{"id":27673,"date":"2019-07-05T10:47:00","date_gmt":"2019-07-05T10:47:00","guid":{"rendered":"http:\/\/7b627a8f-c1b7-4e8e-a47d-d1e710d29b74"},"modified":"2019-07-05T10:47:00","modified_gmt":"2019-07-05T10:47:00","slug":"tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/","title":{"rendered":"Tor Project to fix bug used for DDoS attacks on Onion sites for years"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2018\/10\/24\/a6223657-a396-4661-857b-604f7927f8d5\/ae15845e6eb12e3c61db3e1173bb6f05\/tor.png\" class alt=\"tor.png\"><\/span><span class=\"credit\">Image: Tor Project<\/span> <\/p>\n<p>The Tor Project is preparing a fix for a bug that has been abused for the past years to launch distributed denial of service (DDoS) attacks against dark web (.onion) websites.<\/p>\n<p>Barring any unforeseen problems, the fix is scheduled for the upcoming Tor protocol 0.4.2 release, according to a bug report seen by <em>ZDNet<\/em>.<\/p>\n<h3>How the DoS bug works<\/h3>\n<p>In information security (infosec) terms, the bug is a &#8220;denial of service&#8221; (DoS) issue that crashes the Onion service running on a web server hosting a .onion website.<\/p>\n<p>More specifically, in a simplified explanation of what happens during this bug, an attacker can initiate thousands of connections to a targeted website hosted on the dark web, but leave the connections hanging.<\/p>\n<p>For each connection, the remote Onion service must negotiate a complex circuit through the Tor network that secures the connection between the remote user and its server. This process is CPU intensive, and with enough connections, the server processor is maxed out at 100% and can&#8217;t accept new connections.<\/p>\n<p>This is an old bug that has been known to Tor developers for years but has not been fixed because of a lack of human power, but also because there&#8217;s no simple and straightforward way &#8212; because the bug also exploits the same process which needs to happen to establish a legitimate user&#8217;s connection.<\/p>\n<p>There is no viable way to identify if any incoming connection requests are from an attacker or a legitimate user until the connection is established, at which point, it is already too late.<\/p>\n<h3>DDoS attacks on dark web portals<\/h3>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The vulnerability has plagued the operators of dark web portals for years. Initially, legitimate sites reported being attacked, but in recent months, the primary target of DDoS attacks exploiting this bug have been dark web marketplaces that sell illegal products, such as drugs, weapons, malware, and hacked user data.<\/p>\n<p>In March 2019, the Dream Market, the largest dark web marketplace for illegal funds at the time, announced it was shutting down after the site had been under a barrage of DDoS attacks for months.<\/p>\n<p>Site operators claimed that a hacker had been extorting the site and had <a href=\"https:\/\/www.zdnet.com\/article\/top-dark-web-marketplace-will-shut-down-next-month\/\" target=\"_blank\" rel=\"noopener noreferrer\">asked for $400,000 worth of Bitcoin to stop the DDoS attacks<\/a>. Instead of paying, Dream Market operators decided to shut down their site for good.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/\" class=\"lazy\" alt=\"Dream Market explanation\" data-original=\" https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/04\/30\/b4563841-010c-4243-a4b0-cdb75aecafaf\/cf8475646fa7fd547292a8777df0a708\/dream-market-explanation.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/04\/30\/b4563841-010c-4243-a4b0-cdb75aecafaf\/cf8475646fa7fd547292a8777df0a708\/dream-market-explanation.png\" class alt=\"Dream Market explanation\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>A month later, the DDoS attacks moved on to other dark web markets that took Dream&#8217;s place, <a href=\"https:\/\/www.zdnet.com\/article\/dark-web-crime-markets-targeted-by-recurring-ddos-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">such as the Empire Market and Nightmare Market<\/a>.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/\" class=\"lazy\" alt=\"Empire and Nightmare market DDoS\" data-original=\" https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/04\/30\/4e42de09-96e3-4923-b915-2b2baaf8a123\/64207e3756c3a9201387817948272b77\/empire-nihtmare.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/04\/30\/4e42de09-96e3-4923-b915-2b2baaf8a123\/64207e3756c3a9201387817948272b77\/empire-nihtmare.png\" class alt=\"Empire and Nightmare market DDoS\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>Other smaller sites were also targeted, such as the Dread forum, a place where dark market users would often converge.<\/p>\n<p>The attacks got so bad that some markets <a href=\"https:\/\/www.zdnet.com\/article\/i2p-network-proposed-as-the-next-hiding-spot-for-criminal-operations\/\" target=\"_blank\" rel=\"noopener noreferrer\">attempted to switch from Tor to I2P<\/a>, another anonymity network, far less popular than Tor.<\/p>\n<p>&#8220;The Tor network is not suitable for hidden services due to flaws in the network which allow denial of service attacks,&#8221; administrators of the Libertas Market wrote on their now-closed Tor portal.<\/p>\n<p>The efforts to migrate to I2P failed, and the Libertas Market eventually shut down for good.<\/p>\n<h3>Tor DDoS tool readily available on GitHub<\/h3>\n<p>In the meantime, DDoS attacks on dark web portals have continued unabated, because there&#8217;s nothing that Onion site operators can do to protect themselves.