fbpx

The deep web (also known more sinisterly as the dark web) has a bad reputation—black marketplaces, identities for sale, grisly and horrifying images, illegal pornography, and just about every other bad thing you can think of is available there. But there are also some really great things you might want to check out.

To access these sites, you’ll need to use Tor, which allows you to connect to these sites anonymously, and will keep your connection private. As long as you’re not doing anything too sensitive, you shouldn’t need to worry about compromised exit nodes, so check out these sites and enjoy!

Jotunbane’s Reading Club

jotunbanes-reading-club

Jotunbane describes the reasoning behind his website like this: “I got tired of ebooks that looked like they were made in a hurry, and since I had the skill set to do something about it, well here we are.” In short, the Reading Club lets you download books that have been cleaned up from their original e-book versions.

I downloaded William Gibson’s Neuromancer and gave it a quick look, and it definitely looks better than a lot of e-books that I’ve read, where words run together, there are inexplicable page breaks, and other weird formatting issues. I can’t speak for all of the books on the site, but because that’s pretty much the whole point, I’d imagine they’re all similarly high-quality. If you don’t abuse the system, it seems to be a good way around freedom-stifling DRM practices.

Flashlight

If you want dark-web-related news, Flashlight is a great place to get it. There’s a lot of information on Bitcoin, Tor-related projects, and Internet privacy in general. A lot of the news can be found elsewhere, but Flashlight has brought it all together under one banner to serve the needs of deep web enthusiasts.

flashlight

In addition to news, there’s also an active forum where you can discuss anything from dark web marketplaces to shipping practices—there are sections for people looking for a job or a business partner, places to leave reviews for vendors, and discussions about privacy and security. The Links section of Flashlight also has a number of useful links, though not as many as Hidden Wiki or other dark web directory sites.

Hidden Answers

If you have a question, you can get the answer (or at least a sarcastic response) at Hidden Answers. As a large forum site, HA puts people in contact with other people to exchange information. There are loads of different categories, from drugs and erotica to gainful employment, governments and law, and knowledge and information.

hidden-answers

The site is great if you want to get the answers to specific questions, but it’s also a fascinating place to explore: on the deep web, people can ask the questions they want and get honest answers, often on topics that aren’t discussed on the clear web. You never know what you’ll find when you go browsing around Hidden Answers, but you can be sure that it’ll be pretty interesting.

Strategic Intelligence Network

According to the homepage, SIN exists to “provide intelligences, resources and tools to be prepared and to respond to crisis situations anywhere you are in the world. . . . Be prepared for the day you might face abduction, natural disaster, riot or even war.” The site is essentially a repository of useful information that could come in handy in a wide range of different situations.

sin-library

 

The library contains files on just about anything you could want: encryption, ham radio, submarine cables, fitness, forensic investigation, blacksmithing, getaway driving, sailing, hunting and trapping, fallout shelter creation, body armor, how to survive falling through ice . . . the list goes on and on. The maps section provides a huge amount of satellite imagery, and the atlas provides situation reports and a ton of information about countries around the world. This is definitely one of my new favorite sites.

AnonInbox

AnonInbox was founded on the idea that email should be totally private: “If you have nothing to hide, then use Yahoo and Gmail instead. We believe that your e-mail belongs to you and you only and we can provide solution [sic] for you to achieve this goal.” There are a number of different Tor-based email providers, but AnonInbox is one of the most serious about what they do.

anoninbox

For a cost of 0.1 bitcoins per year, you get dedicated Tor hidden service servers, firewalled outbound traffic, encrypted disks, daily backups, daily erased logfiles, and a number of other security-focused features. You also get 10GB of storage; IMAP, POP3, and SMTP access; web-based access; and peering with other .onion mailservers. While you can use this account for whatever you want, if they find out that you’re using it for anything illegal, it could be terminated.

How Will You Tell the World?

Here’s an interesting site that could occupy you for hours . . . or cause you to shake your head and hit the back button right away. How Will You Tell the World? is a long, complex riddle that combines audio and visual clues. As you can see in the image below, it’s quite complex.

how-will-you-tell

What does it mean? Is it a message to mankind? A philosophical treatise? An extended mathematics exercise? Or just a bunch of drawings thrown together as a pratical joke? Only you can decide.

Scratch the Surface

As you probably know, the deep web is absolutely huge, and there’s a seemingly infinite amount of stuff out there. You just have to know where to find it. These six sites will give you a fun introduction to the dark web and using Tor, and might even inspire you to become a dark web spelunker in your spare time.

What are your favorite deep web sites? What have you found in your travels that’s interesting, unique, or bizarre? Share your favorites below — We’d all love to hear about them!

Author:  Dann Albright

Source:  http://www.makeuseof.com/tag/little-known-corners-deep-web-might-actually-like

Categorized in Deep Web

Over the past few years we have seen a surge in cyber attacks against well-known organizations, each seemingly larger than the last. As cybercriminals look for innovative ways to penetrate corporate infrastructures, the challenges for brand owners to protect their IP has steadily grown. Fraudsters will stop at nothing to profit from a corporate entity’s security vulnerabilities, and the data they steal can fetch a hefty price in underground online marketplaces.

