Short update about the fake onion address attack: - Again, this is not a new phenomenon but larger scale: there is one attacker or a group of attackers who run about 300 fake onion sites.
- The attacker has automated the fake site production. These sites came online about simultaneously. - Comparison can be done easily at the moment: because the attacker is re-writing links on multiple onion directory sites we can compare the real directory site and the fake directory site. The changed links point to fake sites. - The first 5 letters are same between fake onion and real onion addresses. So, if the real site is ABCDEfg123456789.onion the fake on is ABCDEsomething12.onion. It is easy get an onion addresses where the first 5 letters are just as you want them to be. - The fake site acts as a transparent proxy for the real site: it is downloading the content from the real site and after some re-write showing it to the user who is visiting the site. We can sometimes see the Polipo HTTP proxy error on fake sites. - The attacker is re-writing some content, including bitcoin addresses and links to point fake sites - The attacker is gathering bitcoin money by spoofing those bitcoin addresses. - It is possible and even very likely that the attacker is gathering login credentials if you use the fake site instead of the real one. Greetings, Juha -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk