Author: DarkOwl Content Team

[Webinar Transcription] Executive Protection and Security in a Dangerous World

February 19, 2025

Or, watch on YouTube

Executives are increasingly targeted by activists of all types, posing significant threats to them personally and risks to their organizations. Many of these attacks can be detected or even predicted by monitoring exposure of the executives in the darknet, including leaked and stolen PII, credentials, chatter around the executives, and in some cases direct threats.

Despite utilizing various security tools, many organizations lack a dedicated executive protection service to monitor and alert on potential threats or negative chatter targeting executives. Addressing this challenge might seem complex, but the stakes have never been higher.

In this webinar, attendees learned how to effectively baseline, monitor, and alert on organizational and executive threats using Dark Owl’s Vision platform. Discover practical steps to safeguard your executives and your organization against these evolving threats.

NOTE: Some content has been edited for length and clarity.


Kathy: Today’s webinar will be held as a fireside chat with Mark Turnage, DarkOwl’s CEO as our moderator. Before we begin, we’d like to give each company a moment to introduce themselves.

Brandon, would you like to tell us a little about Ascent Solutions?

Brandon: Absolutely. So, if you’ve never heard of us before, we are Ascent Solutions. We’re an award-winning Microsoft Solutions partner that specializes in the Microsoft security stack. We offer a wide range of cybersecurity services to include advisory, professional services, as well as managed services, including Cyber Threat Intelligence, Security Operations Center, and Threat and Vulnerability Management as a service, just to name a few.

Kathy: Mark, would you like to tell us about DarkOwl and then start our chat?

Mark: I’d love to. My name is Mark Turnage. I’m the CEO of DarkOwl and Co-founder of DarkOwl. DarkOwl is a company that was established for the sole purpose of monitoring the darknet and what we call darknet adjacent networks for criminal activity and underground activity on behalf of our clients. We monitor over tens of thousands of sites a day and they include everything from the traditional TOR network all the way to Telegram channels where threat actors are now, are now active. Our product is, our data is available via a number of different ways, UI, APIs, data transfers, and we number many of the world’s largest cybersecurity companies as our customers.

It’s a pleasure to be here today with Brandon, and I’m going to just let Erin introduce herself really quickly, and let’s start with questions.

Erin: Hi, everybody, I’m Erin. I’m the Director of Intelligence and Collections at DarkOwl, so responsible for the data that we collect as well as doing investigations on behalf of our customers.

Mark: Great, let me go ahead and start. I’m going to direct this question first at Brandon and then at Erin. Can you give us the basics of executive protection? What is it and why is it important?

Brandon: Well at Ascent Solutions we offer what we call digital executive protection monitoring and alerting services that succinctly tie in with our team’s approach to continuous threat exposure management. Our approach to executive protection is actually rather simple. We provide enhanced monitoring of the dark web that specifically focuses on key executives and organizational leadership, so alerts that we recognize that alerts specifically pertaining to these individuals and key personnel could require a more tailored and of course timely approach with additional requirements actions activities and engagement beyond just the regular security team.

Mark: Great. Thank you. And Erin. Why is it important to monitor specifically, executives’ data online?

Erin: Executives tend to be the most visible people in any company. So, their information is out there, they’re doing things like webinars, they’re putting press releases out, et cetera. And so that makes them more of a target to individuals. And I think historically we’ve thought about physical threats and that’s still a concern obviously in terms of people being targeted, but more and more we’re seeing with cyber threat actors is that they’re using the information that they can obtain in the digital realm in order to target those quite visible people. And they can do this in a number of ways and this is why it’s important to monitor digital activities from different perspectives because there’s information that can be leaked about executives which can lead to information that threat actors can use and they can get their credentials and get access things that way. But there’s also a social engineering aspect to this, you know, if people are putting a lot of information out there on social media about their movements, about their hobbies, about how they operate, that makes it a lot easier for threat actors to impersonate them or use them to target members of the company. And we see that a lot with phishing attacks. So, I think it’s really important to understand, especially for executives, but probably for all employees and individuals, you know, what information is out there about you and what steps can you take to protect your digital footprint.

Mark: And I’m gonna go off script here, so I’m gonna cause our hostess Kathy to have a heart attack.

You know, I have heard through the years and have seen it, we’ve seen a little bit of it ourselves that oftentimes not only are executives the most visible members of a company, but also, they’re the least cautious. It’s the C -suite. Have you guys found that to be the case in some cases? I don’t want you to bad mouth your clients or our clients, but do you find that to be the case?

Brandon: I’d say it depends on the executive when it comes to that, but I’d say that there’s some consistency with that, Mark.

Erin: Yeah, I would say anecdotally, that does seem to happen. But I feel like maybe it makes bigger splash when it’s the C -suite that’s messed up. But you know, people, I think as well, like it could be, you know, a generational thing as well. C -suite tend to be older. They tend to be less tech savvy. They tend to not think about social engineering attacks or how the information that they’re providing could be used. But then in the same vein, younger people put way too much information on social media, in my opinion, so it’s a balance.

Mark: Sure. I mean, I’ve been subject to phishing attacks myself. Some of them quite sophisticated. And all of them, all of the most sophisticated ones tried to take advantage of the fact that I was the CEO. They had a message or a sender that I would pay attention to. They were quite sophisticated.

Brandon: Yeah, I would love to add to this one too big time. Multiple vendors throughout 2024 identified that threat actors are increasingly targeting executives basically to get a foothold into their organization causing reputational damage or just picking an insidious activity. This is also actually quite consistent with what we’ve mentioned about what we’ve seen in our SOC and we have to keep in mind that executives often have access to the organization’s most critical business functions that threat actors can have used to gain the foothold. We don’t exactly, to Erin’s point, make it very hard either. We feature our executives, in some cases, we feature the contact information, direct contact information for these folks and stuff out there as well. So, putting it all together, we basically roll out a red carpet for these folks to attack our most senior folks.

Erin: I think it’s what you have to think about the senior folks being impersonated as well. So, you know, employees are much more likely to respond to a phishing email if they think that it’s coming directly from an executive. And, you know, with things like AI now, you can generate an executive’s voice. If an executive is out there doing a lot of press webinars, their voices on the internet, you can impersonate that and use that against their employees. So there’s aspects of it as well.

Mark: We’re gonna come onto that. And the question I had for you, Brandon, was what is it about now? What’s different about now that makes monitoring this type of data more important than ever?

Brandon: Well, I think threat actors are getting more creative every day. And we’re seeing them attack and exploit things that are often on the periphery, especially since throughout 2024, we watched a lot of different vendors, third party vendors and stuff that have access into different environments get hit and whatnot. So, I do think that most of the time, when we get dark web monitoring and learning services, it’s specifically monitoring your email domain. But we need to open up the aperture on that, in my opinion, we need to be monitoring the organizational and any mentions of the organization, obviously email domains and credentials. But specifically with executives, sometimes a lot of these executives’ link some of their non-business email addresses or contact information to their business email contact information as well. So, with that, we got to be mindful of threat actors exploiting these fringe and these periphery things and stuff to get access. Their goal remains the same, causes much damage, get access, sell access, etc. We’ve got to be cognizant of that.

Mark: And Erin, what’s different about the dark web as opposed to more social media sites? Give us some sense of that difference.

Erin: Yeah, I think people on the dark web have a bit more of a sense of they can do whatever they want. So, you know, we see things like doxing, where threat actors will just provide information about individuals, and it will basically be a dossier of that individual, all the information that they can find about them. We don’t tend to see that shared as much on things like social media. And also, just the sheer breadth of kind of leak and stolen data and Stealer Logs is something that we’re seeing, a huge surge in and the dark web is where they buy and sell that information.

And I think everyone needs to be cognizant of this. You can be as careful as you want about your digital data and your footprint, but you don’t have any control over the third parties that you’re putting your information into. And if they get breached, your information is out there. So you can be pretty savvy, you can have limited social media profiles, you can have all the privacy settings, etc. But if you have my fitness power, my fitness power gets leaked, your information is out there. So that’s on the dark web. So, I think it’s very important to be aware of that.

And then kind of moving to some of the dark web adjacent sites that we monitor as well, things like Telegram and Discord. We see a lot of individuals talking about targeting or talking about accessing particular companies or just geopolitical events that their lives and you know are hitting on organizations and companies so I think just monitoring that rhetoric as well, stepping slightly away from specific executive protection but just kind of general organizational protection and reputational risk there are a lot of individuals out there that you know making anti-Semitic comments making violent comments you know making threats against executives and against organizations. And I will say social media has probably changed slightly in the last year or so where some people feel that they can do that on that open web as much as they can on the dark web, but it’s certainly something we’ve seen in the dark web, you know, over the last few years increasing.

Mark: And Brandon, give us some examples of some of the threats and risks that you guys have found and maybe talk about a unique case that you’ve you’ve come across.

