

Organizations that do not take steps to block or monitor Tor traffic are at heightened risk of being targeted and exploited by threat actors hiding their identity and intentions using Tor." Tor cyber attacks viewed through ATT&CKĪccording to the advisory, the best way to watch for Tor-based attacks is to search for early warning signs.ĬISA and the FBI break it down through the stages of ATT&CK. "The use of Tor in this context allows threat actors to remain anonymous, making it difficult for network defenders and authorities to perform system recovery and respond to cyberattacks. These risks require careful network monitoring:

On the surface, Tor is a great security resource.

Government officials are warning that Tor (The Onion Router) software is a double-edged sword.
