor Project members say the flood of nodes will largely be ignored by the network.

The relays were seemingly introduced by Lizard Squad – which earlier claimed to have ruined Christmas Day for gamers by knocking Xbox Live and the PlayStation Network offline. On Friday, the squad turned its attention to Tor: it insinuated on Twitter that it had added at least 3,000 relays, which bounce connections around the world to hide users' public IP addresses, to the network.

And with that, a few thousand "LizardNSA" relays appeared, with IP addresses assigned to Google's cloud engine; this suggested someone went a bit nuts with a $500 coupon, or stole some credit cards, and spun up a shedload of tiny virtual machines running Tor, or similar.

It was feared the influx of relays, controlled by a single group, could be used to trace users' connections through the network and de-anonymize them. However, as per the Tor specification, the new nodes are given little weight by the systems governing the network – meaning netizens are highly unlikely to encounter them, we're told. And, in any case, the new relays are now being blacklisted, so clients won't use them.

In a statement in the past few minutes, the Tor Project tweeted:

This looks like a regular attempt at a Sybil attack: the attackers have signed up many new relays in hopes of becoming a large fraction of the network.

But even though they are running thousands of new relays, their relays currently make up less than 1 per cent of the Tor network by capacity. We are working now to remove these relays from the network before they become a threat, and we don't expect any anonymity or performance effects based on what we've seen so far.

Earlier, Lizard Squad had claimed it was testing out an alleged zero-day vulnerability in the Tor service, and then later said it was null-routing traffic reaching its relays. Each of the nodes is capable of carrying little bandwidth, though, further driving down their weighting in the network. ®

 

Similar topics

Similar topics

Similar topics

TIP US OFF

Send us news


Other stories you might like