Treasury Department blames Tor for increased cyberattacks

TECHi's Author
Opposing Author Arstechnica Read Source Article
Last Updated
TECHi's Take
Chastity Mansfield
Chastity Mansfield
  • Words 82
  • Estimated Read 1 min

In a non-public report, the Department of Treasury revealed that an increasing number of hackers are using the Tor network to maintain their anonymity. Surprise surprise! After all,Tor is one of the biggest online anonymity services. So the government is suggesting (again) that blocking Tor would keep hackers away, though. And while that might be true, it’s also shady. The report came from the Financial Crimes Enforcement Network (FinCEN), a Treasury Department bureau responsible for analyzing financial crimes and whatnot. 

Arstechnica

Arstechnica

  • Words 180
  • Estimated Read 1 min
Read Article

The majority of bank account hijackings over the past decade used the Tor privacy service to hide thieves’ locations, according to a US Treasury Department report obtained by KrebsOnSecurity reporter Brian Krebs. The non-public report said the heists could have been prevented had financial institutions noticed that the accounts were being accessed over Tor IP addresses, according to an article Krebs published Friday. The report, which was produced by the Financial Crimes Enforcement Network, was based on a review of so-called suspicious activity reports (SARs) filed by banks. Krebs wrote: “Analysis of these documents found that few filers were aware of the connection to Tor, that the bulk of these filings were related to cybercrime, and that Tor related filings were rapidly rising,” the report concluded. “Our BSA [Bank Secrecy Act] analysis of 6,048 IP addresses associated with the Tor darknet [link added] found that in the majority of the SAR filings, the underlying suspicious activity—most frequently account takeovers—might have been prevented if the filing institution had been aware that their network was being accessed via Tor IP addresses.”

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Arstechnica

The FCC has approved America’s strongest-ever net neutrality rules
The FCC has approved America’s strongest-ever net neutrality rules

The strongest net neutrality rules that the United States has ever seen were approved by the FCC in a highly-anticipated…

Yahoo argues about crypto backdoors with the NSA
Yahoo argues about crypto backdoors with the NSA

It's been almost a year and a half since it was revealed that the NSA installed backdoors into several common cryptography…

The founder of 4chan has decided to leave the website
The founder of 4chan has decided to leave the website

Regardless of how you feel about 4chan, you can't deny how important the website has been in making the internet what…

T-Mobile introduces a brilliant new data rollover program
T-Mobile introduces a brilliant new data rollover program

T-Mobile may be an “Un-carrier” but it’s not a charity, it’s here to make money. So while its new Data Stash…