Whether it is a company with a large customer base that accesses and exchanges financial or personal information online, or a small brand that has IP assets to protect, no company is exempt. While banking and finance organizations are the most obvious targets, an increasing number of attacks are taking place on companies in other industries, from healthcare and retail to technology, manufacturing and insurance companies. Data breaches can have a damaging impact on a company’s internal IT infrastructure, financial assets, business partners and customers, to say nothing of the brand equity and customer trust that companies spend years building.

Battlegrounds: Deep Web and Dark Web

A common analogy for the full internet landscape is that of an iceberg, with the section of the iceberg above water level being the surface web, comprised of visible websites that are indexed by standard search engines. It is what most people use every day to find information, shop and interact online, but it accounts for only about four percent of the Internet.

The remaining sites are found in the Deep Web, which includes pages that are unindexed by search engines. A large proportion of this content is legitimate, including corporate intranets or academic resources residing behind a firewall.

However, some sites in the Deep Web also contain potentially illegitimate or suspicious content, such as phishing sites that collect user credentials, sites that disseminate malware that deliberately try to hide their existence, websites and marketplaces that sell counterfeit goods, and peer-to-peer sites where piracy often takes place. Consumers may unknowingly stumble upon these and are at risk of unwittingly releasing personal information or credentials to fraudulent entities.

Deeper still is the Dark Web, a collection of websites and content that exist on overlay networks whose IP addresses are completely hidden and require anonymizer software, such as Tor, to access. While there are a number of legitimate users of Tor, such as privacy advocates, journalists and law enforcement agencies, its anonymity also makes it an ideal foundation for illicit activity. Vast quantities of private information, such as log-in credentials, banking and credit card information, are peddled with impunity on underground marketplaces in the Dark Web.

Waking up to the Threats

The Deep Web and Dark Web have been in the public eye for some time, but in recent years, fraudsters and cybercriminals have been honing their tactics in these hidden channels to strike at their prey more effectively and minimize their own risk of being caught. The anonymity in the Dark Web allows this medium to thrive as a haven for cybercriminals, where corporate network login credentials can be bought and sold to the highest bidder, opening the door to a cyberattack that most companies are unable to detect or prevent.

While Deep Web sites are not indexed, consumers may still stumble upon them, unaware they have been redirected to an illegitimate site. The path to these sites are many: typosquatted pages with names that are close matches to legitimate brands; search engine ads for keywords that resolve to Deep Web sites; email messages with phishing links; or even mobile apps that redirect.

Moreover, as a higher volume of users learn the intricacies of Tor to access and navigate the Dark Web, the greater the scale of anonymity grows. More points in the Dark Web’s distributed network of relays makes it more difficult to identify a single user and track down cybercriminals. It’s like trying to find a needle in a haystack when the haystack continues to get larger and larger.

The Science and Strategy Behind Protection

Brands can potentially mitigate abuse in the Deep Web, depending on the site. If a website attempts to hide its identity from a search engine, there are technological solutions to uncover and address the abuse. Conventional tools commonly used by companies to protect their brands can also tackle fraudulent activity in the Deep Web, including takedown requests to ISPs, cease and desist notices and, if required, the Uniform Domain-Name Dispute-Resolution Policy (UDRP).

As for the Dark Web, where anonymity reigns and the illicit buying and selling of proprietary and personal information are commonplace, companies can arm themselves with the right technology and threat intelligence to gain visibility into imminent threats. Actively monitoring fraudster-to-fraudster social media conversations, for example, enables companies to take necessary security precautions prior to a cyberattack, or to prevent or lessen the impact of a future attack. In the event of a data breach where credit card numbers are stolen, threat intelligence can help limit the financial damage to consumers by revealing stolen numbers before they can be used and have them cancelled by the bank.

Technology can even help identify and efficiently infiltrate cybercriminal networks in the Dark Web that might otherwise take a considerable amount of manual human effort by a security analyst team. Access to technology can significantly lighten the load for security teams and anchor a more reliable and scalable security strategy.

In light of so many cyber threats, it falls to organizations and their security operations teams to leverage technology to identify criminal activity and limit financial liability to the company and irreparable damage to the brand.

Key Industries at Risk

A growing number of industries are now being targeted by cybercriminals, but there are tangible steps companies can take. For financial institutions, visibility into Dark Web activity yields important benefits. Clues for an impending attack might potentially be uncovered to save millions of dollars and stop the erosion of customer trust. Improved visibility can also help companies identify a person sharing insider or proprietary information and determine the right course of action to reduce the damage.

In the healthcare industry, data breaches can be especially alarming because they expose not only the healthcare organization’s proprietary data, but also a vast number of people’s medical information and associated personal information. This could include images of authorized signatures, email addresses, billing addresses and account numbers. Cybercriminals who use information like this can exploit it to compromise more data, such as social security numbers and private medical records. Credentials could even potentially lead to identities being sold.

Conclusion

Most organizations have implemented stringent security protocols to safeguard their IT infrastructure, but conventional security measures don’t provide the critical intelligence needed to analyze cyberattacks that propagate in the Deep Web and Dark Web. It is fundamentally harder to navigate a medium where web pages are unindexed and anonymity can hide criminal activity.

