Blackout On The Dark Web

Hackers have deleted more than 6,500 sites being held on a popular dark web server. Called Daniel's Hosting, the site was sitting on the hidden Tor network and many people used it to host pages they did not want to publish on the wider web.

Administrator Daniel Winzen said no back-ups were kept of the pages it hosted. He said the site should be back in service in December.
 
"Around 6,500 hidden services were hosted on the server," wrote Mr Winzen in a message put on the welcome page of the web companion to the site. "There is no way to recover from this breach, all data is gone."

Tor, or The Onion Router, is a way of organising web-like pages so it is hard to work out where the information is located and who is running them. Web pages sited on the Tor network get an a.onion suffix. The Tor browser also lets people browse the web in a way that conceals their location and obscures their identity. 

Daniel's Hosting became one of the most popular sites for, a.onion site owners, after the previously biggest host went offline in early 2017.

Daniel's hosted a very wide variety of material including fan fiction, political tracts, philosophy books, porn, hacked files, videos, web marketplaces, crypto-cash forums and places where whistleblowers could leave documents. Mr Winzen told the BBC that he was still trying to work out how hackers had accessed the site on 15 November, when all the data was deleted.

"As of now, I haven't found the vulnerability," he said.

The prime candidate is a newly discovered vulnerability in PHP, a computer scripting language used for website development, that was being circulated in some hacker circles shortly before Danwin was attacked. However, Mr Winzen told ZDNet that he was not sure that this was the route the hackers took to gain access. When the site returns, he said he would take the chance to change "some bad design choices of the past" and improve how it runs.

It is also not clear who broke into Daniel's Hosting or why the data was deleted. The Anonymous hacking collective has been behind takedowns of other dark web hosts but, so far, there is no sign of that group's involvement in this attack.

BBC:

You Might Also Read:

Dark Web Dealers Voluntarily Ban Deadly Fentanyl:

 
« UK Launches Long-Awaited Cyber Skills Strategy
Russia Supported Trump Election Campaign »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.