Brandon: I think most commonly we see stolen credentials, data breaches ransomware posts, threat actors discussing sharing proofs of concepts or just the sale of weaponized exploit code targeting specifically vulnerabilities amongst many other different nefarious things. So, we got a couple of I think the most consistent one that we see, I would say more than often is, you know, we, our customers ask us, well, why, why are my executives, my leadership the most phished? Well, it’s like, well, look at your website, man, you got the contact information right up there. And, or, it’s something as like, your boss keeps signing up for all these random newsletters that continue to get hit, you know, with his business email, which is why he’s on X amount of different data of different data breaches. That’s the most common, the most consistent. But I think the most bizarre case that we ever had to respond to, we had a customer that had just moved organizations and went to an organization that recently got hit by a threat actor. And he had called us in to give him a hand and some assistance. Specifically, my part was to monitor the dark web, kind of get a good idea of what their presence really looked like on the dark web as well, which was very important for him, obviously. So built a couple of different cases, a couple of different cases, specifically watching for organizational mentions, email domains, or just anything and all things related to the victim company. And sure enough, the threat actor wanted to gloat about his ill -begotten gains, and he threw up a post detailing exactly what he had stolen from the company at that point took that handed it over to the team that was investigating the situation and it kind of gave them a better idea of where this threat actor could have been. So, continuing to monitor updating as needed you know especially the posts and stuff as the thread grew on there and I guess the threat actor made some enemies of his own kind, and they decided to dox him.

Mark: Oh my god.

Brandon: After they doxed him, they basically put it out there like this is who he is, thisis where he lives, this is his home address, this is where his parents work, here’s all his socials, these are all his data repositories, this is where he stores his data. And they basically stripped this threat actor, all this anonymity and then immediately I turn that over to the team and I would like to believe they finally adjudicated him. I haven’t seen a post from him since. So, it could be that, well, let’s hope.

Mark: That’s very, very interesting. Erin, give us a sense of what trends you’re seeing in terms of threats in the current environment.

Erin: Yeah, I just want to jump onto what Brandon was saying there. I always find it really interesting, like I think we focus very much on, “let’s protect our executives and our organizations,” or it’s absolutely we should be doing but I love the fact that the data that we have in leaks and from doxing and stealer logs helps us to attribute who is actually doing this so we can kind of use what they’re using against us back against them and it really helps to know kind of why someone’s doing something and what their motivation is because it allows you to assess the threat you know a lot better you know there’s a difference between armchair trolls that are just making threats because they’ve got nothing better to do and someone that is going to follow through on that threat. So, I think it’s really interesting to have that motivation.

In terms of trends, we’re just seeing a huge mass of data, it’s just growing and growing. We’re not seeing that diminishing in any way in terms of data leaks. I think stealer logs, they’re not new, but they definitely seem more prominent in this sector in terms of people being able to use those, the amount of credentials that are stolen and how people can use that to access things. I think we’ve definitely as well seen a lot more sophisticated social engineering, I think particularly some threat actor groups in terms of targeting call centers and targeting help desks of organizations as well as the executives and CEOs, and being pretty convincing based on the information that they’re able to find on both the dark web and the surface web to put that out there. Brandon’s already mentioned phishing as well, you know, not a new trend, but phishing is not going anywhere. I think as long as your email address is out there, it’s a technique that works. I mean, you look at things like colonial pipeline that was, you know, really basic phishing and lead to credential attack that, you know, led to the shutdown of the colonial pipeline. So, I think those are the things that we continue to see and that we have to continue to mitigate against.

And then I guess the other thing that I’ve kind of already touched on that we see in terms of threats being made against executives or organizations, I feel like anecdotally, people are less concerned about the threats that they’re making there. They’re not trying to obfuscate who they are as much as they used to. I think people feel a little bit braver about what they can and can’t say. And you know, part of that’s people on the internet, they’re sitting behind a screen, you know, they think they’re untouchable. But also, I think it’s just kind of the way things are developing geopolitically, people have a sense that they can do things and take action. And I think, you know, we’d be remiss in an executive protection webinar not to talk about the United Health Care assassination. You know, that individual, as far as we know from reports, obviously, I wasn’t involved in that investigation in any way, didn’t have a huge amount of rhetoric online, you know, thinking about doing that. But I think it really just highlights, you know, when people have pain points, and they’re talking about those pain points, you need to kind of pay attention to them. And that the digital world and the digital things that people are talking about and the exposure that people have, you know, he had to know that that executive was going to that hotel at that time, and that was probably from his digital footprint. And so there can be real world, you know, real world impacts outside of, you know, hacking and, you know, network things that I think it’s important to be aware of as well.

Mark: And can I ask you both a question when you’re monitoring an executive take me as an example you’re monitoring Mark Turnage. How often do you pay attention to Mark Turnage’s is spouse or partner and family. Have you seen that as an attack vector by threat actors?

Erin: I would say it’s definitely an attack vector. Again, executives will get education through their security, through their SOC, whoever telling them what they shouldn’t do and they can improve that. Whereas kids might post where they’re going on holiday and things like that, and it can make them more vulnerable. What I would say about that, though, is that it’s really up to the organization and the executive whether they want to extend the monitoring that wide. A lot of people for very legitimate reasons don’t want to share the more personal side of their information, their family, their personal emails, etc. I would caution against that because, you know, you need to look at things in the whole when it’s looking at this. But yeah, that does tend to be an issue is the privacy concerns around that.

Brandon: Yeah, I grouped that with the periphery as well.

Mark: We’ve seen one or two cases where the social, as Erin said, the social media posts of children were a primary attack vector because they could follow an executive’s family around. And as Erin said, it’s a choice for the executives and the organization to make.

Give me a sense, Brandon, what practical steps can be taken to baseline an organization and then monitor it? And how have you used DarkOwl to monitor and alert to these threats?

Brandon: Yeah, absolutely. Well, one thing I learned after 20 years in the Marine Corp., is collection planning is key for any different type of operation. So, what we do for Digital Executive Protection Monitoring and Learning Services, we have a whole menu of different things that we offer our different customers and stuff who wish to subscribe to this. So, it’s up to them. From there, we pump that stuff into DarkOwl to specifically monitor for those different things. And the great thing about DarkOwl is you’re able to build a case and stuff where it’s gonna go out and fetch whatever frequency that you want it to. This is the information that you ask it to go look for on various different things. If I wanna specifically look in extremist forums or just other threat actor-based forums, I can have it look specifically for these different things and stuff there. Or if I just wanna focus on email domains or email addresses or all that in these different forums, like – Yeah, absolutely, I’m gonna go do that. Most consistently, as far as our basic package goes, what we do is we monitor the organization, organizational email domain, and the names and the business email addresses, and in some cases, personal email addresses that are joined to the network environment of the different executives, and we build a case around that. So anytime something does pop up, it’s I get a notification and then we handle it accordingly.

Mark: So great. And and those can be in relatively real time, you know, within a minute of a post being posted.

Brandon: Yup.

Mark: Erin, give me a sense of what mitigations companies can take to protect their executives. I mean, it sounds like there’s this Wild West world where data is being spilled out there or doxed out there, you know, what kind of company or an organization really do to mitigate the risk to their executives and to the organization itself?

Erin: Yeah, so I think one is doing this kind of monitoring and being able to baseline what is already out there because there’s no way that there isn’t something out there to begin with. So, you want to have that and you want to be able to see for any changes. But basic steps that organizations can take is giving people cybersecurity training on phishing attempts and what to look out for, giving people advice on what they shouldn’t share on social media and how they should set their privacy settings, etc. I think having a really strong password policy leaks are going to happen, but if you’re not using the same password on every account, it really reduces the risk that it has to your overall footprint. I think using things like password managers can really help with that.

And then I think being cognizant of what data is out there, you know, there are ways to remove some of that data, not on the dark web, unfortunately. So if your data is on the dark web, your data is out there. But there are a lot of kind of data brokers and other organizations that will hoover information up from public records and from social media and you can legally ask for that information to be removed. So that’s something that you should probably look at doing as well.

And I think just being generally vigilant, making sure that your employees are trained and know what to look out for, but also know what they should and shouldn’t do. Like, don’t post too much information on social media. Don’t mix your personal and your business email addresses on accounts like don’t use your business account for your hotel bookings and things like that because that’s the way that threat actors can you know piece together your life and do those kind of doxes that Brandon was talking about. So, I think it’s just having good cyber hygiene and having good education to try and mitigate and reduce the risks as much as possible. I think everyone needs to be aware that you can’t remove the risk. You know, there’s steps you can take. We can do this monitoring. We can be looking out for that. We can be as vigilant as possible. That we can’t protect all third parties where we’ve put our data. And so, you just need to be very vigilant for these types of attacks.

Mark: And you must get this question all the time, Brandon. What do we do about this? Can I take darknet data off the darknet? Can I take my data?

Brandon: No.

Mark: You must get this asked this all the time by your clients.

Brandon: All the time. Adding to what Erin said, I think enacting a continuous monitoring of your executives on the dark web and integrate custom alerting into your SIM to identify and respond to potential security threats. I think that’s awesome, which is why we bring that into our continuous threat exposure management, modest operandi here at Ascent Solutions. We bring this all in together. And I think it’s important having the sufficient processes in place and stuff to monitor for these specific things. DarkOwl enables a lot of that. And there’s a lot of science that goes after that when these things happen, which is why I’m just very graceful to have such an awesome SOC team that I’m a part of.

Mark: And we haven’t talked about this. Let me ask this question. How deep in an organization is it? Have you monitored for executive protection below the C-suite level, senior management as well, or do you tend to focus on just the C-suite?

