{"id":3794,"date":"2019-10-21T09:56:36","date_gmt":"2019-10-21T06:56:36","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=3794"},"modified":"2019-10-21T09:57:17","modified_gmt":"2019-10-21T06:57:17","slug":"fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/","title":{"rendered":"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser"},"content":{"rendered":"\n<p>Utilizing a trojanized version of an official Tor Browser package, the cybercriminals behind this campaign have been very successful \u2013 so far their pastebin.com accounts have had more than 500,000 views and they were able to steal US$40,000+ in bitcoins.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Malicious domains<\/h1>\n\n\n\n<p>This newly discovered trojanized Tor Browser has been spreading using two websites that claimed that they distribute the official Russian language version of the Tor Browser. The first such website displays a message in Russian claiming that the visitor has an outdated Tor Browser. The message is displayed even if the visitor had the most up-to-date Tor Browser version.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-6.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-6.png\" alt=\"\" class=\"wp-image-131238\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 1. Fake outdated browser message displayed at torproect[.]org<\/em>Translated to English:<\/p>\n\n\n\n<p>Your anonymity is in danger!<br>WARNING: Your Tor Browser is outdated<br>Click the button \u201cUpdate\u201d<\/p>\n\n\n\n<p>On clicking the \u201cUpdate Tor Browser\u201d button, the visitor is redirected to a second website with the possibility of downloading a Windows installer. There are no signs that the same website has distributed Linux, macOS or mobile versions.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2-5.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2-5.png\" alt=\"\" class=\"wp-image-131239\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 2. Fake Tor Browser website with download option<\/em><\/p>\n\n\n\n<p>Both these domains \u2013 tor-browser[.]org and torproect[.]org \u2013 were created in 2014. The malicious domain torproect[.]org domain is very similar to the real torproject.org; it is just missing one letter. For Russian-speaking victims, the missing letter might raise no suspicion due to the fact that \u201ctorproect\u201d looks like a transliteration from the Cyrillic. However, it does not look like criminals relied on typosquatting, because they promoted these two websites on various resources.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Distribution<\/h1>\n\n\n\n<p>In 2017 and early 2018 cybercriminals promoted the webpages of the trojanized Tor Browser using spam messages on various Russian forums. These messages contain various topics, including darknet markets, cryptocurrencies, internet privacy and censorship bypass. Specifically, some of these messages mention&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Federal_Service_for_Supervision_of_Communications,_Information_Technology_and_Mass_Media\" target=\"_blank\" rel=\"noreferrer noopener\">Roskomnadzor<\/a>, a Russian government entity for censorship in media and telecommunications.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3-4.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3-4.png\" alt=\"\" class=\"wp-image-131240\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 3. Example of spam message promoting tor-browser[.]org<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4-3.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4-3.png\" alt=\"\" class=\"wp-image-131241\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 4. Example of spam message promoting torproect[.]org<\/em>In April and March 2018, the criminals started to use the pastebin.com web service to promote both domains related to the fake Tor Browser webpage. Specifically, they created four accounts and generated a lot of pastes optimized for search engines to rank them high for words that cover topics like drugs, cryptocurrency, censorship bypass, and the names of Russian politicians.<\/p>\n\n\n\n<p>The idea behind this is that a potential victim would perform an online search for specific keywords and at some point visit a generated paste. Each such paste has a header that promotes the fake website.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5-3.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5-3.png\" alt=\"\" class=\"wp-image-131242\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 5. The header of a paste that promotes fake Tor Browser websites<\/em><\/p>\n\n\n\n<p>This translates to English:<\/p>\n\n\n\n<p>BRO, download Tor Browser so the cops won\u2019t watch you.<br>Regular browsers show what you are watching, even through proxies and VPN plug-ins.<br>Tor encrypts all traffic and passes it through random servers from around the world.<br>It is more reliable than VPN or proxy and bypasses all Roskomnadzor censorship.<br>Here is official Tor Browser website:<br>torproect[.]org<br>Tor Browser with anti-captcha:<br>tor-browser[.]org<br>Save the link<\/p>\n\n\n\n<p>The criminals claim that this version of the Tor Browser has anti-captcha capability, but in fact this is not true.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6.png\" alt=\"\" class=\"wp-image-131243\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 6. An example paste with keywords related to the Tor Browser<\/em><\/p>\n\n\n\n<p>All of the pastes from the four different accounts were viewed more than 500,000 times. However, it\u2019s not possible for us to say how many viewers actually visited the websites and downloaded the trojanized version of the Tor Browser.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Analysis<\/h1>\n\n\n\n<p>This trojanized Tor Browser is a fully functional application. In fact, it is based on Tor Browser 7.5, which was released in January 2018. Thus, non-technically-savvy people probably won\u2019t notice any difference between the original version and the trojanized one.<\/p>\n\n\n\n<p>No changes were made to source code of the Tor Browser; all Windows binaries are exactly the same as in the original version. However, these criminals changed the default browser settings and some of the extensions.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7-1.