<ul data-eligibleForWebStory="true">Tor routes internet traffic through volunteer-operated servers to provide anonymity and privacy.Legitimate users may utilize Tor for online privacy, but threat actors can exploit it for malicious activities.Detection of Tor activity within an organization should raise concerns and trigger investigations.A Python script has been developed to analyze network traffic and user authentication logs for detecting malicious Tor traffic.Communication with both entry and exit points of the Tor network may indicate a connection to a hidden C2 server.Accessing a user account from a Tor exit node could signify a threat actor using stolen credentials while hiding their IP address.The script utilizes a live list of Tor exit nodes from the Official Tor Project to identify malicious traffic.Timely ingestion of logs is crucial for accurate detection, as the list of active exit nodes changes frequently.Sophisticated threat actors may avoid Tor to prevent detection in corporate environments, opting for other techniques like commercial VPNs.Less advanced adversaries may still leverage Tor, leading to detectable patterns of traffic.Using commercial VPNs or compromised devices is a common tactic among threat actors to disguise malicious traffic.The script aims to identify potentially damaging but less sophisticated attacks relying on the Tor network.The full script can be found in the developer's Github Repository.