Brandon: I think it depends on the organization and where they have determined their most critical business functions are. So, although this person is a mid-level part of the organization, this person is in charge of all these different industrial control system equipment here, and they have a public-facing presence that interfaces with the OT environment and the IOT environment. So yeah, that’s definitely a high-valued individual. It depends on the organization to answer your question, but yes.

Mark: Yeah, I was thinking about system administrators, for example, they’re not as sweet, but they’re very, very important people and in organization.

Erin: Yeah, I think it can depend on the role. Again, it depends on the organization, their size and their appetite for this kind of thing. But there are certain roles that you definitely need to kind of be aware of. But I think it’s also, I think to Brandon’s point, what public exposure those individuals have, the bigger footprint that they have out there, the more likely they are to become a target. So, you might be someone that has a really important role, but you’re very discreet and kept quite quiet and not publicly listed on the website or anything like that. And that’s not to say you shouldn’t want to say for them, but it’s probably less risky.

Brandon: Correct.

Mark: I’ve never heard of a company like ours or yours doing this, Brandon, but you might want to do a social media audit of all the employees to see who has the most social media exposure. Because I mean…

Erin: There’s a direct correlation with that, right? Like, so Mark, you were talking earlier about how you get phished all the time. And I know other people in our company have received those phishing emails. I never get them. And my hypothesis is, because I’m not on LinkedIn. So, you know, you can make yourself less of a target by protecting your digital footprint in certain ways. I know anecdotally of a case going back to what you were saying of family members and like checking social media and things. They had an executive who was pretty careful and pretty secure, but their wife had uploaded a review that included locational information. So, you know, it’s what people put out there.

Mark: Yeah. I have seen CISOs, system administrators, and other cybersecurity professionals very active on social media, which is an interesting tension given their roles. We’ve talked a little bit about use cases, but if you guys could both finish with sort of – one of the most unique cases that you’ve seen using the tool, that’d be, I think it’d be informative for our listeners here.

Brandon: I think the one that we specifically talked about with the other company with the threat actor getting doxed, like that was the absolute most unique case that I’ve ever seen. You know, and that’s definitely in the Hall of Fame for as far as DarkOwl for the win moments for our company.

Erin: I’m trying to think I don’t know that I can think of something that’s particularly unique. But I mean, we definitely see impersonations of executives on telegram and other areas, threats being made, a lot of memes being used for that kind of activity. And then I just think that the doxing thing is such an interesting area of data set that we collect from. I’ve seen everything from executives to FBI agents having their information released. And once that information is out there, there’s very little that you can do about that, but you need to know that it’s out there. So having that monitoring capability to know what of your information is out there and how you can be vulnerable. But as I said, I think turning that back, the threat actors do this themselves to each other. And so, it’s very helpful. I mean, there’s a lot of threat actors out there that are involved in things like swatting, they’ll swat executives and other famous people’s homes or schools or universities. And they make a kind of a game out of that. But because they’re interacting with each other, they, you know, they anger each other and that causes their information to be doxed, which helps us as an investigator to find out who is doing this. And as I said, that important part of motivation, which I think some security people, they just wanna stop an incident, they just wanna stop data being stolen. But I think it’s always really important to look at that motivation piece as well.

Mark: And Brandon and Erin, do you see any trends and threats to executives that are sort of based on geopolitical events. Something happens geopolitically or politically here in the US or something like this shooting, this tragic shooting of the United Health Care CEO. Do you see risks go up or chatter go up or does it tend to be fairly flat line throughout?

Brandon: From a geopolitical perspective, absolutely. We got to go back in time for this one a bit. But when Russia was getting sanctioned a lot by a lot of different commercial vendors and stuff, that kind of set off a red flag for a lot of the Russian-based e-crime actors and stuff to start going after and specifically targeting these companies because of the Russia-Ukrainian war and stuff. So that really prompted a lot of these folks and stuff to start going after them. So yeah, it really depends. It really depends on the situation, you know, and what the and what the atmospherics are surrounding that situation as well.

Erin: Yeah, I mean, we’ve definitely seen, I think the most recent one off the top of my head that I can think of is the Israel Hamas conflict. That definitely caused a lot of individuals that were Jewish to be targeted, and Palestinians to be targeted, so you definitely see those trends in relation to big geopolitical events, and I think that’s something that executives and organizations need to be aware of as well as posturing around these types of events. I would say with the main trend I’ve seen with the United Health Care incident was executives are more concerned. they’re taking more of a proactive approach to maybe looking at their footprint. And I think a lot of people were very surprised by the response to that from a lot of individuals on social media, on things like Telegram, where there wasn’t a lot of disgust at what the alleged assassin had done, and more concern about, you know, we don’t like these executives. There was one individual on social media who produced a deck of cards with different CEOs’ faces on them as targets. So there’s definitely that kind of rhetoric, whether that leads to actual threats or it’s just people talking. You know, it’s hard to say, and that’s again why that motivation point is important. But yeah, I think there’s definitely trends and activities that happen that have an impact on all of this kind of thing.

Brandon: It’s never a dull day in the life of a threat intelligence manager in a cyber security.


Check our blog on Executive Protection and the Darknet. Read Here

Hottolink Partners with DarkOwl to Expand Dark Web Intelligence Solutions in Japan

Hottolink, a leading provider of data-driven digital marketing, and DarkOwl, a leading provider of darknet intelligence and insights, are pleased to announce that Hottolink has become an authorized reseller of DarkOwl’s industry-leading dark web intelligence products. This partnership enhances Hottolink’s ability to deliver advanced cybersecurity and threat intelligence solutions to businesses and organizations in Japan.

DarkOwl is the industry’s leading provider of darknet data, offering the largest commercially available database of darknet content in the world. Through this partnership, Hottolink will offer DarkOwl’s powerful suite of products, enabling customers to monitor, analyze, and mitigate cyber threats originating from the dark web.

“We are delighted to announce our partnership with DarkOwl, a globally renowned company, as an authorized reseller. This agreement allows us to bring DarkOwl’s cutting-edge dark web analysis tools to the Japanese market.,” shares Shuhei Suzuki, Executive Officer and COO of Hottolink, and continues, “With the increasing number of data breaches caused by cyberattacks in recent years, the importance of dark web analysis for enterprises and government institutions has grown significantly. Through this partnership, we aim to support Japanese companies and organizations in quickly identifying and responding to the exposure of their confidential information.”

CEO and Co-founder of DarkOwl, Mark Turnage agrees, “As cyber threats continue to evolve, organizations need real-time access to actionable insights from the dark web to protect their data, assets, and reputation. This collaboration will help our mission of being able to empower more organizations globally with cutting-edge tools to enhance their security posture.”

The availability of DarkOwl’s products through Hottolink will help organizations across industries proactively address cyber risks.

About Hottolink
As the core company of the Hotto Link Group, operating in Japan and the United States, we specialize in data-driven digital marketing with a focus on earned media. Through social media marketing, we empower  companies to  boost sales and enhance their brand value.

With access to global social big data, we develop our services and products across three layers: data, product, and service. By leveraging this data, we analyze brand awareness levels, identify word-of-mouth triggers, and track information dissemination patterns for both your company and its competitors. This enables us to provide comprehensive support for your social media marketing challenges, from strategy development to implementation. Our data-driven methodology ensures actionable insights and measurable results, empowering your company to achieve its marketing goals effectively. For more information, contact Hottolink.

About DarkOwl
DarkOwl is the industry’s leading provider of darknet data. We offer the world’s largest commercially available database of information collected from the darknet. Using machine learning and human analysts, we automatically, continuously, and anonymously collect and index darknet, deep web, and high-risk surface net data. Our platform collects and stores data in near real-time, allowing darknet sites that frequently change location and availability to be queried in a safe and secure manner without having to access the darknet itself. Customers are able to turn this data into a powerful tool to identify risk at scale and drive better decision making. For more information, contact DarkOwl.

Valentine’s Day: A Celebration of Love or a Trap for the Vulnerable?

February 14, 2025

Valentine’s Day is a great time to celebrate love whether you are in a relationship or single. However, there can be a darker side to Valentine’s Day – while many celebrate romance, others target those wanting to feel loved or special by someone. 

The FBI defined romance scams (pig butchering) as when a “criminal uses a fake online identity to gain a victim’s affection and trust. The scammer then uses the illusion of a romantic or close relationship to manipulate and/or steal from the victim.”  

The FTC (Federal Trade Commission) explained that romance “scammers create fake profiles on dating sites and apps or contact you through popular social media sites like Instagram or Facebook. The scammers strike up a relationship with you to build up trust, sometimes talking or chatting several times a day. Then, they make up a story and ask for money.” 

Romance scammers are no different than other scammers – they quickly gain rapport with their targets before taking full advantage of them. It is not uncommon for romance scammers to be well versed in other types of fraud like check fraud. According to the FTC, there are specific tactics these scammers employee to quickly gain rapport with their targets. It is key for the scammer to manipulate their target by giving the victim the impression they have a genuine connection.  

In this blog, we will examine not only how romance scams and pig butchering are often mentioned across the darknet, but we will also look at various types of data scammers look for to identify their targets. 

Adult Website SEO Traffic 

One method romance scammers use to identify victims is targeting adult website Search Engine Optimization (SEO) traffic leads and databases. The following popular XSS thread was originally published in 2020 but was still receiving replies as recent as January 2025. The thread highlights how romance scammers utilize adult website SEO traffic to find potential targets when the user claimed, “there is over 3000+ people in my network that are active and above the age of 20.”: 

OnlyFans is allegedly another effective site to target for identifying new potential victims. The following user on the popular hacking forum, Black Hat World, advised other scammers to connect with other fraudsters on sites like SEOClerk and Juicy Ads where users sell access to OnlyFans traffic.  