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7-1.png\" alt=\"\" class=\"wp-image-131244\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 7. The modified settings of the trojanized Tor Browser in extension-overrides.js<\/em><\/p>\n\n\n\n<p>The criminals want to prevent victims from updating the trojanized Tor version to a newer version, because in this case it will be updated to a non-trojanized, legitimate version. That\u2019s why they disabled all kinds of updates in the settings, and even renamed the updater tool from&nbsp;updater.exe&nbsp;to&nbsp;updater.exe0.<\/p>\n\n\n\n<p>In addition to the changed update settings, the criminals changed the default User-Agent to the unique hardcoded value:<\/p>\n\n\n\n<p>Mozilla\/5.0 (Windows NT 6.1; rv:77777.0) Gecko\/20100101 Firefox\/52.0<\/p>\n\n\n\n<p>All trojanized Tor Browser victims will use the same User-Agent; thus it can be used as a fingerprint by the criminals to detect, on the server-side, whether the victim is using this trojanized version.<\/p>\n\n\n\n<p>The most important change is to the&nbsp;xpinstall.signatures.required&nbsp;settings, which disable a digital signature check for installed Tor Browser add-ons. Therefore, the attackers can modify any add-on and it will be loaded by the browser without any complaint about it failing its digital signature check.<\/p>\n\n\n\n<p>Furthermore, the criminals modified the HTTPS Everywhere add-on included with the browser, specifically its&nbsp;manifest.json&nbsp;file. The modification adds a content script (script.js) that will be executed on load in the context of every webpage.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8-1.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8-1.png\" alt=\"\" class=\"wp-image-131245\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 8. Difference between original manifest.json (left) and modified (right)<\/em><\/p>\n\n\n\n<p>This injected script notifies a C&amp;C server about the current webpage address and downloads a JavaScript payload that will be executed in the context of the current page. The C&amp;C server is located on an onion domain, which means it is accessible only through Tor.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9-1.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9-1.png\" alt=\"\" class=\"wp-image-131246\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 9. The injected script executed in the context of every webpage<\/em><\/p>\n\n\n\n<p>As the criminals behind this campaign know what website the victim is currently visiting, they could serve different JavaScript payloads for different websites. However, that is not the case here: during our research, the JavaScript payload was always the same for all pages we visited.<\/p>\n\n\n\n<p>The JavaScript payload works as a standard&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2014\/10\/23\/evolution-webinject\/\" target=\"_blank\" rel=\"noreferrer noopener\">webinject<\/a>, which means that it can interact with the website content and perform specific actions. For example, it can do a form grabbing, scrape, hide or inject content of a visited page, display fake messages, etc.<\/p>\n\n\n\n<p>However, it should be noted that the de-anonymization of a victim is a hard task because the JavaScript payload is running in the context of the Tor Browser and does not have access to the real IP address or other physical characteristics of the victim machine.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Darknet markets<\/h1>\n\n\n\n<p>The only JavaScript payload we have seen targets three of the largest Russian-speaking darknet markets. This payload attempts to alter QIWI (a popular Russian money transfer service) or bitcoin wallets located on pages of these markets.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10-1.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10-1.png\" alt=\"\" class=\"wp-image-131247\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 10. The part of the JavaScript payload designed to alter cryptocurrency wallets<\/em><\/p>\n\n\n\n<p>Once a victim visits their profile page in order to add funds to the account directly using bitcoin payment, the trojanized Tor Browser automatically swaps the original address to the address controlled by criminals.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11-1.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11-1.png\" alt=\"\" class=\"wp-image-131248\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 11. A darknet market profile page with altered bitcoin address<\/em><\/p>\n\n\n\n<p>During our investigation we identified three bitcoin wallets that have been used in this campaign since 2017. Each such wallet contains relatively large numbers of small transactions; this suggests that these wallets were indeed used by the trojanized Tor Browser.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12-1.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12-1.png\" alt=\"\" class=\"wp-image-131249\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 12. Number of transactions and received bitcoin for one of the criminals\u2019 wallets<\/em><\/p>\n\n\n\n<p>As of this writing, the total amount of received funds for all three wallets is 4.8 bitcoin, which corresponds to over US$40,000. It should be noted that the real amount of stolen money is higher because the trojanized Tor Browser also alters QIWI wallets.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>This trojanized Tor Browser is a non-typical form of malware, designed to steal digital currency from visitors to darknet markets. Criminals didn\u2019t modify binary components of the Tor Browser; instead, they introduced changes to settings and the HTTPS Everywhere extension. This has allowed them to steal digital money, unnoticed, for years.