Examples of malicious applications of Tor

I would like to collect some cases or reports of malicious attacks using Tor. For example, Tor is used to implement DDos attacks and SQL injection attacks. Does anyone know of any such incidents over the years?

1 Like

I’ll recommend you to do your own research.
There is a bunch of papers here: Free Haven's Selected Papers in Anonymity

1 Like