While the above examples demonstrate fraudsters exchanging information with each other, it is also common to see tutorials for sale on darknet marketplaces. The below screenshot shows a listing of a tutorial of how to monetize adult website SEO traffic. This was listed on TorZon Marketplace on January 20, 2025: 

Scammers will also sell services related to targeting adult SEO traffic. The following post from the now defunct Cracked.io shows a user advertising their SEO traffic service for $300 USD a day. The users provided an explanation of one methodology of how to monetize adult website SEO traffic for romance scams alleging that Reddit is a good place to start your scam:  

Romance scams are commonly discussed on popular hacking forums like XSS, BreachForums, and Exploit. An  XSS post, from January 8, 2025, posted in both Russian and English displays a user looking to collaborate with other cyber criminals who are experienced with Romance Scams, stating “I am currently seeking reliable and experienced individuals who are actively working in this field [romance scams]. I have access to several clients and opportunities that could be mutually beneficial for collaboration.”: 

A user on the popular hacking forum, CryptBB, alleged an effective way to become a fraudsters is pig butchering scams because it involves methods like crypto swifting. Crypto-swifting generally refers to the use of cryptocurrencies for cross-border money transfers, inspired by the SWIFT (Society for Worldwide Interbank Financial Telecommunication) system, which is widely used by traditional banks to send secure international financial transactions. The idea is to use cryptocurrencies and blockchain to enable real-time, low-cost, and secure global transactions without relying on central banks or legacy systems. 

Romance Scams are often advertised as one of several fraud services by cybercriminals on Telegram channels. The following screenshot was taken from a popular Telegram Fraud Marketplace.

Another example that highlights romance scams services came from a credit card fraud Telegram market. This user also advertised various services, including PII associated with various dating sites that social engineers can leverage for Romance Scams: 

According to a recent University of Cambridge study, “eWhoring is the term used by offenders to refer to a social engineering technique where they imitate partners in virtual sexual encounters, asking victims for money in exchange for pictures, videos or even sexual-related conversations (also known as sexting). Packs of multiple images and videos of the people being imitated are traded on underground forums. This material is used as the bait to entice victims into paying for online encounters. Underground forums serve as a place for the interchange of knowledge and new techniques to improve the benefits obtained from this illicit business” 

Cyber criminals take great pride in proving themselves by sharing their knowledge, tips and tricks with others to build up their reputation and standing out within the threat actor community. DarkOwl analysts observed many sharing, some for free and some for sale, guides and ebooks covering how to get involved in e-whoring and romance scams. 

DarkOwl analyst discovered recent comments on a post on the popular hacking forum, BreachForums, where a user advertised a large e-whore database allegedly containing over 637 GB. 

E-whoring packs are also commonly sold across darknet markets, forums, and cybercrime related Telegram channels and Discord servers. The following post from the notable carding fraud forum, Craxpro, advertised a leaked database for an OnlyFans model:  

E-whoring packs and databases are the most common, however, we also discovered an e-whoring bot being sold on Craxpro for 10,000 USD per month: 

We also identified Telegram users selling access to e-whoring mentorship services. The below user advertised e-whoring mentorship service for 350 USD and accepts LTC, BTC, ETH, PPl, and Wise. 

Romance scams, how they identify their targets, and e-whoring a will remain popular topics across the darknet as long as this form of fraud remains profitable, effective, and efficient form. One of the examples claimed that romance scams are the gateway to becoming an experienced fraudster that dabbles in its various forms. We also observed a large supply of users selling this fraud knowledge and a large demand of eager “newb” fraudsters willing to pay for this knowledge.  

Darknet actors will continue to innovate as long as it remains profitable. As with conducting any activity on the internet, it is always important to remain vigilant to scams, whether that be romance scams or not.  

DarkOwl wanted to share a few steps recommended by the FBI in order to protect yourself again romance scams. 

Protect Yourself  

  • Be careful what you post and make public online. Scammers can use details shared on social media and dating sites to better understand and target you. 
  • Research the person’s photo and profile using online searches to see if the image, name, or details have been used elsewhere. 
  • Go slowly and ask lots of questions. 
  • Beware if the individual seems too perfect or quickly asks you to leave a dating service or social media site to communicate directly. 
  • Beware if the individual attempts to isolate you from friends and family or requests inappropriate photos or financial information that could later be used to extort you. 
  • Beware if the individual promises to meet in person but then always comes up with an excuse because he or she can’t. If you haven’t met the person after a few months, for whatever reason, you have good reason to be suspicious. 
  • Never send money to anyone you have only communicated with online or by phone. 

We wish all our readers a very happy and safe Valentine’s Day! 


Don’t miss anything from the DarkOwl analyst team! Subscribe to email.

[Webinar Transcription] Expose & Enrich Intelligence Related to Front Companies and their Influence Operators

February 13, 2025

Or, watch on YouTube

In this webinar, analysts demonstrated how to investigate and pivot on front company infrastructure, using Falkor and DarkOwl dark web data, to analyze and enumerate possible front companies and their employees.

Highlights:

  • Adversaries of the West are using front companies to obfuscate/hide their malign activities against the West
  • Sanctions and notable indictments from recent months
  • Enriching information using both Falkor and DarkOwl platforms
  • Investigating personnel, infrastructure, and other evidence linked to front companies

NOTE: Some content has been edited for length and clarity.


Ari: It’s a pleasure to be here with you. My name is Ari. I am an OSINT analyst here at Falkor responsible for integrating various tools like DarkOwl into Falkor, also general sales engineering, training, handling, any sort of client affairs that come up. You also may know me due to my blog, memeticwarfare, where I write about influence operations and investigating them, and a number of other ventures that I happen to be involved in. I’m very happy to be here with you today alongside with Steph, and we’ll let her introduce herself shortly as we show how you can utilize dark web and deep web data from DarkOwl in Falkor to investigate, in my opinion, very interesting Russian influence activity globally to uncover new front organizations from a few data points.

Steph, you wanna introduce yourself?

Steph: Absolutely, yeah. I second that this is going to be really interesting. I’m so excited to dive into it. So, hey everyone, I’m Steph Shample. I work here at DarkOwl. I used DarkOwl’s data before I became an employee, so I’ve got tool perspectives, very similar to Ari. I think once you’re an analyst, you just can’t get out of being pulled into everything. So, I also help with client training, use cases for how you might employ DarkOwl intelligence in your other day-to-day operations or your separate intelligence operations. And we’re going to get more into our company specifics as well. So, Ari, back to you.

Ari: So, Falkor is an interesting product. In my opinion, it’s kind of leading the next generation of what analysts are going to be using going forward. It’s an API forward analyst operating system, where in addition to carrying out all of your link analysis data visualization, querying of various tools or so on, you can connect all of your internal data sets, be they files, databases, any other REST APIs you happen t have, all into one place. And then, of course, to use OSINT sources like DarkOwl or whatever else you happen to have into Falkor to utilize all of it simultaneously and seamlessly.

There’s also, of course, a full collaboration suite, task management, management, case management, all those additional add-ons that you need to run a case effectively. We have built in AI capabilities, including an analyst investigative chatbot, digital profiling, real-time monitoring, and much, much more in what I may say is probably the most aesthetically pleasing dark mode first, analyst platform out there, which anybody here who works in this space knows just how important that is. I’ll let Steph introduce DarkOwl.

Steph: Yeah, thanks. I’ll take it for DarkOwl. So, we’ve been around for about 12 or 13 years, DarkOwl. We are the world’s leading provider in Darkint intelligence. We cover, of course, the dark and deep web. We also cover what we consider dark web adjacent platforms that is places like Telegram channels, Discord servers, and, of course, IRC chat. We consider them dark web adjacent because you’re gonna see now, especially since Telegram has entered the fold and become more popular in GEO political events, influence operations, and cybersecurity. It’s also cross-referencing, and actors are using both their onion platforms, their markets, their forums, to advertise on Telegram and vice versa, thus maximizing the potential for financial return or notoriety in their operations.

So, the image that’s on your screen here is of course we covered Tor, that’s the browser that you would download and use to access the dark web. We also have I2P and ZeroNet. We are definitely on discussion boards as more people share tactics techniques and procedures or TTPs, underground criminal forms and markets have touched on pretty self-explanatory. And then of course those chat platforms that I’ve referenced how they go back and forth.

Ari, real quick. Do you want me to go into the dark web and how it works now? Or do you want to save that?

Ari: No, absolutely. Absolutely. Let’s lay the foundation for sure.

Steph: Let’s lay it. I like it. So, Ari and I did want to be very clear, you know, for those who aren’t in this space, what is the dark web? What is the deep web? Everyone’s got their own definition. You’ll see all kinds of chatter and people contributing to that conversation. But let’s just keep it very simple. So, the surface web, you download a browser, right? Your choice, Chrome, Firefox, Brave, whatever that is. Very easy. Everything that you’re accessing, if you’re searching on there for recipes or how to, you know, sew or whatever that looks like, it’s attributable. You can find that information, several clicks, couple buttons, you’re good to go. It’s attributable, right? Every IP address and every website is mapped. They relate to one another. All activity is generally able to be observed. Where is this website hosted? Is it a Google domain, an Amazon domain or something else?

