Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A lot of people are moving their hacking attempts under tor. They want to brute-force your ssh server, rdp, etc. but they don't want to go to prison.


Nothing new there. We've been dealing with bad guys coming through TOR nodes for at least 1.5 years.

What annoys me more is the people using AWS to send us bad traffic.


Is there no reporting for AWS?


It's whack-a-mole, basically. Amazon has not been too keen on dealing with abuse reports that I've seen, and even then, criminals setting up botnets and exits on AWS are almost certainly using stolen identities.


Doesn't Tor let you donate EC2 instances to them? Yes it does: https://cloud.torproject.org/


Sure, for a bridge. Which isn't an entry or exit node.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: