Wednesday, March 19, 2025
HomeSecurity NewsCritical Tor Browser Bug "TorMoil" Allows to the Leakage of Your ...

Critical Tor Browser Bug “TorMoil” Allows to the Leakage of Your Real IP Address

Published on

SIEM as a Service

Follow Us on Google News

A Critical Tor Browser Bug called “TorMoil” Allows to Leak your real IP Address that you’re using for Browsing especially this critical security vulnerability affecting Mac and Linux users.

Tor Browser is Providing good level of anonymity and security and you are able to gain access to .onion websites through your dark web browser.

It prevents some person viewing your Internet connection from realizing what websites you visit, it prevents the websites you visit from learning your physical location, and it gives you a chance to get to websites which are blocked.

According to Segment,  a Firefox bug in handling file:// URLs it is possible on both systems that users leak their IP address. Once an affected user navigates to a specially crafted web page, the operating system may directly connect to the remote host, bypassing Tor Browser

Apart from This Tor Browser Bug , Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. so this is already warned by Tor Team that don’t use Torrent file-sharing.

Also Read :   TOR and VPN Anonymous enough for Dark Web

Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that’s how torrents work

After Reporting This Bug to Tor team Started working with the help of Mozilla engineers This Critical Bug Successfully fixed by Tor Security Experts and Release Patch with Tor Browser 7.0.9 version update. Tor Browser 7.0.9 is now available for both macOS and Linux Users.

According to Tor Team, We are currently preparing updated macOS and Linux bundles for our alpha series which will be tentatively available on Monday, November 6. Meanwhile, macOS and Linux users on that series are strongly encouraged to use the stable bundles or one of the above-mentioned tools that are not affected by the underlying problem.

If you are one of those people that rely on Tor Browser to safely browse the Internet, the message is just one: keep your Tor Browser updated!

Tor Browser Bug Fix for OS X and Linux.

  • OS X – Bug 24052: Streamline handling of file:// resources
  • Linux – Bug 24052: Streamline handling of file:// resources
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical...

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...

US Sperm Donor Giant California Cryobank Hit by Data Breach

California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...