Whereas the dark web is meant and was built to be obfuscated. It is built to be more anonymous. It has more privacy features. So, you need special equipment to download it. When you access a .onion URL, you cannot put that .onion URL into, say, a Google or any kind of other browser. You’ve got to put it in Tor or there are a couple of other browsers. Some people work with tails as well. It is not indexed, so you really can’t search a lot on the dark web for recipes or any kind of thing. You have to know what you’re looking for and where that type of material is hosted. So, if you need something, say, if you had a ransomware incident, if you’re in this space, you’ve got to know how to access the ransomware blogs where they host them. If there’s an initial access broker that’s selling access to your company on the dark web, you’ve got to know maybe their name, how to get ahold of them, what market or forum they operate on. And again, it’s built for privacy, right? It is not going to easily give up information such as locations, IP addresses in Tor, you have three of them, you have a beginning IP address, a middle and an end, they change every approximately 10 minutes. It’s meant to be obfuscated. It is designed to be anonymous. So that’s our high level. What is the dark web? How do we access it? What are we doing? We welcome further questions on that if you’d like to put it in the chat or contact either one of us. No problem.

All right, Ari I’ll kick it back to you unless you have a question.

Ari: No, no, there’s just so much more to go with this stuff. I just say, again, everyone wants to know about how dark web URL resolution works, let us know later. But yeah, but alongside the dark web data, I think the most important thing that we’re going to bring up is the use of that in the conjunction with deep web data, Telegram in particular, but also other sources as well as they come up, right? And that’s, I think in my opinion, the real added value of what tools like dark, DarkOwl and other tools that provide similar data sources do that you can really have essentially all three layers in one setup.

So, with no further ado, let’s discuss the case that we’re going to be looking at today. The case that we’re going to be looking at today is the Center for Geopolitical Expertise. Now, you may have heard of this. They were sanctioned, I believe, about two months ago, maybe a bit less by the US Treasury Department. Here’s the statement. If you want, you can see that over here.

And we have the Moscow-based CGE, or Center for Geopolitical Expertise, founded by the OVAC -designated Alexander Dugan, and we’ll discuss briefly perhaps later on. And then, of course, the main person running a whole operation, Valery Mikhaylovich Korovin, and other relevant CGE personnel. So, we’re going to see how we can essentially investigate this organization, the CGE, by the way, as a side note, Russian front organizations love utilizing terms like geopolitical, whatever, and expertise and that sort of stuff, just a cultural thing that happened to really enjoy doing, and you’ll see that repeat itself in this space quite a bit. To see what we can essentially find out on this given organization, utilizing deep and dark web data, and then how we can expand upon that to find other signs of new front organizations and just better understand their general activity. So, we’ll cover not only dark web data, but also some investigative tips that you can utilize when investigating front activity on your own, and then we’ll conclude with a Q&A.

So, the most recent case that we have of the CGE was apparently, or they’re alleged I should say, and though it’s becoming increasingly well-founded in terms of the research, right? Was there organized election interference inside of the ongoing election interference, I would say, inside of the current German elections? They’ve also been quite active in Ukraine. They’ve ran probably the single most successful operation inside of the US called CopyCop, that was published on by Recorded Future. Great report, highly recommend, that you read it. And they utilize locals and other individuals to set up these AI -generated domains, targeting whether election or given country they happen to be targeting.

Here we have an example from News Guard over here of a various number of German language domains used to target Germans.

Now there hasn’t been much coverage of Corovan individually beyond the Gnida project. By the way, a great substack that I recommend that you follow. If you’re interested in tracking Russian influence operations internationally, they do a lot of great stuff. They’ve been the only ones to publish anything in depth on Korovin individually. There have been a few mentions here and there, but nothing really in depth. So, let’s see what else we can find on them. There we go. So, just to recap where we are so far and how we’re going to start our investigation, which by the way, I find to be often one of the most difficult places for analysts, especially new analysts, you know, to have it right when they get going, is where to even begin with looking into such sprawling types of activity.

We have the sanctions announced on this given group, and there have been past reporting on them from other individuals also as well. And we have the number one person of interest of POI, Valerie Korovin, and of course information on him published by the U.S. Department of Treasury, including the Russian tax ID over here, which is like their social security number, date of birth, general area, and of course, the registration information of the CGE also as well. I built a very humble little graph over here in Falkor’s link analysis, showing you essentially how these things work, how Korovin over here is essentially an agent of the GRU, right, he’s their liaison for the actual activity that the GRU, which is Russian military intelligence wants to carry out internationally. We have the awards for justice from the US government announcement over here, his affiliation with American John Mark Dougan, another activity, the Eurasia Organization, and other key individuals that we’ll get into in a little bit.

Just a quick word about Dougan if you haven’t heard of him. Dougan is the founder of the CGE and is a fascinating figure who we can dedicate multiple awareness to just for himself. But in short, he is a Russian far-right political polemicist with a very unique political philosophy and how the world works and how things should be, at the very least, founded on multi-polarism, meaning the world not being unipolar centered around the United States, and essentially Russian borderline fascism, if not fascism itself in many ways. So he’s a sanctioned individual known for his very, very, very extreme views. Now, thanks to Gnita, we also know about Natalia Makeeva, who is the senior official at the CGE and is the right hand of Korovin, but we can also find out more about her independently as part of our investigation. We don’t need a project just for that. So now we’re going to see how we can take these individuals and the basic data points that we have here, identify entities for investigation, further identify new relevant entities, and then keep going. Now one thing I do want to bring up and Steph do you want to enrich further astound upon this is the Russian dark will be some ecosystem in general, which is incredibly rich. So, if you have any words you want to add to that, I think that’d helpful.

Steph: I’m fully in agreement with you, you know, the Russians are, of course, not the only actors, APT or cybercrime focused on the dark web. But I would say they are the most frequent. They know what they’re doing. They’ve been using the dark web in their operations probably longer than any of our other adversaries. You will see Iran, China, Belarus and pick a country if their actors are on the dark web, you know, they are using it, but Russia is the most frequent and uses it in a variety, right? From ransomware to cyber-crime, to info ops, to all kinds of influence operations, Russians are all over the dark web. We have learned the most from them. Ari, so that’s a great point.

Ari: Absolutely, and the most important point for us is that that cuts both ways, right? So there are tons of data leaks on Russia, tons. I mean, perhaps the single mostly country I’ve ever seen articulately, in terms of sheer number of leaks and data available, and that’s how we’re going to utilize this information to keep investigating. So Just from doing a name search on Korovin and Falkor with this full name, which would give them the sanctions, we get a large number of interconnected results over here. And by the way, as an aside, if you’re interested in seeing the full investigation with other information from DarkOwl and Falkor, feel free to contact us separately. We’d be happy to schedule a demo to show you more of the in-depth information on this individual case.

Just from looking up his name, we find all these various interconnected data points. We find from leaks of data available on the dark web, a Facebook profile with a UID, a leaked telegram account, leaked Gmail entities appearing in a dark web post over here, and multiple other entities belonging to this individual.

Now, I see we’re getting questions in the chat, so I’m not going to refer to that now, but we’ll save that for the end. But if you do have any questions, feel free to send.

So, one thing I do want to bring up also is that one of the results that we get here is that Korovin has an additional email at the Eurasian organization, which we mentioned over here, which is another organization tied to Dougan. Okay, so that also came up in the results. Now if we look up the Eurasia.org organization, which is by the way another Russian instrument of influence headed by Dougan and active globally, looking at who is records, here we have from WhoXY, which is a great free tool, which is a side note by the way, highly recommend it, if you need a free tool for that, or of course the full suite of domain intelligence available in Falkor. We can see that in fact the person who registered Eurasia.org was Makeeva@Eurasia .org, Natalia Makeeva, the woman mentioned earlier, and she also registered the CGE domain over here as we can see as well. So, she’s a pretty central individual then having registered the domain for CGE. And then we can also see over here a very broad overview of the leak data available from the deep web on the actual Eurasia domain. So going back to that, just by querying essentially the domain itself in Falkor, we also have the Korovin’s individual email address over here. But here we have the full swath of results. I’m sorry, I try to fit a lot in on this slide.

I know we only have so much real estate over here. But you can see the sheer wealth of data that we have on the actual domain, which is somewhere over here in the middle, right, including the large number of actual individual posts in which the domain is mentioned, but also more interestingly, perhaps a leak total of 360 email addresses in leaked records originating from the domain.  Of which, we have 28 unique ones. So, Steph, I know if you have anything you want to add to that on the dark web, on DarkOwl’s data enrichment features over here in terms of profiling.

Steph: Absolutely, we are a niche DarkOwl intelligence, but one of the tools that we have to get extremely granular is this bottom right image that Ari has been highlighting. So, when Ari and I were going back and forth saying, you know, what can we do? We want to talk about front companies, but it’s intimidating, it’s overwhelming to get started. There’s a lot to follow, there’s a lot of threads to pull, there’s a lot of misdirection that can happen. But when Ari gave the domains of some of the proven front companies, and we definitely source those from indictments and treasury, as we’ve mentioned, you can put any top-level domain into our tool, and of course in Falkor now that’s also using it, and get a pullback of, okay, here are the amounts of emails exposed, that’s that 360 numbers. There are 28 unique ones, because of course there’s going to be repeat breaches, accounts in certain pieces of information with the same password or exposed in the same place. So, it’s just really important to help flesh out your top level domain research, get the patterns. You know, what password does this individual use? Is it constantly exposed on the clear web, on social media, on the dark web? So it’s a really cool feature to kind of build this out and we use it heavily in our investigation.