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Indicators of Compromise (IoCs)<\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">ESET detection names<\/h1>\n\n\n\n<p>JS\/Agent.OBW<br>JS\/Agent.OBX<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">SHA-1<\/h1>\n\n\n\n<p>33E50586481D2CC9A5C7FB1AC6842E3282A99E08<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Domains<\/h1>\n\n\n\n<p>torproect[.]org<br>tor-browser[.]org<br>onion4fh3ko2ncex[.]onion<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Pastebin accounts<\/h1>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/pastebin[.]com\/u\/antizaprethttps:\/\/pastebin[.]com\/u\/roscomnadzorhttps:\/\/pastebin[.]com\/u\/tor-browser-downloadhttps:\/\/pastebin[.]com\/u\/alex-navalniihttps:\/\/pastebin[.]com\/u\/navalniihttps:\/\/pastebin[.]com\/u\/obhod-blokirovki\n<\/div><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Bitcoin addresses<\/h1>\n\n\n\n<p>3338V5E5DUetyfhTyCRPZLB5eASVdkEqQQ<br>3CEtinamJCciqSEgSLNoPpywWjviihYqrw<br>1FUPnTZNBmTJrSTvJFweJvUKxRVcaMG8oS<br><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">MITRE ATT&amp;CK techniques<\/h1>\n\n\n\n<table class=\"wp-block-table\"><thead><tr><th>Tactic<\/th><th>ID<\/th><th>Name<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Execution<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1204\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1204<\/a>\n\t\t\t<\/td><td>User Execution<\/td><td>The trojanized Tor Browser relies on the victim to execute the initial infiltration.<\/td><\/tr><tr><td>Persistence<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1176\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1176<\/a>\n\t\t\t<\/td><td>Browser Extensions<\/td><td>The trojanized Tor Browser contains a modified HTTPS Everywhere extension.<\/td><\/tr><tr><td>Collection<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1185\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1185<\/a>\n\t\t\t<\/td><td>Man in the Browser<\/td><td>The trojanized Tor Browser is able to change content, modify behavior, and intercept information using man-in-the- browser techniques.<\/td><\/tr><tr><td>Command and Control<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1188\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1188<\/a>\n\t\t\t<\/td><td>Multi-hop Proxy<\/td><td>The trojanized Tor Browser uses Tor onion service in order to download its JavaScript payload.<\/td><\/tr><tr><td>Command and Control<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1079\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1079<\/a>\n\t\t\t<\/td><td>Multilayer Encryption<\/td><td>The trojanized Tor Browser uses Tor onion service in order to download its JavaScript payload.<\/td><\/tr><tr><td>Impact<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1494\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1494<\/a>\n\t\t\t<\/td><td>Runtime Data Manipulation<\/td><td>The trojanized Tor Browser alters bitcoin and QIWI wallets on darknet market webpages.<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2019\/10\/18\/fleecing-onion-trojanized-tor-browser\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Utilizing a trojanized version of an official Tor Browser package, the cybercriminals behind this campaign have been very successful \u2013 so far their pastebin.com accounts have had more than 500,000 views and they were able to steal US$40,000+ in bitcoins. Malicious domains This newly discovered trojanized Tor Browser has been spreading using two websites that<\/p>\n","protected":false},"author":5,"featured_media":3798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[160],"tags":[],"class_list":["post-3794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser\" \/>\n<meta property=\"og:description\" content=\"Utilizing a trojanized version of an official Tor Browser package, the cybercriminals behind this campaign have been very successful \u2013 so far their pastebin.com accounts have had more than 500,000 views and they were able to steal US$40,000+ in bitcoins. Malicious domains This newly discovered trojanized Tor Browser has been spreading using two websites that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-21T06:56:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-21T06:57:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/underground-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser\",\"datePublished\":\"2019-10-21T06:56:36+00:00\",\"dateModified\":\"2019-10-21T06:57:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/\"},\"wordCount\":1502,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/underground-1.jpg\",\"articleSection\":[\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/\",\"name\":\"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/underground-1.jpg\",\"datePublished\":\"2019-10-21T06:56:36+00:00\",\"dateModified\":\"2019-10-21T06:57:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/underground-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/underground-1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/21\\\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/","og_locale":"en_US","og_type":"article","og_title":"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser","og_description":"Utilizing a trojanized version of an official Tor Browser package, the cybercriminals behind this campaign have been very successful \u2013 so far their pastebin.com accounts have had more than 500,000 views and they were able to steal US$40,000+ in bitcoins. Malicious domains This newly discovered trojanized Tor Browser has been spreading using two websites that","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-10-21T06:56:36+00:00","article_modified_time":"2019-10-21T06:57:17+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/underground-1.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser","datePublished":"2019-10-21T06:56:36+00:00","dateModified":"2019-10-21T06:57:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/"},"wordCount":1502,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/underground-1.jpg","articleSection":["malware"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/","name":"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/underground-1.jpg","datePublished":"2019-10-21T06:56:36+00:00","dateModified":"2019-10-21T06:57:17+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/underground-1.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/underground-1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/21\/fleecing-the-onion-darknet-shoppers-swindled-out-of-bitcoins-via-trojanized-tor-browser\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=3794"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3794\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/3798"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=3794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=3794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=3794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}