Meanwhile, cyberattacks on organizations across a wider number of sectors continue to surge, putting proprietary corporate information, trade secrets and employee network access credentials at risk. Businesses need to be aware of all threats to their IP in all areas of the Internet. Leveraging every available tool to monitor, detect and take action where possible is vital in addressing the threats that these hidden regions of the internet pose.

Author:  Charlie Abrahams

Source:  http://www.ipwatchdog.com/2016/12/14/brand-protection-deep-dark-web/id=75478

Categorized in Deep Web

No, it’s not Spiderman’s latest web slinging tool but something that’s more real world. Like the World Wide Web.

The Invisible Web refers to the part of the WWW that’s not indexed by the search engines. Most of us think that that search powerhouses like Google and Bing are like the Great Oracle”¦they see everything. Unfortunately, they can’t because they aren’t divine at all; they are just web spiders who index pages by following one hyperlink after the other.

But there are some places where a spider cannot enter. Take library databases which need a password for access. Or even pages that belong to private networks of organizations. Dynamically generated web pages in response to a query are often left un-indexed by search engine spiders.

Search engine technology has progressed by leaps and bounds. Today, we have real time search and the capability to index Flash based and PDF content. Even then, there remain large swathes of the web which a general search engine cannot penetrate. The term, Deep Net, Deep Web or Invisible Web lingers on.

To get a more precise idea of the nature of this ‘Dark Continent’ involving the invisible and web search engines, read what Wikipedia has to say about the Deep Web. The figures are attention grabbers – the size of the open web is 167 terabytes. The Invisible Web is estimated at 91,000terabytes. Check this out – the Library of Congress, in 1997, was figured to have close to 3,000terabytes!

How do we get to this mother load of information?

That’s what this post is all about. Let’s get to know a few resources which will be our deep diving vessel for the Invisible Web. Some of these are invisible web search engines with specifically indexed information.

Infomine

invisible web search engines

Infomine has been built by a pool of libraries in the United States. Some of them are University of California, Wake Forest University, California State University, and the University of Detroit. Infomine ‘mines’ information from databases, electronic journals, electronic books, bulletin boards, mailing lists, online library card catalogs, articles, directories of researchers, and many other resources.

You can search by subject category and further tweak your search using the search options. Infomine is not only a standalone search engine for the Deep Web but also a staging point for a lot of other reference information. Check out its Other Search Tools and General Reference links at the bottom.

The WWW Virtual Library

invisible web search engines

This is considered to be the oldest catalog on the web and was started by started by Tim Berners-Lee, the creator of the web. So, isn’t it strange that it finds a place in the list of Invisible Web resources? Maybe, but the WWW Virtual Library lists quite a lot of relevant resources on quite a lot of subjects. You can go vertically into the categories or use the search bar. The screenshot shows the alphabetical arrangement of subjects covered at the site.

Intute

invisible web search engines

Intute is UK centric, but it has some of the most esteemed universities of the region providing the resources for study and research. You can browse by subject or do a keyword search for academic topics like agriculture to veterinary medicine. The online service has subject specialists who review and index other websites that cater to the topics for study and research.

Intute also provides free of cost over 60 free online tutorials to learn effective internet research skills. Tutorials are step by step guides and are arranged around specific subjects.

Complete Planet

search invisible web

Complete Planet calls itself the ‘front door to the Deep Web’. This free and well designed directory resource makes it easy to access the mass of dynamic databases that are cloaked from a general purpose search. The databases indexed by Complete Planet number around 70,000 and range from Agriculture to Weather. Also thrown in are databases like Food & Drink and Military.

For a really effective Deep Web search, try out the Advanced Search options where among other things, you can set a date range.

Infoplease

search invisible web

Infoplease is an information portal with a host of features. Using the site, you can tap into a good number of encyclopedias, almanacs, an atlas, and biographies. Infoplease also has a few nice offshoots like Factmonster.com for kids and Biosearch, a search engine just for biographies.

DeepPeep

search invisible web

DeepPeep aims to enter the Invisible Web through forms that query databases and web services for information. Typed queries open up dynamic but short lived results which cannot be indexed by normal search engines. By indexing databases, DeepPeep hopes to track 45,000 forms across 7 domains.

The domains covered by DeepPeep (Beta) are Auto, Airfare, Biology, Book, Hotel, Job, and Rental. Being a beta service, there are occasional glitches as some results don’t load in the browser.

IncyWincy

how to use the invisible web

IncyWincy is an Invisible Web search engine and it behaves as a meta-search engine by tapping into other search engines and filtering the results. It searches the web, directory, forms, and images. With a free registration, you can track search results with alerts.

DeepWebTech

how to use the invisible web

DeepWebTech gives you five search engines (and browser plugins) for specific topics. The search engines cover science, medicine, and business. Using these topic specific search engines, you can query the underlying databases in the Deep Web.

Scirus

how to use the invisible web

Scirus has a pure scientific focus. It is a far reaching research engine that can scour journals, scientists’ homepages, courseware, pre-print server material, patents and institutional intranets.

TechXtra

TechXtra concentrates on engineering, mathematics and computing. It gives you industry news, job announcements, technical reports, technical data, full text  eprints, teaching and learning resources along with articles and relevant website information.