Ari: Absolutely, then you can get it all visualized for you nicely inside of Falkor, giving you the clustering over here of what’s actually important. You can filter, of course, by degrees and so on and move on from there. But the point that you think you’re going to remember is that every one of these data points is essentially another pivot point that we can use as part of our investigation. So as we can see that certain clusters of activity here are more central, right, or more active in terms of relations to other entities, we can then take Falkor’s, say integrations with email and phone number lookup tools or people investigation tools, or social media enrichment, and then enrich those further to further investigate the in domain. Now the next thing to keep in mind, and this is especially relevant when investigating organizations of any kind, be they companies or front companies or whatever it happens to be, the leaks don’t lie at the end of the day, right?

Firstly, having no leaks is suspicious because almost every organization has an employee who utilizes some given company data point to register for some service. It’s rare to not have that happen at all. And then when they inevitably do, as we can see here, we can see who’s more active with their company email or other company assets online to find other relevant data points really easily. We have here, we have a number of individuals, including Makeeva, who was the single most popular leaker in terms of using her email address, which also hints to us that she’s probably a pretty active individual in the given organization. So, we can use DarkOwl data for investigations, right, for pivoting, but we can also utilize it to qualitatively understand and analyze what actually occurs with this given organization.

So, we can see here that Korovin’s email address appears in a dark web post taken from an onion site that we can see over here as well, which was actually a leaked copy of the internal information policy of the Lugansk People’s Republic. So, you know, occasionally you’ll see there’s some news article about a list of leaked data, you know, exposes this or leaked, you know, government reports say that, et cetera. One of the places you can easily find that data is in fact on DarkOwl because as Steph would say, you guys are constantly indexing all of the available posted and leaked data online. And here we can see, in fact, that Korovin and Eurasia are mentioned as key bodies for promoting Russian interests in the Lugansk People’s Republic, which is one of the breakaway regions of Eastern Ukraine, currently being fought over in the war. So, it has an official role in, say, promoting Russian interests there also as well, which was not publicly available data previously. Now, we can also then look at Korovin’s Twitter account, which is easily found publicly, but also easily found via breach web data. And then inside of Falkor’s social media enrichment, we can bring back followers posts and more. So, we can see that his followers globally, of course, make sense roughly what we would expect, mostly in Europe and Eastern Europe and, of course, Western Russia, some in the Middle East and other parts of Asia, Latin America, Africa, and the US a little bit. And we can use all these also for further investigation, especially when it comes to finding new organizations globally that might be following him that could be potentially related. And then we can also utilize the Falkor link analysis to better understand clusters. We have Korovin over here; that’s the original account over here. Then here we have one other account that he shares a large number of shared followers with.

And this is of course, who else but Natalia Makeeva. So even without the needed project telling us earlier that she’s a key individual and providing the receipts as we say, which we’ll see shortly, we can also find out, of course, also ourselves utilizing open source investigation. Now, if we begin to look her up by looking up her email address also in DarkOwl, we get another kind of dark web data that we can utilize quite effectively, which are actually leaked emails from between Makeeva and an individual affiliated with the pro-Russia and Novorossiya movement based also in, of course, Donbass, the eastern part of Ukraine that’s being fought over in the war. We can see here in these individual emails which I translated into English, they were of course sent originally in Russian, that they were coordinating sending over propaganda material from Dugan, of course, into that area. Now, one of the other things that DarkOwl does that Steph might want to explain briefly is tokenizing entities, and then I’ll describe how we do that in Falkor.

Steph: Absolutely. You can see in the bottom left image; we have that highlight once Ari shared the names of the individuals that we wanted to focus on for this investigation. I just ran that through our tool, and we highlight our results. We want to make it easier for our analysts, make it visually appealing. So Makeeva, we see her domain confirmed, she’s sending emails back and forth, so there’s a couple of things. We’re going to pull out that email address so that you can further pivot on that, build off of it, find passwords, find anything that you might want to find. We got very lucky in this instance that we had contacts for these emails. So then you can also, when need be, pivot to Gubarev at NovoRussia, you can take a look at NovoRussia’s top level domain, what’s exposed, what’s out there. You can try and see if that resolves to any IP address based on what, you know, Russia, how they’re setting up their operations. So, you have a whole bunch of different pivots and different pieces of analysis to add to just Natalia Makeeva and her email address, we built out a whole other graph that is evidenced in Ari’s image on the bottom, phone numbers, contacts, patterns of life, patterns of contact, and other people she’s working with. So yes, we pull that all out in DarkOwl for pivots.

Ari: Exactly. And then we can just easily right-click on that document in Falkor to extract those tokens as entities into entities for further investigation automatically. So, if you have this email address, instead of needing to copy and paste each individual email address or phone number or username or whatever happens to be, you just right click, you have it, and then you can right click and further enrich and investigate effectively. So just to recap where we are so far, we had the original CGE organization. By looking into it, we found the Eurasia group organization also unsurprisingly affiliated with this group. And now we see pretty close ties between the leader of the Nova Rocio community over here and of course, Nathalia Makeeva, indicating there might be other ties as well that we could investigate. Beyond the original organization, there’s also evidence from, of course, Gnida as well, that Korovin and Makeeva, who we can see here, this is Korovin, and this is Italian Makeeva, are active globally beyond Eastern Europe and Russia, involved in setting up the Fundación Fidel Castro para Desarrollo de las Aracenas Frusal Cubanas, the Fidel Castro Foundation for Promoting Russian-Cuban Relations, which they utilize essentially to promote Russian interests in Latin America and the Spanish-speaking world. And here we can then utilize Telegram. So, Steph, I’ll let you then describe perhaps how DarkOwl handles Telegram and Discord and other deep web sources before I describe what we’re seeing here.

Steph: Of course, no problem. So, once again, we kind of went on the name of Valery Korovin I wanted to do a search. We know that Russia is also avid users of Telegram. We saw that activity really increase where they were sharing battle plans, pictures, strategy on Telegram after Russia invaded Ukraine. But we also saw that pop up when the Afghan government fell in 2021 in the summer. So just to let you know that Telegram is all over. We pull everything down from a Telegram channel. So, we’re going to get the metadata, we’re going to get the channel ID, because this, you know, for right now, the title of this is called Amigos de Evesiones Fides. Tomorrow, that could be literally anything else. But if you have the Telegram number, the actual channel number, you can continuously track that no matter how many name changes there are. The same is true for those usernames. So, we pull that all down. We have the metadata for your investigation to share with your clients if you’re sharing intel with someone else. And then, of course, after we have Valery Korovin one name, now we have a whole spate of other identifiers that we can pivot on. So, we’ve got a Facebook group for this group as well as Twitter. We’ve got, of course, their Telegram. We’ve got a Yahoo address. So, it’s just a lot more information that we added. And it’s the same for Discord. We pull down server IDs, we make sure that we have the information that’s never going to change, even if a user handle or the title of a server or room does change.

Ari: Absolutely. And then we can start the actual hard work of investigating, right? At the end of the day, there are very few shortcuts in life. We’ve been lucky so far with these lead emails and other things that we come across. But sometimes you gotta, you know, put the elbow grease in there and really just look at all these various entities that come through and you can do that easily in Falkor by enriching them to bring back information on the domains, on the social media profiles and more to see if they are in fact front organizations or have any other types of relations to the actual individual that you’re looking at or not. We have other sources across Telegram also as well from parts of Latin America and even Italy and other global organizations that are promoting Thurovan and these front organizations that we can then look into further also. Now we’re going to conclude the investigative portion of this with one final tip that I would like to bring up. Gnida project brought this up also as well, but anybody could figure this out, that the Fidel Castro Foundation is registered at the same physical address as a few other interesting groups. Firstly, we have the Russian House of International and Scientific and Technical Cooperation. I haven’t looked into it myself yet, but who knows? It wouldn’t be the first time they’ve utilized scientific cooperation as a front for other sorts of activity. Eurasia itself is also based in that same building over here. The Russian influence outlet Geopolitika RU, which is very well known for anybody active in the space, you should recognize that immediately, is also of course registered and based out of the same, comparatively small building in Moscow, you can look it up in Google Maps, it’s not very big. Doesn’t make sense that it’d be hosting so many large organizations. And the lesson to keep in mind here, even though the CGE is registered by the way in a different address, is that threat actors always reuse for a variety of reasons right sometimes they don’t you know can’t afford to rent to different places they want to rent they want to buy domains they want to get new office space where it happens to be but they don’t and they did utilize the same thing over and over again. So, whether or not it’s digital or physical infrastructure if it’s being reused you can use that very effectively to find potential signs of a given organization being a front or otherwise uncover hidden ties right.

