[tor-relays] Grizzly Steppe
Jim
jimmymac at copper.net
Mon Jan 2 09:51:42 UTC 2017
Dr Gerard Bulger wrote:
>
> I ran an exit node, but gave up after too many abuse reports that
> annoyed my ISP. So I turned al exit ports off, and reports stopped as a
> rely. After months and many terabytes of data I get an abuse
> complaint that my tor IP has been used for espionage.
>
> “NCSC have been made aware of a report and associated malicious
> indicators released by the United States Government relating to
> malicious cyber activity. A copy if the report and indicators can be
> found at the following link:-
> https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity
>
> Details within this report indicate network assets which may have been
> compromised or associated with malicious activity. We have identified
> the following IP address from this report as x.x.x.x As a minimum, it
> is recommended that you check systems and any available logs concerned
> with the above addresses for indications of malicious activity”
>
> There are no other details as to HOW my tor relay is being used. The
> espionage seems to relay on the stupidity of recipients on receiving
> emails asking for passwords. I am not sure HOW ISP or relay service can
> stop that. Or is it that my relay was being used to transfer the data?
Like Rana, I also wondered if perhaps this traces back to when you ran
an exit node. I haven't taken the time (and probably don't have the
skill) to analyze what is in that report, but others have. You might
find Security Week's write-up helpful:
http://www.securityweek.com/us-attributes-election-hacks-russian-threat-groups
In particular:
While some industry experts applauded the GRIZZLY STEPPE
indicators provided by the U.S. Government, some experts urged
caution for those quickly integrating them into their cyber
defense measures.
"Be careful using the DHS/FBI GRIZZLY STEPPE indicators. Many
are VPS, TOR relays, proxies, etc. which will generate lots
of false positives," Robert M. Lee, founder and CEO of Dragos
Security and a former member of the intelligence community,
Tweeted.
I suspect you are among the "lots of false positives".
> I assume my IP was found by way of a DNS leak which I need to look
> into. There is nothing else I can do as a relay to stop this or is there?
If this happened when you ran an exit node then you don't need to look
for a DNS leak (I don't see how that would pertain to a relay, anyway)
and you wouldn't need to worry about stopping it (you already have by
not being an exit).
Of course, it is possible you node was actually compromised but I think
Occam's razor argues against that.
Jim
More information about the tor-relays
mailing list