
onion proxy servers to disguise the origin and location of its command and control center. According to Roman Unuchek of Kaspersky, a Tor network client, Orbot, has been modified to act as a malicious bot - using the Tor network's.

While many advances in botnets have been made based on desktop and Windows templates, a Trojan focused on the mobile Android operating system has been discovered. Tor, an anonymity tool accused of being part of the hidden "dark web," relies on sets of relay points run by thousands of volunteers worldwide, making it difficult to identify a source of information or location of a user. Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows. As an example, Domain Generation Algorithms (DGA) dynamically create new CnC addresses that are pre-created by the botnet owners to alter the flow of traffic and avoid both detection and blocking, and the use of Tor is on the rise to further hide CnC centers. The creators of botnets use a number of different tactics to try and conceal the presence of their command and control (CnC) servers.