Now you have to be careful about that about that also as well of course if it’s a large office building it could be feasible, they’re all based in the same building as well, right? But if you can check it out on Google Maps quite easily, see whether or not it makes sense that you have multiple large organizations in a given, you know, three-story building, right, let’s say, and then from there make your own decisions. And then we’ll conclude also over here with the Falkor geo search, which has the ability to search this area for social media data, other data points also as well, and even connect other tools also to search if you have other geo -relevant data points too. So, on that note, let’s conclude, and I’ll let Steph also, if you have anything you want to add, let me know too, feel free to barge in here. dark web data is critical for investigation of all times, of all kinds, right? Beyond just looking up leaked data, leaked creds, threat actor chat, and that sort of thing, we can utilize it for things like profiling, finding leaked geopolitical data of any sort of interest, right? Government data, that sort of thing, and we can utilize that leaked data to expose ties to additional organizations very easily. This is often like the shortcut that I mentioned that we don’t often have earlier essentially, right? The leak data giving you that actual connecting point is what you can often utilize effectively. But there are other data points that we can utilize also, as well that we can find, right? Shared physical addresses, reutilizing digital infrastructure and more are critical. And deep web data really can’t, in my opinion shouldn’t be ignored for investigations of any kind, let alone influence investigations operations as well as looking into front groups. And we can utilize them to find with the low amount of investment, let’s say, or time invested in this, international activity very, very easily. So, Steph, if you want to add to that, let me know.

And if not, we think we can move them to Q &A.

Steph: Love to, just to repeat, front organizations are tricky. They’re a little difficult to follow to get started to know where to work with. But look, Ari and I started with one organization, one top level domain, two human beings. We then got their selectors on social media, on the dark web. We found two other organizations, we had a global investigation, but we had to pivot, we had to turn around, we hit some dead ends. When we were first talking about this webinar, we were gonna maybe focus on Iran or a different kind, but Ari did an excellent job of saying, no, let’s do this, this is good, and then really made something that’s intimidating and a little difficult and complicated, simple, seamless, and you can see all the information we ended up with after starting with just three entities, an organization and two humans. So, Ari hats off to you. Thank you for demonstrating how we can use deep web and telegram and Discord data. It’s absolutely amazing. And I look forward to reading what you do in the future, because it’s awesome.

Ari: Thanks. And there’s a lot more, by the way. So, if anyone wants to see more, feel free to contact us separately, like I said. All right, the final step that I would do here for a Falkor plug before we go under the Q&A is the monitoring dashboard. And this is also, of course, relevant for DarkOwl as well. Falkor is a full monitoring suite available so you can set up dark web data over here to be monitored right set up your keywords your Boolean queries and strings whatever you happen to have you can set those up over here I set one up for mentions of Eurasian.org and other mentions as well and then you’re going to get a live feed of new onion data discord data telegram data and more coming in relevant for that sort of data also here as well we also of course have a full alert mechanism set up through some of the keywords or things you want to be triggering rules for and that sort of thing, we can do that. And we also of course support social media. So, if you want to say follow Korovin’s Twitter account or follow any other individuals’ Twitter account for your investigations, you can do that also as well. And lastly, we also support RSS feeds. So, if you want to say track the OPAC RSS feed or any other RSS feed that you happen to have, no problem, you can throw it all in here and track all of those things in one pane of glass.

Steph: Super, super kudos to Falkor. There are so many tools out there and everything is very disparate, right? We’ve got RSS feeds and Slack and all of this, but what you guys have is a dashboard where you can truly have everything in one place, and that’s essential as an analyst. We’ve got enough information to deal with, so it’s an amazing, amazing product.

Ari: I’ll send that over to the development team. We’re very happy to hear that. I think we have some time then for Q&A.

Kathy: Yes, we do, and we’ve had some questions come in. The first one is in reference to Telegram, have we got any possibilities to follow a target if a Telegram account is closed and not open?

Steph: Yeah, we absolutely do. So, you know, you can build infrastructure to try and ask for permission to enter. You can run different personas or try to get people that work in your organization into a closed or private Telegram. There are a lot of different ways to do that. Strike up a common conversation, strike up investigations, and just kind of see how you can break that door down based on observing other activities surrounding it and knowing what the types of discussion are that’s happening inside those telegram channels. It’s not a perfect science, you might get denied, but you can get into closed ones if you play your cards right. Yes. Or anything to add to that on your end?

Ari: No, I mean, that’s that, listen, that’s, you know, like I said, sometimes there aren’t any shortcuts and you gotta just, you know, Do the cold approach and hope it works out, right?

Kathy: Okay, well, staying on the topic of Telegram, when considering Telegram provides encryption and privacy features, why do threat actors still choose to communicate there instead of using more anonymous platforms like I2P , TOX, or peer-to-peer encrypted channels?

Steph: Yeah, absolutely. So, we see actors talk, I mean, I’ve been all over the web, right? I’ve been in this game for a lot of years. I’m very old and I’ve seen a lot of trends. So actors are openly stating that Telegram is safer. It is a Russia-based tool, right? It was developed by a Russian. And so, they feel that in lieu of the dark web where they have openly identified, they feel that federal agents and law enforcement’s working to try to take down criminal operations, criminal infrastructure, actors still feel that the majority of the safest tools are things like Telegram and TOX. They are definitely active on TOX. They have moved away as ransomware groups fall, as markets are shut down, think Silk Road, think Alphabet. As all of those go away, they move to what they feel is safer. I do think that probably in the next two to four years here, we’re gonna see a migration away from Telegram because you know how that goes. Once things get very popular and are used frequently, pivots for investigations change, They probably will feel that law enforcement will move there, but we see that all the time first, you know, with cryptocurrency, for instance, Bitcoin was viewed as very safe. Now they’re saying Bitcoin is a tool of the United States, you know, intelligence agencies and federal investigations is their words and chats. So, they’re moving to Zcash, Litecoin, etc, etc. They openly espouse what they feel is safe versus what isn’t. And it’s our job as investigators to follow that. So that’s probably why, that’s definitely why they’re saying what they’re saying.

Ari: I have some points that I’d like to add to that. So, there are a few things to keep in mind because the much vaunted, let’s say, encryption of Telegram really isn’t quite as good or as quality as people say. We can get into it; it’s a whole separate thing. It’s not intent encrypted by default, which is what really matters for the average user. The reason people use it, in my opinion, is that it’s a really effective town square. You wanna sell your cyber crime services online or make sure your leaks get, you know, spread and amplified and that sort of thing. It’s an amazing place to be active and the barrier to entry is super low. You don’t need a computer. If you are a thought actor within a country that doesn’t have, you know, that in which GDP is low and you want to start scamming, you don’t have a hundred bucks in your pocket, you can do that, for example, right? It’s instead of buying a computer and download Tor and have a reliable, indirect connection and do that sort of thing. Telegram is much more accessible. You can buy a burner phone, remove the camera, microphone yourself if you’re that concerned and kind of get to work. And then like you said, also step regarding TOX, move to TOX, move to any sort of end-to-end encrypted solution that’s a bit more secure for actual communications, which is a very common trend also as well. So, there’s this town square market element of it that I think is incredibly appealing. And then it also has other features that make it appealing to threat actors as well. In fact, that it’s easy to use. In fact, there’s other content on there that’s also interesting. The built -in messaging experience is really seamless. There’s a lot of other reasons to use it also as well. And I think it’sa fascinating platform, but those who know me know I also have been a bias.

Steph: Great points.

Kathy: Great. Thank you. We’ve had another question about leaks in the darknet are not too old to use with efficiency?

Steph: Absolutely not. So human beings are creatures of pattern. They reuse passwords. They reuse their data. They can’t keep track of it. We do not have enough people. Think of your coworkers. Think of maybe older family members or something, they’re not using password keepers, like 1password, key password, et cetera, et cetera. They reuse something because it’s easy. So, if something is exposed and always out there, it’s very easy to keep reusing. We have had actors who have not changed their passwords since 2010, 2011. Not all of them. Some of them do have better opsec and cybersecurity, but it’s very, very simple to glom onto one password or one account or a handle or a username that an actor uses and then keeps going with minimal changes throughout the years. It’s foolish, but they do it. So no, data that’s old is not too old to use no matter where it’s from. There’s always a potential. Anything on your end for that, Ari?

Ari: No, that’s a great explanation. I mean, it depends also on your usage, right? I mean, if you’re just trying to protect, you know, if you want like those, you have some of the lead employee password from nine years ago, it’s probably not as bad as, say, something from last year. But, you know, for investigation purposes, It’s still quite as useful for pivoting. I don’t know that in terms of other stuff. So, it depends on what you’re doing, but yeah, I completely agree with you.

Kathy: We have one more question that came in. How else can dark and deep web data be used for investigations or attribution of influence operations?

Ari: And this is, I think, a really interesting topic because people love to talk about attributing influence cyber operations online effectively and the leaked data is one of the most effective ways to do so, like by far. Looking at past Twitter scrapes and Facebook leaks and that sort of thing, people manipulate the APIs, these platforms, and then post all this account information online. There have been cases where known influence operation accounts and entities have had their personal information exposed, be that say the registration IP or their last used IP or their password or that sort of thing, that you can utilize to very effectively either further investigate or even kind of on the spot, determine whether or not it’s an authentic account or not. So that’s one of the biggest things that I’d say that we see. And there have also been multiple cases of influence operators themselves experiencing leaks, right? So recently the SDA, the company behind doppelganger had a lot of data leaked on them, hasn’t really made it much onto the dark web for a variety of reasons, right? But essentially the data is still leaked and available to certain other individuals. And that’s another way that we can expose other actual operators themselves as we saw in this investigation. So, the leak data is in many cases the only way to investigate and attribute these activity, not a nice to have. Is that anything you want to add to that?

