Ciao, un paio di articoli su una botnet comandata attraverso un Tor hidden service: http://securityaffairs.co/wordpress/8678/cyber-crime/botnet-pro-cons-of-using-tor-networks.html http://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor.html