Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Researchers Examine Depths of Cybercrime in Deep Web

Researchers at Trend Micro have released a paper examining cybercrime in the darkest layers of the Internet, the so-called Deep Web.

Researchers at Trend Micro have released a paper examining cybercrime in the darkest layers of the Internet, the so-called Deep Web.

Also known as the invisible web, the deeper web refers to the portion of the Web that is indexed by search engines like Google. Using darknets – networks that offer anonymous access to Web content – cybercriminals often seek to stay below the radar. While The Onion Router (TOR) is most associated with the deep web, there are several other networks that offer anonymity as well, such as freenet and I2P.

“The deepweb, particularly darknets such as TOR, represents a viable way for malicious actors to exchange goods, legally or illegally, in an anonymous fashion,” the paper notes.

“Our findings suggest that, at present, the main network that shows commercial activities for cybercriminals is TOR. While the deepweb has proven to be very functional for hosting botnets’ command-and-control (C&C) servers and trading merchandise such as drugs and weapons, traditional cybercrime goods (i.e., malware and exploit kits) were less popular.”

According to Trend Micro, the prices for illegal goods and services vary greatly between the visible and invisible web. For example, credit cards cost an average of $23.70 on Russian underground forums accessible over the Internet without darknet software or a rogue TLD DNS server, but $68.80 on TOR sites. In addition, more stolen accounts and account information are sold in Russian underground forums than on TOR sites although their prices seem comparable (US$126 for a US$1,000 account in TOR sites versus US$100 for a US$1,000–2,000 account in underground forums).

“Somehow, being untraceable presents drawbacks for a seller who cannot easily establish a trust relationship with customers unless the marketplace allows for it,” according to the report. “However, the lack of observable activities in unconventional deepweb networks does not necessarily mean an actual lack of such.”

“In fact, in agreement with the principle inspiring the deepweb, the activities are simply more difficult to spot and observe,” the paper notes. “Note that since a driving factor for marketplaces is critical mass, it is quite unlikely for them to long for such a high level of stealth unless the consequence, should they be discovered, is sufficiently severe (e.g., child exploitation imagery). In such cases, sites may only come online at specific times, have a brief window of trading, then disappear again, making them more difficult to investigate.”

The paper can be read here.

Written By

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.