• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
humint: diving deep into the dark web

HUMINT: Diving Deep into the Dark Web

You are here: Home / General Cyber Security News / HUMINT: Diving Deep into the Dark Web
July 9, 2024

Clear Web vs. Deep Web vs. Dark Web

Threat intelligence professionals divide the internet into three main components:

  • Clear Web – Web assets that can be viewed through public search engines, including media, blogs, and other pages and sites.
  • Deep Web – Websites and forums that are unindexed by search engines. For example, webmail, online banking, corporate intranets, walled gardens, etc. Some of the hacker forums exist in the Deep Web, requiring credentials to enter.
  • Dark Web – Web sources that require specific software to gain access. These sources are anonymous and closed, and include Telegram groups and invite-only forums. The Dark Web contains Tor, P2P, hacker forums, criminal marketplaces, etc.

According to Etay Maor, Chief Security Strategist at Cato Networks, “We’ve been seeing a shift in how criminals communicate and conduct their business, moving from the top of the glacier to its lower parts. The lower parts allow more security.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Spotlight: What is Tor?

Tor is a free network, built upon open-source, that allows for anonymous communication. While Tor was originally developed by the United States Naval Research Laboratory, it has become an increasingly popular solution for illegal activities.

Conducting these activities on the Clear Web can lead to law enforcement monitoring and allow tracing back to the criminal. But through Tor, communication is encrypted across three layers that are peeled off at every node jump until exiting the network. Law enforcement agencies monitoring Tor will not see the criminal’s IP, but the Tor exit node, making it harder to trace back to the original criminal.

Tor communication architecture:

Etay Maor adds “In the 2000s, a celestial alignment of digital capabilities boosted criminal efforts. First, the Dark Web emerged. Then, hidden and secure services through Tor. Finally, cryptocurrency allowed for secure transactions.”

Criminal Services Available on the Dark Web

Here are a few examples of services that were available on the dark web in the past. Today, many of these have been taken down. Instead, criminals are moving towards the Telegram messaging platform, due to its privacy and security features.

Example include –

Drug selling:

Fake identity services:

Marketplace for vendor search, including a warning about phishing attempts:

How are Criminal Forums Managed? Creating Trust in an Untrusted Environment

Attackers attempt to exploit vulnerabilities and break into systems as a way to turn a profit. Just like any other commercial ecosystem, they use online forums to buy and sell hacking services. However, these forums need to create trust among members, while they themselves are built on crime.

Generally speaking, such forums were initially designed as follows:

  • Admin – Moderates the forum
  • Escrow – Facilitating payments among members
  • Black-list – An arbitrator for settling issues like payments and service quality
  • Forum Support – Various forms of assistance to encourage community engagement
  • Moderators – Group leads for different topics
  • Verified Vendors – Vendors that were vouched for, unlike some vendors who are scammers
  • Regular Forum Members – The members of the group. They were verified before being allowed to enter the forum to filter out scammers, law enforcement agencies and other irrelevant or risky members.
  • The Path from Malware Infection To Corporate Data Leak in the Dark Web

    Let’s see how the different stages of attack are represented in the Dark Web, through an example of malware used to steal information for ransomware purposes:

    Pre-incident phases:

    1. Data Collection – Threat actors run worldwide infostealer malware campaigns and steal logs of compromised credentials and device fingerprints.

    2. Data Suppliers – Threat actors supply data to Dark Web markets specializing in credentials and device fingerprinting from malware-infected computers.

    3. Fresh Supply – The logs become available for purchase in the Dark Web market. The price of a log typically ranges from a few dollars to $20.

    Active incident phases:

    4. Purchase – A threat actor specializing in initial network access purchases the logs and infiltrates the network to elevate access. Many times the information purchased includes more than credentials. It includes cookie sessions, device fingerprinting and more. This allows mimicking the victim’s behavior to circumvent security mechanisms like MFA, making the attacks harder to detect.

    5. Auction – The access is auctioned in a Dark Web forum and purchased by a skilled threat group.

    Etay Maor notes, “Auctions can be run as a competition or as “Flash”, meaning a threat actor can purchase immediately without the competition. Serious threat groups, especially if they are backed by nation states or are large criminal gangs, can use this option to invest in their business.”

    6. Extortion – The group executes the attack, placing ransomware in the organization and extorting it.

    This path highlights the various areas of expertise within the criminal ecosystem. As a result, a multi-layered approach fueled by operationalizing threat data can alert and possibly prevent future incidents.

    The Role of HUMINT

    Automated solutions are indispensable for fighting cyber crime, but to fully understand this realm, human intelligence (HUMINT) is required as well. These are cyber crime officers, the actors from the law enforcement agencies who log into forums and act like trade actors. Engagement is an art, and also has to be an ART – Actionable, Reliable and Timely.

    Let’s see some examples of the forums tracked by cyber crime officers and how they respond.

    In this example, an attacker is selling VPN logins:

    The cyber-criminal officer will try to engage and understand which VPN or client this belongs to.

    In another example, an attacker is selling Citrix access to an IT infrastructure Solutions and Services Provider in the UK.

    A cyber crime officer might reach out as a potential buyer and ask for samples. Since the seller is acting from an economic point of view, and might not be in a good financial situation (coming from former-USSR countries), they will be willing to send samples to promote a sale.

    Protecting Against Network Attacks

    The Dark Web operates as an economic ecosystem, with buyers, sellers, supply and demand. Therefore, effective protection against network attacks requires a multi-layered approach for each stage of the attack, both pre-incident and throughout the incident itself. Such an approach includes the use of automated tools as well as HUMINT – the art of engaging with cyber criminals online to gather intelligence by mimicking the way they operate.

    To see more fascinating examples and hear more details about HUMINT and Dark Web forums, watch the entire masterclass here.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.


    Some parts of this article are sourced from:
    thehackernews.com

    Previous Post: «guardzoo malware targets over 450 middle eastern military personnel GuardZoo Malware Targets Over 450 Middle Eastern Military Personnel
    Next Post: Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks hackers exploiting jenkins script console for cryptocurrency mining attacks»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
    • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
    • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
    • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
    • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
    • Beyond Vulnerability Management – Can You CVE What I CVE?
    • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
    • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
    • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
    • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

    Copyright © TheCyberSecurity.News, All Rights Reserved.