Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
Afghan Migrants 'Use Belts As Whips' to Attack Austrians at Christmas Celebration
'No! Don't Touch Me!' German Police Release Shocking Footage From Cologne On New Year's Eve 2015
SHOCK VIDEO: Migrant Kicks German Woman Down Subway Stairs
Assad, Putin Closer Than Ever To Retaking Aleppo; Families Returning Home For First Time In 4 Years
California Mom 'Kidnapped by Two Hispanic Women, Branded, Starved to Brink of Death'
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).