Just like general web search, searching the Invisible Web is also about looking for the needle in the haystack. Only here, the haystack is much bigger. The Invisible Web is definitely not for the casual searcher. It is a deep but not dark because if you know what you are searching for, enlightenment is a few keywords away.

Do you venture into the Invisible Web? Which is your preferred search tool?

Author:  Saikat Basu

Source:  http://www.makeuseof.com/tag/10-search-engines-explore-deep-invisible-web

Categorized in Deep Web

Do you know: There is a vast section of the Internet which is hidden and not accessible through regular search engines and web browsers.

This part of the Internet is known as the Deep Web, and it is about 500 times the size of the Web that we know.

What is DEEP WEB?

Deep Web is referred to the data which are not indexed by any standard search engine such as Google or Yahoo.

The 'Deep Web' refers to all web pages that search engines cannot find, such as user databases, registration-required web forums, webmail pages, and pages behind paywalls.

Then, there's the Dark Web or Dark Net – a specific part of that hidden Deep Web.
Deep Web and Dark Web are the intriguing topics for the Netizens all around. But when you hear the term 'Deep Web' or 'Dark Web,' you usually categorize them into one.
 
If yes, then you are wrong.
 
 

What is DARK WEB?

Dark Web is where you can operate without been tracked, maintaining total anonymity.
The Dark Web is much smaller than the Deep Web and is made up of all different kinds of websites that sell drugs, weapons and even hire assassins.

These are hidden networks avoiding their presence on the Surface Web, and its URLs are tailed up with .onion.

These [websitename].onion domains are not indexed by regular search engines, so you can only access Dark Web with special software -- called 'The Onion Browser,' referred to as TOR.

How to Install TOR on Android and iOS Devices

TOR is free, and anyone can download it.

Many of us heard about the Dark Web when the largest online underground marketplace Silk Road was taken down following an investigation by United States federal authorities.

But, what if, you can still be able to dig the Darknet contents with your regular browsers, without the need of TOR?

Here's How to Surf & Search the Deep Web without TOR

Solution: Deep Web Search Engines

Search engines like Google are incredibly powerful, but they can't crawl and index the vast amount of data that is not hyperlinked or accessed via public DNS services.

However, there are Deep Web Search Engines that crawl over the TOR network and bring the same result to your regular browser.

Some of such Dark Web Search Engines are:

Here are some Deep Web Search Engines:

These Deep Web search engines talks to the onion service via Tor and relays, resolve the .onion links and then deliver the final output to your regular browser on the ordinary World Wide Web.

However, there is one consequence of browsing Deep or Dark Web on a regular browser. Working this way will make these .onion search results visible to you, me, and also, for Google.

Moreover, tracker-less search engines are also popular in the TOR culture – like DisconnectDDGIXQuick– which ensures your privacy searches.

Importance of TOR

It is worth noting that mere access via TOR is not considered as an illegal practice but can arouse suspicion with the law.

TOR has long been used by Journalists, Researchers, or Thrill seekers in heavily censored countries in order to hide their web browsing habits and physical location, crawl the Deep Web and exchange information anonymously.

However, one of the main reasons behind the rise of TOR is NSA's Surveillance Programs.

After the Assange-Snowden revelations in the past years, public fears about their privacy getting compromised over the Internet.

The reliability of the Internet had been lost that demanded the Ciphers come into action to thwart the Federal Agency's efforts. So comes the need of TOR.

With the help of TOR, the web users could roam around the Internet beyond any fear, keeping themselves and their real identities hidden from federal and intelligent agencies.

This is why TOR is being one of the favorite targets of federal agencies.

Since Tor has long been a target of the government intelligence agencies, most online users do not feel safe to use Tor anymore.

To known how easy it is for government agencies to unmask Tor users, you can read these articles:

Who lurks in the 'Dark Web'?

According to the recent survey conducted by researchers Daniel Moore and Thomas Rid (in their book Cryptopolitik and the Darknet), it is found that 57% of the Dark Web is occupied by unauthorized contents like Pornography, Illicit Finances, Drug Hub, Weapon Trafficking, counterfeit currency flow and many more.

The netizens had given the shade of illegalities to Dark Web. This is why today Dark Web is being defined as something that is illegal instead of a 'Pool of Information.'

However, there are countless reasons to use Dark Web. But, ultimately, it depends on the surfer what to surf?

Sidelining Darkweb for criminal offenses often gray out the legitimate purposes inside Dark Web.

In the end, I just want to say:

Knowledge is Free! Happy Surfing!

Author : Rakesh Krishnan

Source : thehackernews.com

Categorized in Deep Web

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations.

Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.

Your TOR usage is being watched

What remains largely unknown is the type of operating systems these hackers prefer to use considering the nature of their work.

What Do Hackers Look For?

Anonymity is, of course, of paramount importance to a black or gray hat hacker.

As such, the type of operating system hackers choose for their exploits will primarily depend on its ability to keep the hackers’ identities well hidden.

The type of features and hacking tools that comes with the operating system is somewhat a secondary consideration, although it is just as important.

Proficient hackers who have no fear about taking unnecessary risks prefer to “hide in plain sight” using a burner laptop and the Microsoft Windows platform.

It is however not a popular choice for most given that it can only be used with Windows-based malware such as Trojan and can only work on the .NET framework and other Windows environments.

