Dark Web thrives despite Operation Onymous

There is a part of the web that is still hidden from the majority of the Internet users, a so-called dark web that cannot be found by conventional search engines or accessed by standard browsers.

Parts of the dark web reside on the Tor network, which, thanks to its nigh untraceable user anonymity, is a fertile breeding ground for cyber-criminals and illicit dealings. It is the ideal environment for an online illegal goods black market that sells everything from drugs and weapons to hitmen and hacking attacks for hire.

The dark web is a section of the Internet that is not indexed by search engines such as Google and not easily navigated to using a standard web browser.

Accessing the dark web requires specialised knowledge and software tools. An example of this is content that only accessible by using the Tor software and anonymity network, which while protecting privacy, can be associated with illicit activities.

These specialised black markets are flourishing in this nefarious corner of the Internet; criminals are developing points of aggregation where buyers and sellers can operate in anonymity and benefit from escrow services offered by the operators.

Names such as Silk Road (and its successor, Silk Road 2.0), BlueSky Marketplace, Pandora Marketplace, Tor Bazaar Alpha and Cannabis Road have become hugely popular in the criminal ecosystem.

Law enforcement and judicial agencies worldwide have coordinated their efforts against illicit dark web markets on the Tor network. An impressive FBI bust on 5 and 6 November, dubbed Operation Onymous, saw the closure of hundreds of websites operating on the Tor network. Its key achievement was the seizure of the black market Silk Road 2.0 and the arrest of its alleged manager, Blake Benthall.

Operation Onymous certainly had a significant impact, with well-known sites shut and levels of online illicit deals decreasing. However, security experts observed a rapid response from the criminal underground to the pressure exerted by law enforcement.

Data provided by the non-profit Digital Citizens Alliance Security suggests Onymous shifted the balance in favour of new and surviving black markets, which have now gained market share.
The criminal underground is also demonstrating significant capability to restore illegal activities by building new services. Through its monitoring, Digital Citizens claims it was tracking 18 dark networks at the time of the Onymous crackdown. That number was reduced to seven after Onymous but since then, five new sites have popped up to fill the void.

There are more threats to contend with than just the black markets. The dark web is an ideal environment for the spread of child porn and harbours botnets designed to steal credit card data.

Anonymising networks, and in particular the Tor network, are a powerful instrument in the arsenal of cyber-criminals to conduct illegal activities, such as the takeover of bank accounts. A US Treasury Department report states that the majority of bank account takeovers by cyber-criminals affecting organisations over the past decade exploited the anonymising Tor network.

Bad actors will explore even more the dark web to hide their identity and increase their business opportunities. This requires a significant effort from enforcers and private security firms: hacking techniques used to de-anonymise users have to be integrated with meticulous intelligence activities to infiltrate the principal criminal crews and identify their main operators on the dark web.

http://www.ibtimes.co.uk/guns-drugs-hitmen-child-porn-dark-web-thrives

« FBI briefed on alternate Sony hack theory
Sony has a $60 million Cyber Insurance policy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

CPP Group UK

CPP Group UK

CPP Group UK develops products to help insurers add further value to their products and services through its innovative suite of new products in FinTech, InsurTech and cyber security.

Partnership for Conflict, Crime and Security Research (PaCCS)

Partnership for Conflict, Crime and Security Research (PaCCS)

PaCCS delivers high quality and cutting edge research to improve our understanding of current and future global security challenges in areas including cybersecurity.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.

Teal

Teal

Teal provides exceptional managed IT solutions for small- to medium-sized organizations that value real partnerships and elevated security.