Dark Web thrives despite Operation Onymous

There is a part of the web that is still hidden from the majority of the Internet users, a so-called dark web that cannot be found by conventional search engines or accessed by standard browsers.

Parts of the dark web reside on the Tor network, which, thanks to its nigh untraceable user anonymity, is a fertile breeding ground for cyber-criminals and illicit dealings. It is the ideal environment for an online illegal goods black market that sells everything from drugs and weapons to hitmen and hacking attacks for hire.

The dark web is a section of the Internet that is not indexed by search engines such as Google and not easily navigated to using a standard web browser.

Accessing the dark web requires specialised knowledge and software tools. An example of this is content that only accessible by using the Tor software and anonymity network, which while protecting privacy, can be associated with illicit activities.

These specialised black markets are flourishing in this nefarious corner of the Internet; criminals are developing points of aggregation where buyers and sellers can operate in anonymity and benefit from escrow services offered by the operators.

Names such as Silk Road (and its successor, Silk Road 2.0), BlueSky Marketplace, Pandora Marketplace, Tor Bazaar Alpha and Cannabis Road have become hugely popular in the criminal ecosystem.

Law enforcement and judicial agencies worldwide have coordinated their efforts against illicit dark web markets on the Tor network. An impressive FBI bust on 5 and 6 November, dubbed Operation Onymous, saw the closure of hundreds of websites operating on the Tor network. Its key achievement was the seizure of the black market Silk Road 2.0 and the arrest of its alleged manager, Blake Benthall.

Operation Onymous certainly had a significant impact, with well-known sites shut and levels of online illicit deals decreasing. However, security experts observed a rapid response from the criminal underground to the pressure exerted by law enforcement.

Data provided by the non-profit Digital Citizens Alliance Security suggests Onymous shifted the balance in favour of new and surviving black markets, which have now gained market share.
The criminal underground is also demonstrating significant capability to restore illegal activities by building new services. Through its monitoring, Digital Citizens claims it was tracking 18 dark networks at the time of the Onymous crackdown. That number was reduced to seven after Onymous but since then, five new sites have popped up to fill the void.

There are more threats to contend with than just the black markets. The dark web is an ideal environment for the spread of child porn and harbours botnets designed to steal credit card data.

Anonymising networks, and in particular the Tor network, are a powerful instrument in the arsenal of cyber-criminals to conduct illegal activities, such as the takeover of bank accounts. A US Treasury Department report states that the majority of bank account takeovers by cyber-criminals affecting organisations over the past decade exploited the anonymising Tor network.

Bad actors will explore even more the dark web to hide their identity and increase their business opportunities. This requires a significant effort from enforcers and private security firms: hacking techniques used to de-anonymise users have to be integrated with meticulous intelligence activities to infiltrate the principal criminal crews and identify their main operators on the dark web.

http://www.ibtimes.co.uk/guns-drugs-hitmen-child-porn-dark-web-thrives

« FBI briefed on alternate Sony hack theory
Sony has a $60 million Cyber Insurance policy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Radar Cyber Security

Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

Global Forum on Cyber Expertise (GFCE)

Global Forum on Cyber Expertise (GFCE)

GFCE is a global platform for countries, international organizations and private companies to exchange best practices and expertise on cyber capacity building.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

DDLS

DDLS

DDLS is Australia's largest provider of corporate IT, process training and cybersecurity training courses and certification programs.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.