Using the burner laptops, these hackers are able to create a bootable ghost OS image that doesn’t lead back to them and copy it to an encrypted storage device, usually an SD card, before destroying the burner laptop completely.

The majority of hackers, however, seem to prefer Linux distros that are tailor-made operating systems designed by security companies to conduct digital forensics, security testing and penetration of their systems.

1 Kali Linux

kali linux

Kali Linux is by far the most popular operating system preferred by hackers, and this is mostly attributed to the versatility of the platform and the features it comes with.

The Debian-derived Linux distro was developed by Devon Kearns and Mati Aharoni of Offensive Security, who rewrote the software’s predecessor, BackTrack. It is maintained and funded by Offensive Security Ltd.

Basically the upgraded version of BackTrack, Kali Linux features a bunch of upgrades including a revamped forensic mode (now in live boot), which makes it easier for Kali users to use their bootable Kali CD or USB drive to apply it for a forensic task.

It is also compatible with some selected Android devices such as via NetHunter, an Open Source Android penetration testing platform that works primarily with Nexus devices and a few Samsung devices.

2. Parrot Security OS

ParrotOS

Popularly known as ParrotSec, this is similarly a Debian-based Linux distro that, in addition to performing penetration tests, has been designed to do Computer Forensics and Vulnerability Assessments and Mitigations.

The GNU/LINUX operating system is said to be a hacker’s favorite.

The system is designed to support hacking, pen-testing and Cloud pen-testing, and cryptography among other tasks.

3. Network Security Toolkit (NST)

Network-Security-Toolkit

Packed with an arsenal of open source network security tools, the Network Security Toolkit is a bootable Fedora-based live CD that is compatible with most x86 platforms.

The bootable OS is primarily designed for network security administrators and is suitable for performing routine diagnostic tasks, although it can also act as a monitoring tool on servers that are hosting virtual machines.

Most of the tasks performed on NST can be accessed via a web interface known as NST WUI. NST resembles Fedora in that it comes with package management capabilities and also is self-maintaining of its repository of additional packages.

4. DEFT Linux

deft-zero

The Digital Evidence and Forensics Toolkit is another open source favorite for many hackers, which is built around the Digital Advanced Response Toolkit (DART) software.

Built from the ground up, the Ubuntu-based operating system comes with a load of computer forensics and incident response tools.

Contained in the License Policy is the detailed process that determines the type of software to be used by default by the install CD.

5. Samurai Web Security Framework

samurai

This is a live Linux environment that comes pre-configured to act like a penetration testing environment.

The Samurai Web Security Framework CD comes with free open source tools that are specifically suited for hackers looking to test, gain access or attack websites.

Limitless Options for the Technologically Savvy

Hackers are not short of options when it comes to operating systems that are tailor-made for a variety of purposes.

Although Linux seems to dominate this market for hackers, there is still some preference for Windows given that most targets run Windows operating systems and as such can only be accessed in Windows-based environments.

Author:  Anonymity

Source:  https://darkwebnews.com/anonymity/operating-systems-real-hackers-use

Categorized in Deep Web

Facebook is undoubtedly the biggest social media platform today, making it among other things, a target for hackers on darknet markets

Stolen data are a popular buy on various darknet markets for criminals looking for new identities to hide their clear web activities.

As such, data breaches like the theft of Facebook usernames and passwords are not uncommon.

In a bid to protect its users, Facebook employs more than just the use of secure software to keep out criminals who supply the darknet markets with stolen information.

Facebook buys the leaked passwords from the hackers in the various darknet markets, cross-reference them with existing user passwords, then sends an alert to their users to reset their passwords or make them a lot stronger to ensure their account’s safety.

Cross-referencing Process is Heavy

alex-stamos

Facebook purchases stolen passwords from hackers on various darknet markets and uses them to improve their users’ online safety.

Facebook’s Chief of Security Alex Stamos admits that the process is not easy at all, but is very effective.

He mentioned that the biggest threat to the safety of user accounts is weak passwords and the reusing of passwords.

He highlights that, despite the security team’s efforts to keep Facebook secure from hackers looking to make a coin on darknet markets, ensuring user accounts safety is an entirely different and notably more difficult aspect.

Facebook’s security team apparently began their data mining venture shortly after the massive data breach of Adobe in 2013.

Their primary goal was to seek out users with weak, reused passwords that were shared on the Facebook and the Adobe platform.

Since then, they have continued to purchase leaked passwords from the various darknet markets in a bid to ensure their users’ continued safety.

Passwords are Secure

For those who are concerned about their passwords being accessed by the Facebook security team, Facebook security incident response manager assures them that the method used to cross-reference the passwords to the respective owners’ accounts is in no way similar.

At the time they began buying the passwords from darknet markets, they ran the plaintext passwords using a one-way hashing code in order to link the passwords to their respective accounts.

The one-way hashing function compares the hashes of the recovered password using hashes that are already stored by Facebook.

If the two hashes are successfully matched using Facebook’s security process, then Facebook identifies the user and sends them a request to change their password in order to enhance account security.

Facebook’s Move May Be Encouraging Cyber-crime

As expected, there has been outcry concerning the morality of the whole situation.

