#1
In recent days, Tor node operators have been receiving a wave of suspicious activity alerts regarding alleged abuse of their IP addresses. The alerts concern numerous failed SSH login attempts that are reported to be coming from their nodes, possibly indicating brute-force attacks.

It should be noted that Tor nodes are typically used to route anonymous traffic between source and destination points within the network and are not intended to initiate direct SSH connections to external hosts, especially for brute-force attacks. Analysis by a researcher using the pseudonym "delroth" showed that most Tor nodes were not actually generating SSH traffic, indicating that they were being spoofed.

Attackers have been found to be spoofing the IP addresses of Tor nodes, using them as part of a large-scale brute-force attack against honeypots and intrusion detection systems (IDS) that are set up to automatically report suspicious activity. The resulting spoofed messages generate a flood of false abuse alerts, creating the false impression that Tor nodes are engaged in illegal activity.

This situation results in hosts that have experienced numerous failed connection attempts being blacklisted and given a “bad reputation”. The IP addresses of these nodes become associated with suspicious activity, and they receive a significant number of abuse alerts. In response, many ISPs block or disable access to these nodes, often without the ability for their owners to appeal. This is especially critical for Tor network operators, as each node that is taken down weakens the infrastructure that underpins Tor users’ anonymity.

The attack is thus aimed at undermining the Tor network infrastructure: the attackers create an avalanche of complaints, overloading security systems and increasing the number of false notifications of violations. At the moment, malicious activity remains moderate, but the attackers remain unknown, which causes serious concerns among Tor users and operators.

Tor node operators are currently being urged to actively file appeals so that their IP addresses are not blocked, as well as to increase the network's capacity by creating new nodes to replace those lost. Internet service providers are asked to more carefully check complaints about suspicious activity and take into account that attackers may deliberately fake data in order to avoid false blocks and not disrupt the Tor network.
[Image: Nuttela-Signature.gif]
by @Nuttela
[Image: PeAsULK.gif]
by @Gi4npy