FBI Created Spyware Able To Monitor Activities Of A Targeted TOR User


It was back in July of 2012 that the FBI, through their contractor Pradeep Lal, employed Hacking Team to create a piece of malware that could monitor the activities of users of the TOR Browser. Now, after 3 years, the emails that contain the information pertaining to this communication and the malware creation by the Hacking Team have been released by a hacker who was able to access this information.

The intent of the FBI contractor was to monitor the activities of an individual that the FBI was targeting. Though they could access the information, such as the websites visited by the target using other browsers, they were not able to get information about the websites that were being accessed through the TOR Browser.

(NOTE: TOR is a highly efficient browser for anonymously browsing the internet. It allows users to access websites through a network of nodes, without leaving any trace of their IP addresses on the websites they visited.)

The malware, created by the Hacking Team, installs itself on the target’s computer but it was not able to access a lot of information initially. It was later developed further, to execute an action in the background when the targeted user used the TOR Browser, and instead of directing searches from the user through the TOR network, the malware would directly lead to access to the intended website. This allowed the malware to access the browsing details of the target(s).

Don’t be alarmed, this in no way compromised the functionality of the TOR network itself, since the malware could not access any data from TOR, nor could it monitor other user activities through TOR. However, incidents like these depict the interests of governments in accessing personal information of private individuals and should be viewed as a threat to their privacy.


This Article is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and AnonHQ.com.


Get Your Anonymous T-Shirt / Sweatshirt / Hoodie / Tanktop, Smartphone or Tablet Cover or Mug In Our Spreadshirt Shop! Click Here



  1. “Don’t be alarmed, this in no way compromised the functionality of the TOR network itself…”

    TORa! TORa! TORa!


    Getting IP addresses by passively monitoring Tor traffic is really very easy to do:

    1. Get a copy of the “open source” software

    2. Change the part that throws the IP address away, instead save it in a file.

    3. Recompile the TOR software. When it runs, no one can tell that it has been changed!

    4. Open up a TOR node and start passively collecting.

    If you are a government agency, repeat #4 a couple of thousand times (tax money is always available–and it funds TOR “development”) and then start a denial-of-service (DOS) on any TOR node that is not your own. The DOS insures that you become an entry node on the TOR network.

    Oh, wait. This is not a fancy idea, it is HISTORY!!

    How quickly we forget…

    Law enforcement seized Tor nodes and may have run some of its own


    Huge raid to shut down 400-plus dark net sites


    Researchers Unveiled a New, Serious Vulnerability In Tor



Please enter your comment!
Please enter your name here