Purchasing stolen information from cyber-criminals in the various darknet markets could only promote their activities, especially now that they realize Facebook will simply pay them to return the stolen passwords.

Stamos admits that the use of passwords and usernames are more than a bit outdated.

Originally coined in the 70s by mainframe architectures, the security provided by them is less than sufficient.

This is mostly the reason why Facebook later adopted additional security measures such as the identification of Facebook friends alongside its original two-factor authentication process to determine whether an account had been compromised.

They have also enhanced the account recovery significantly by making it possible to allow close friends to help in the verification of your account recovery request.

Stamos insists that despite all the security measures they use to protect their users from cybercriminals, there is always the lot that will choose to skip these measures and as such, it is upon the security team to ensure their account security.

Author:  Darknet Markets

Source:  https://darkwebnews.com/darknet-markets/facebook-buys-leaked-passwords-darknet-markets

Categorized in Deep Web

This was a banner year for cybercriminals. Massive data breaches, ATM skimmers and malware attacks dominated the headlines throughout the year.

No matter which type of attack the scammers use, their final goal is always the same. To steal our personal information and our money.

With 2016 winding down, we're going to take a look ahead to next year. Here are three of the top cybersecurity threats to watch out for in 2017.

1. RANSOMWARE

The leading cybersecurity threat in 2016 was ransomware and we expect it to be just as rampant next year.

Ransomware isn't a new thing. It's been a serious concern since a virus called CryptoLocker arrived at the end of 2013. However, it is still a serious threat and getting worse every year, especially since hackers can now get it for free to modify as creatively as they want.

As you probably know, ransomware encrypts your files so you can't open them, and the only way to get them back is to pay a ransom. It's become such a serious problem that the FBI is asking victims to help them track down the scammers.

Ransomware isn't just a worry for individual computers. It can lock up files on a network, which means one infection can bring down an entire company. It's also possible to get it on smartphones and tablets via a malicious text, email or app.

Fortunately, it isn't all doom and gloom. Ransomware still needs your help to install. If you avoid falling for phishing emails with malicious links or downloads, you can keep ransomware off your gadget.

You can also take the precaution of backing up your computer files regularly. That way, if your files do get locked, you can wipe your drive and restore your files. Learn more ways to keep ransomware off your gadgets.

2. DDOS ATTACKS

A new era of cyberattacks is upon us. Now, seemingly harmless everyday appliances like printers, digital video recorders, webcams, thermostats and routers are being utilized as minions in Distributed-Denial-of-Service (DDoS) attacks against websites.

DDoS is an attack where a targeted website is flooded by an overwhelming amount of requests from millions of connected machines in order to bring it down. Traditionally, these attacks are launched from compromised computers and mobile gadgets collectively nicknamed a "botnet."

However, recent DDoS attacks on a security blogger's website and French website host OVH reveal that now it's not just computers that are being utilized as botnets. Even Internet of Things (IoT) appliances are fair game.

This means unsecured routers, printers, IP web cameras, DVRs, cable boxes, connected "smart" appliances such as Wi-Fi light bulbs and smart locks can be hijacked and involved in cyberattacks without the owner knowing about it. To remain unnoticed, compromised appliances could be sending out small trickles of data to make the attack discrete. Multiply that by millions and what you have is the perfect DDoS attack vector.

How serious is this? The recent attacks are reported to be the largest targeted DDoS attempts ever, with a sustained data stream of 620 Gbps and even reaching data rates of over a terabit per second, all accomplished by enslaving connected Internet of Things appliances via a trojan program infection.

Alarmingly, the source code for this smart appliance trojan program, named Mirai, has been published online for everyone to see. This means we will be seeing more of these attacks in the future and securing these connected appliances is more vital than ever.

Mirai is said to compromise about 380,000 connected appliances a day. Thankfully, after the recent DDoS attacks, internet service providers started to block infected devices and the rate of infections has been dropping.

One peculiar thing about smart appliance infections is that they clear out after a reboot because the malware only resides in temporary memory. To maintain a large botnet capable of launching a massive DDoS attack, hackers need to infect and reinfect new appliances every day.

The common vector for these smart appliances is open public ports. These are used by Internet of Things appliances so they can be accessible away from home. Hackers usually scan for open and exploitable ports remotely and this is how they locate targeted appliances.

Another reason why these attacks are gaining popularity is due to the fact that consumers assume that these are merely plug-and-play appliances. Usually, we set them and forget them and security is an afterthought. These recent attacks have changed the game for consumers and manufacturers alike.

How can you tell if your appliance is hacked?

As I mentioned earlier, these attacks were designed to have appliances like printers, routers, webcams, etc. to only transmit small amounts of data to aid in DDoS attacks so identifying which devices are compromised is tricky.

You may notice a slower than usual internet connection. Keep your eye out for unusual video or music streaming, buffering, or slow web browsing. You can also try a network analyzer like Fing to monitor your connected devices and open ports. Most routers have data packet analyzers and logs accessed by logging into the administrator page and checking if there are IP addresses that are transmitting unusual amounts of data.

Protect your appliances

Since these Internet of Things appliance infections only reside on temporary memory, the first thing you have to do is reboot the device to clear out the malware.

