Tor is a software suite and network that provides increased anonymity on the Internet. It creates a multi-hop proxy network and utilizes multilayer encryption to protect both the message and routing information. Tor utilizes "Onion Routing," in which messages are encrypted with multiple layers of encryption; at each step in the proxy network, the topmost layer is decrypted and the contents forwarded on to the next node until it reaches its destination. [1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
Tor encapsulates traffic in multiple layers of encryption, using TLS by default.[1] |
| Enterprise | T1090 | .003 | Proxy: Multi-hop Proxy |
Traffic traversing the Tor network will be forwarded to multiple nodes before exiting the Tor network and continuing on to its intended destination.[1] |
| ID | Name | References |
|---|---|---|
| G1032 | INC Ransom | |
| G1015 | Scattered Spider |
Scattered Spider has used Tor to communicate with targeted organizations.[5] |
| G0007 | APT28 | |
| G0016 | APT29 | |
| G1050 | Water Galura |
Water Galura maintains a Tor-hosted data leaks site for Qilin ransomware and affiliates.[8][9] |
| G0065 | Leviathan |
| ID | Name | Description |
|---|---|---|
| C0004 | CostaRicto |
During CostaRicto, threat actors used C2 servers managed through Tor.[11] |
| C0053 | FLORAHOX Activity |
FLORAHOX Activity has routed traffic through a customized Tor relay network layer.[12] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used Tor exit nodes to execute commands.[13] |
| C0059 | Salesforce Data Exfiltration |
During Salesforce Data Exfiltration, threat actors used Tor IPs for voice calls and data collection.[14] |