


The researchers dubbed the campaign “OnionPoison,” a reference to the multi-step onion routing that gives the legitimate Tor Browser, originally developed by the U.S.

The channel has more than 180,000 subscribers, and the video has been viewed more than 64,000 times, Kaspersky researchers Leonid Bezvershenko and Georgy Kucherin said in findings published Tuesday.Ī YouTube account uploaded the video in January 2022 and Kaspersky researchers began seeing victims in their data in March after noticing clusters of malicious Tor installer downloads. A modified version of the Tor Browser collected sensitive data on Chinese users since at least March, maybe as early as January, that included browsing history, form data, computer name and location, user name and MAC addresses of network adapters, researchers with the cybersecurity firm Kaspersky said Tuesday.Ī video posted on a Chinese-language YouTube channel included a link to the malicious version of the Tor Browser installer.