If you are checking your router, IP webcam or connected printer, it is important that you change the default administrator username and password. Do this by accessing the appliance's hub (usually through a webpage or a smartphone app). If your smart appliance connects via the manufacturer's website, make sure your password for their site is complex and unique.

Next, check for firmware updates. Now, with these attacks out in the open, manufacturers will start issuing security patches to prevent such infections. It's important to keep your firmware always up to date. If your gadget does not automatically fetch firmware updates, make sure to manually check at least every three months.

Some routers have some firewall functionality too. In your router's administrator page, look for settings named "Disable Port Scan" and "Enable DoS Protection" and make sure you turn these on.

As evidenced by these recent attacks and techniques, in this increasingly connected world, the more our homes become "smarter," the more we have to be smarter about our homes.

3. TYPOSQUATTING

We heard a lot about fake news spreading like wildfire across the internet in 2016. It was especially bad leading up to the presidential election.

There was so much fake news showing up on Facebook and Google that the companies started cracking down on sites that promote it. However, news isn't the only fake thing you need to be worried about.

Cybercriminals are now creating fake websites intended to look like the real deal. It's a practice known as typosquatting.

What scammers are doing is securing URLs that are similar to the real ones. For example, instead of youtube.com they could create a URL of yootube.com, slightly misspelling the original.

They're looking for victims who type the address of the site they want to go to incorrectly, taking them to the fake site. The criminal sets the counterfeit site up to look very similar to the real one, hoping to get you to enter your credentials. In some cases, the phony sites are a base for distributing malware.

Essentially this is a sneaky version of a phishing scam. The criminal waits for someone to land on the fake site to steal their personal or financial information.

Avoiding phishing attacks

Criminals are always trying to stay ahead of the curve, delivering malicious links in numerous ways. Here are some things you can do to avoid being a victim of phishing scams:

  • Be cautious with links - If you get an email or notification from a site that you find suspicious, don't click on its links. It's better to type the website's address directly into a browser than clicking on a link. Before you ever click on a link, hover over it with your mouse to see where it is going to take you. If the destination isn't what the link claims, do not click on it.

  • Double check the URL spelling - When typing a URL into your browser, take the time to verify you're spelling it correctly. With typosquatting, misspelling a URL could lead to a phishing scam.

  • Watch for typos - Phishing scams are infamous for having typos. If you receive an email or notification from a reputable company, it should not contain typos. Before clicking on a link, hover over it and check for spelling. The safest move is to type the URL into your browser, with the correct spelling of course.

  • Use multi-level authentication - When available, you should be using multi-level authentication. This is when you have at least two forms of verification, such as a password and a security question before you log into any sensitive accounts.

These were just a few cybersecurity threats that we're expecting to see in 2017. Of course with scammers always finding new ways to rip us off, we're sure to see some new attacks next year. Keep checking in with our Happening Now section and we'll let you know about all of the latest scams.

Source : https://www.komando.com

Auhtor : Mark Jones

Categorized in Deep Web

In a motion filed by assistant federal defender Peter Adolf, he argues that during the Federal Bureau of Investigation’s operation into the deepweb child pornography site “Playpen,” the FBI made the child pornography issue even worse.

Similar motions claim that the FBI themselves distributed as many as 1 million pictures and videos of child pornography to more than 100,000 users while overseeing the operations of the Playpen site.

As part of the operation known as “Operation Pacifier,” the FBI infiltrated Playpen and had full control of the site during February 2015. During this time, the FBI uploaded illicit pictures and videos that allowed malware to be installed on the computers of the site’s users. The malware led to the eventual prosecution of 186 individuals.

According to The Daily Caller, three lawyers have filed motions against the FBI for their role in distributing child pornography and running the site. In addition, several judges have recommended throwing out or suppressing evidence obtained in the hacking of users’ computers.

According to Peter Adolf’s motion filed on August 22nd to dismiss his client’s indictment, Playpen membership rose by 30 percent and the weekly number of visitors to the site increased from 11,000 to 50,000. His motion claims the FBI distributed 200 videos, 9,000 images and 13,000 links of child pornography.

His official statement:

From there the FBI distributed child pornography to viewers and downloaders worldwide for nearly two weeks, until at least March 4, 2015, even working to improve the performance of the website beyond its original capability.

As a result, the number of visitors to Playpen while it was under Government control [jumped] from an average of 11,000 weekly visitors to approximately 50,000 per week. During those two weeks, the website’s membership grew by over 30%, the number of unique weekly visitors to the site more than quadrupled, and approximately 200 videos, 9,000 images, and 13,000 links to child pornography [sites] were posted to the site.

Adolf is arguing that his client’s charges should be dropped because the FBI’s actions during the investigation were shocking and equated “outrageous conduct.”

“Government agents worked hard to upgrade the website’s capability to distribute large amounts of child pornography quickly and efficiently, resulting in more users receiving more child pornography faster than they ever did when the website was running ‘illegally,'” Adolf added.

Adolf lists comments from some of the site’s users that further his client’s claim that the site was functioning better than it ever had prior to the FBI’s presence.

Of those comments praising the site’s functionality some included comments like these:

“Yes, it is working much better now!”

“Working FAST today :-)”

“It now runs everything very smoothly!”