<\/p>\n<p>Furthermore, a tool uploaded on GitHub more than four years ago, and named Stinger-Tor, can allow anyone to carry out one of these attacks just by running a Python script.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/\" class=\"lazy\" alt=\"Stinger-Tor DDoS tool\" data-original=\" https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/07\/05\/aae73932-9480-4777-a3aa-14a0c4cac742\/5a53de958ade48e8361ccd854e92a520\/stinger-tor-tool.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/07\/05\/aae73932-9480-4777-a3aa-14a0c4cac742\/5a53de958ade48e8361ccd854e92a520\/stinger-tor-tool.png\" class alt=\"Stinger-Tor DDoS tool\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>Furthermore, there are also groups who are selling similar Tor DDoS tools on underground forums, also exploiting this same bug.<\/p>\n<p>In an attempt to stop the almost constant attacks, members of the Dread community have been urging their userbase to donate to the Tor Project to help developers patch the bug.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/\" class=\"lazy\" alt=\"Dread donations request\" data-original=\" https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/07\/05\/cd14b7a4-b663-428f-8178-391ed320936a\/8b65ede944b8a0957598f38540cf3449\/dread-donations.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/07\/05\/cd14b7a4-b663-428f-8178-391ed320936a\/8b65ede944b8a0957598f38540cf3449\/dread-donations.png\" class alt=\"Dread donations request\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>Their efforts appear to have worked and one of the 14 bug reports where this vulnerability has been reported now lists a &#8220;sponsor&#8221; spot, meaning Tor supporters have managed to prioritize the bug fixing process via their donations.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/\" class=\"lazy\" alt=\"Tor DoS bug sponsor\" data-original=\" https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/07\/05\/b59d9cfd-3181-4177-8351-a4400aad9445\/02f4436bbb194468f8220e035f12e91d\/tor-bug-sponsore.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/07\/05\/b59d9cfd-3181-4177-8351-a4400aad9445\/02f4436bbb194468f8220e035f12e91d\/tor-bug-sponsore.png\" class alt=\"Tor DoS bug sponsor\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>The planned fix won&#8217;t completely fix the bug because this implies breaking some of Tor&#8217;s main privacy and security features, but it will make the attacks less effective.<\/p>\n<p>Onion site operators will have a new option available inside the Tor service, which they can enable to activate defenses for their sites.<\/p>\n<p>When this defense is enabled, Tor users will be able to access Onion sites attacked via this vulnerability, but connections will take longer to establish.<\/p>\n<p>However, the good news is that sites will continue to be operational, and a threat actor can&#8217;t pummel a dark web portal into oblivion and take it offline for days or weeks.<\/p>\n<h3>Related cybersecurity coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tor vulnerability has been exploited for years and has been used for censorship, sabotage, and extortion of Onion sites.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27674,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-27673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tor Project to fix bug used for DDoS attacks on Onion sites for years 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tor Project to fix bug used for DDoS attacks on Onion sites for years 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-05T10:47:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tor Project to fix bug used for DDoS attacks on Onion sites for years\",\"datePublished\":\"2019-07-05T10:47:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/\",\"name\":\"Tor Project to fix bug used for DDoS attacks on Onion sites for years 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png\",\"datePublished\":\"2019-07-05T10:47:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png\",\"width\":820,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tor Project to fix bug used for DDoS attacks on Onion sites for years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tor Project to fix bug used for DDoS attacks on Onion sites for years 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/","og_locale":"en_US","og_type":"article","og_title":"Tor Project to fix bug used for DDoS attacks on Onion sites for years 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-05T10:47:00+00:00","og_image":[{"width":820,"height":425,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tor Project to fix bug used for DDoS attacks on Onion sites for years","datePublished":"2019-07-05T10:47:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/"},"wordCount":796,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/","url":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/","name":"Tor Project to fix bug used for DDoS attacks on Onion sites for years 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png","datePublished":"2019-07-05T10:47:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years.png","width":820,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-to-fix-bug-used-for-ddos-attacks-on-onion-sites-for-years\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Tor Project to fix bug used for DDoS attacks on Onion sites for years"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27673"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27674"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}