Avoiding Arrest: Cyber Criminals Share Dark Web Secrets

On the Dark Web there are many secrets to be found, including insights into what criminals say and do if they are caught.  Recent research conducted by the Digital Shadows threat intelligence team explored the discussions between black hat hackers and the exchanges made in how to avoid jail, including advice about what do to when they are on law enforcement radars and they come to the prospect of arrest. 

In particular, Digital Shadows gathered information on the the idea, in which law enforcement "will not care" if the US or EU are targeted, but the moment any former Soviet Union nations are involved, they will "hunt you down." 

It appears that in Russia cyber criminals live a relatively peaceful life, but attempting to go abroad is more risky as they are much more likely to be arrested. One poster said that the "best country" to be in is Russia, but "under appreciation and low wages drove him to participate in unethical and criminal behavior." 

Operational security (OPSEC) practices are also widely discussed, with forum users exchanging ways to avoid arrest and stay anonymous. Numerous threads mention everything from virtual to physical security options, but one common topic of discussion, in particular, is widely debated.  

Hard drive encryption or deletion is sometimes cited as a way to stop law enforcement investigations in their tracks, however, not every forum user is so sure, with one saying, "if it were all as simple as that then major cases would never be solved." Early mistakes in criminal careers also appear to be causing some sleepless nights, with poor OPSEC when starting out being a difficult issue to remedy. 

"Many a threat actor's downfall stemmed from poor OPSEC practices when they first decided to don the black hat, such as using a spouse's email address, forgetting to mask their IP, or letting their real name and address slip," one Digital Shadows researcher commented.

In addition, discussions have taken place over collaboration. While many believe that other dark web forum users will "sell out" each other, others say that forging ties with others in the criminal industry can push threat actors up the pecking order.  

Digital Shadows noted that allegations are flying thick and fast that English-speaking criminal forums and marketplaces are becoming little more than police honeypots. Some forum users said that "sooner or later," law enforcement will obtain information on them, and others relayed concerns over potential police violence on arrest. 

Others appear, at least online, to have a rather bullish attitude to the prospect of prosecution at all. Laws worldwide are still catching up with the evolution of cyber crime, and for some, corrupting law enforcement and saving enough to pay bribes and avoid prosecution is a possibility. One forum user wrote, "a good lawyer knows the law, a better one knows the judge."  

According to threat researchers at  Cisco Talos "Cyber criminals, just like the organisations they target, must always have one eye on their security practices... There are so many things for them to worry about and ways they can slip up..It must be pretty tiring. Threat actors must keep looking over their shoulders, fixing past mistakes, and coming up with new ways to beat the technology used to track them."

Experts say that while there are ways to trace activity on the dark web, police officials always require special training and specific information about the activity.

Security researcher Karan Saini at India's Centre for Internet and Society said, “Attempting to track unconventional online behaviour would call for development of new methods, along with formal training for those involved, especially if malicious actors are using the Tor network to carry out illicit activities instead of the clear web”

Digital Shadows:     Talos:     ZDNet:     Economic Times:     Journal of Criminal Law:    Image: Unsplash

You Might Also Read: 

Inside The Deep & The Dark Web:

 

« New Cyber Security Measures To Protect US Energy
Facebook's Internal Content Rules Revealed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

Kinetic Investments

Kinetic Investments

Kinetic Investments is a venture capital firm dedicated to early-stage companies that are transforming the digital landscape.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.