Adolf points to two previous circuit court cases in 1984 and 1986 where cases have been dismissed when government agents have supplied or were “intimately involved” in the production of illegal material, or when their conduct resulted in injuries to an innocent third party. The government’s current standards for child pornography include a new case of abuse each time a child has his or her image viewed.

Between information in Adolf’s motion and the similar motions filed on the 22nd, the FBI distributed a million pictures, videos, and links, and according to those defense attorneys, that number is a “conservative estimate.”

From the Department of Justice’s own press release:

“Producing and distributing child pornography re-victimizes our children every time it is passed from one person to another.”

“The court should schedule an evidentiary hearing to determine the extent of the harm caused by the government’s investigatory tactics and dismiss the indictment if the Court finds the governmental conduct leading to the charges against the defendants unable to reconcile with fundamental expectations of decency and fairness,” the attorneys concluded.

Author:  C. ALIENS

Source:  https://www.deepdotweb.com

Categorized in Deep Web

It has recently been found that an officer working for the Europol agency has leaked sensitive material about the agency’s online investigations.

A televised documentary stated that it had found over 700 pages of confidential data which included terrorism investigations. The data was found on a hard drive that had been linked to the internet. The program also stated that the hard drive containing the information was not password protected. Before the documentary aired, Europol released a statement acknowledging the leak and that an investigation has been launched to find out how, and why the data became public:

Although this case relates to Europol sensitive information dating from around 10 years ago, Europol immediately informed the concerned member states. As of today, there is no indication that an investigation has been jeopardized, due to the compromise of this historical data. Europol will continue to assess the impact of the data in question, together with the concerned member states.

A reporter for the program that was aired stated that he found the information via a search engine called Shodan; a search engine that searches the Internet of Things. He also stated that there was no password needed to access the hard drive; which he did remotely through the internet.

It was also reported that the documents contained names and telephone numbers of terrorism suspects, and associates. Most of the data was from 2006 to 2008. It included the Madrid train bombing investigations, a Netherlands based Islamist terror cell called The Hofstad Network, as well as information about attacks that have been successfully stopped aboard several flights. The reporter also said that the hard drive contained information on investigations that were never made public.

Europol claims that the officer responsible for the leak had copied the files to a separate, personal hard drive against Europol’s rules; but that the officer no longer worked for the agency.

The hard drive in question was a Lenovo Lomega and the Chinese based company had released a statement saying that it is up to the owner of the drive to make it secure. Older models such as this one require the user to input a password before they can be used securely.

Dr. Bibi van Ginkel, a senior researcher with the Netherlands Institute of International Relations, thinks a leak containing data such as this one could have negative consequences:

Police organizations never want to reveal how much they know to prevent bad guys from understanding how the police operate and infiltrate them. In times that better international-cooperation and data exchange is needed, this leak might jeopardize the trust between states.

Europol Director Rob Wainwright announced that in light of this investigation he will be attending a seminar in London this January to learn more about data protection and online privacy practices.

Author:  AMERICAN GUERRILLA

Source:  https://www.deepdotweb.com

Categorized in Deep Web

Crime is transitioning into a more digital setting these days. Traditional criminal operations become harder to execute and require a lot of logistical preparation. Online crime, on the other hand, is much more approachable. Over in Croatia, the shift to online crime is very noticeable, and most of the activity is taking place on deep web marketplaces.

Croatia Is A Darknet Crime Hub To Reckon With

The increase in online crime in Croatia was first noted by news outlet Novilist. Thanks to the anonymity aspect provided by the Tor Network, and the sheer popularity of darknet marketplaces, it makes sense for criminals to shift their activities to the Internet. As a result, it becomes much more difficult for law enforcement agents to crack down on crime in the country.

So far, law enforcement agencies have completed their investigation of several deep web cases. The vast majority of online crime related to buying and selling drugs, as well as dealing in stolen financial information such as credit card dumps and bank accounts. Considering how the deep web gives anyone access to all kinds of products and services, the global appeal continues to increase every quarter.

Croatian High-tech Crime Department’s Kristina Posavec stated:

“There are plenty of these dark net markets that offer absolutely everything – from drugs, weapons and stolen personal information to child pornography, credit card information and illicit drugs. Absolutely everything, whatever you wish, you can find there. If someone wants to get drugs he no longer needs to look for dealers in dark alleys when you can order drugs that will arrive at your home address, packed in a box of CDs or a box of chocolates. This is one of the most popular methods because it is more convenient and easier. A 14-15-year-old child can easily order drugs from the living room, without the knowledge of his parents.”

Despite the increase in online crime, the Tor Network is not only used for criminal activity. Plenty of people use the technology to remain anonymous on the Internet or hide their real IP location for legitimate purposes. People access Facebook through Tor, and journalists rely on the network to work in anonymity.

That being said, the rise in darknet crimes has Croatian officials concerned. Revealing user identities is far more challenging than before, as tracing the digital breadcrumbs can be a challenge. Additionally, there are roughly 1,200 deep web crime cases reported every year, indicating this new form of crime needs to be taken seriously.

Author:  JP Buntinx

Source:  http://www.livebitcoinnews.com/deep-web-crime-croatia-exploded-recent-years

Categorized in Deep Web

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media