Steph: Yeah, and as far as just other data on the dark web, people, criminals, actors, they do feel that the dark web with its flaws and its security issues is still one of the safest places online. So, they’re still very open, they’re still very transparent. They might be cautious at first, but as they carry on more operations and build bigger networks and build a name for themselves, selling data, infiltrating companies, getting infrastructure, they open up more, right? The dark web is full mostly of criminals. They have an ego. They want to talk about who they got into. They want to build themselves up. And so, every piece of information, despite what you’re looking for, what you might be working, ransomware, info ops, DDoS planning, you know, anything. There’s always a piece of intel on there. It’s just that you have to look harder to find it. But as Ari and I have mentioned, schedule a demo with us. We’d like to take you deep. We also want to show you how you can enrich open source OSIN or social media information with dark web intelligence. It works really well to enrich too. So, there’s a bunch of different lines of investigation and tactics and we’d love to go deeper with you on that.

Kathy: Great. We do have a couple of minutes, and we had one more question come in. In other countries, considering that credit card details are frequently leaked on the darknet – does DarkOwl provide access to full credit card data to licensed companies or is the data redacted for compliance and ethical reasons? Additionally, how does DarkOwl ensure that security teams using its platform do not misuse such sensitive financial information?

Steph: Let me answer that in two parts. So, we do indeed have full credit card details. Listen, at DarkOwl we are GDPR compliant, we are DOJ compliant, we do not purchase stolen data. That data is out there openly available, whether it’s a forum where it’s sold or whether it’s a pay site where it’s hosted. It is open information that anybody who downloads the tools and knows how to access can. So, we do have that. As far as part two, we indeed have checks and balances. My CTO is always eager to jump on the phone and explain. I’m not going to get into those checks and balances here. Please do schedule a call for us, but we absolutely ensure that there is no misuse of sensitive information, whether that’s financial, PII, PHI, HIP, or protected. We absolutely have that a way to get around that, and I invite you to please get with us and we will explain that further in depth on the call, for sure.

Ari: The one thing I would add, the one thing I would add on top of that is in fact where there’s a full auditing capability, right? So, inside of the actual system admin users can go and audit all the actions taken by other users in the system to see that they’re utilizing all the data and sources they have appropriately and ethically.


Interested in chatting? Contact Us.

Clean Out Your Computer Day: Time to Declutter

February 10, 2025

Today, the tech community once again observes “Clean Out Your Computer Day” — a day dedicated to digital decluttering and system optimization. As we continue to rely heavily on our devices for work, personal life, and everything in between, maintaining a clean and efficient computer is more important than ever.

In 2025, DarkOwl would like to take you on a deeper dive into the practices and technical steps you can take to celebrate this day, ensuring your computer runs at peak performance. While the idea of “cleaning” often conjures up thoughts of brooms and maybe physical rooms, a digital cleanup requires a different approach, one that targets both visible and equally important, hidden clutter, within your system.

Just like anything else you use in your day-to-day life, your computer requires regular attention and maintenance. Files pile up, software accumulates over time, and old data can slow down system performance. Even the simple habit of leaving multiple browser tabs open can add to the clutter, slowing things down and overwhelming your workspace. If left unchecked, these minor inconveniences can develop into significant issues, such as sluggish processing speeds, storage shortages, and even security vulnerabilities.

The key to a smoother computing experience lies in routine maintenance. To celebrate Clean Out Your Computer Day, we’re providing a roadmap to help you get started with the necessary steps for a comprehensive digital clean-up.

One of the most straightforward yet often overlooked tasks is deleting unnecessary files. Over time, documents, images, videos, and other data accumulate on your computer. While most of us are guilty of holding onto files “just in case,” these unused files take up valuable storage space and may even hinder system performance.

To address this, focus on:

  • Temporary files: These are left behind by programs and browsers. They serve a brief purpose but rarely get deleted on their own.
  • Old documents and downloads: If they haven’t been touched in months, they might not be worth keeping. Or they could be moved to an external hard drive.
  • Duplicated files: Use a duplicate finder tool to locate and remove duplicates, especially in image libraries or document folders.

By identifying and deleting these unnecessary files, you’ll reclaim storage space and speed up your machine’s performance.

After you’ve cleared out the clutter, it’s time to organize. Just like physical paperwork, a disorganized digital workspace can cause confusion and delays. An unstructured file system can make it difficult to find what you need, when you need it.

Consider the following strategies:

  • Create clear folder structures: Organize your documents into clearly labeled folders (e.g., “Work,” “Personal,” “Finances”).
  • Use consistent naming conventions: This makes it easier to find files and also keeps your system organized over time.
  • Archive old projects: If you’re not actively working on something, archive it into a separate folder to keep things neat.

Taking the time to organize your files not only makes them easier to locate, but it can also boost your productivity and reduce the stress of a chaotic digital environment.

While it’s important to clean up your computer, it’s equally vital to back up important data before you proceed with any major changes. Whether it’s critical work documents, personal photos, or financial records, having a backup ensures you’re protected against potential data loss.

Here are some backup options to consider:

  • Cloud Storage: Services like Google Drive, Dropbox, or iCloud make it easy to store and access your data from anywhere.
  • External Hard Drives: If you prefer physical backups, an external drive offers the security of having a local copy.
  • Automated Backup Solutions: Set up automatic backups to regularly back up your most important files, ensuring they’re always secure.

We’ve all downloaded software that seemed useful at the time, only to never use it again. Left unchecked, these applications can sit dormant on your computer, consuming valuable resources such as RAM and storage space.

To optimize your system, perform the following:

  • Uninstall unused applications: Go through your installed programs and remove anything you no longer need.
  • Remove browser extensions: These can slow down your browser and collect unnecessary data.
  • Reevaluate startup programs: Disable unnecessary startup programs that slow down boot times and consume system resources.

By cleaning out these unneeded applications, you can free up both storage space and system resources, leading to a smoother experience when using your computer.

Routine diagnostics and software updates are vital to maintaining a healthy system. This ensures that your operating system is up-to-date and protected against security vulnerabilities.

Steps to follow:

  • Run a disk cleanup: This built-in utility clears out cache files, system files, and other temporary data.
  • Check for software updates: Update your operating system and any installed software to their latest versions. This ensures you benefit from performance improvements and security patches.
  • Run a system scan: Use built-in or third-party antivirus tools to check for malware or other threats.

Regular maintenance like this keeps your system running efficiently, reduces the risk of security threats, and ensures everything is up-to-date.

In today’s fast-paced digital world, it’s easy to get into the habit of opening multiple tabs in your web browser, sometimes without even thinking about it. However, keeping dozens of tabs open can lead to unnecessary distractions, slower performance, and a cluttered, chaotic browsing experience.

To streamline your browsing habits, try the following:

  • Use browser bookmarks:  Instead of leaving tabs open for future reference, save the webpages you need using bookmarks or a bookmark manager. You can organize them into folders (e.g., “Work,” “Research,” “Shopping”) for easy access. These can later be deleted when no longer needed.
  • Utilize session managers: For ongoing projects or tasks that require multiple tabs, use browser extensions or tools that let you save and restore entire sessions, so you can close them without losing your progress.
  • Limit open tabs: Be mindful of how many tabs you have open at once, especially when it comes to shared documents. If you find yourself opening too many, try to consolidate or close tabs you no longer need.

By adopting these habits, you’ll reduce distractions, improve browser speed, and create a cleaner, more organized online workspace.

On Clean Out Your Computer Day, take the opportunity to declutter your digital life. A clean and well-maintained system doesn’t just run faster; it also helps you stay organized, protects your important data, and reduces the risk of unnecessary security vulnerabilities.

Routine maintenance can seem tedious, but the long-term benefits far outweigh the effort. And remember, a clean computer not only leads to a smoother digital experience but also sets the foundation for a more productive and stress-free workflow.


Never miss any tips from DarkOwl. Follow us on LinkedIn.

Navigating the Darknets: Analyzing Differences and Associated Risks

February 04, 2025

While the Onion Router (TOR) is the most well-known dark web network, there are a number of other networks that have been developed which are used for various different reasons, while these sites do have some legitimate users and use cases, the anonymous nature of these networks also makes them attractive to criminal and other illicit actors. In this blog, we will explore some of the different networks that are available and how they are used by criminals.  

The birth of the dark web can be traced back to the early 1990s when researchers at the United States Naval Research Laboratory (NRL) began exploring ways to create anonymous and secure communication channels. Driven by the need for a secure, untraceable network for intelligence communications, the NRL researchers, laid the groundwork for what would become known as onion routing.  

This project became the foundation of the darkweb, a network within the broader internet that required specialized software to access. Its origins were rooted not in cybercrime or illicit activities, but in the need for strong anonymity and privacy for sensitive governmental communications.

Although superseded by Freenet, which was launched in 2000 by Ian Clarke, a computer science student at the University of Edinburgh, to offer anonymous and censorship-resistant content sharing and communications, the Onion Routing Project was released publicly, in 2002, as Tor (The Onion Router). By making the software freely available, the NRL aimed to create a more robust and diversified network, one where traffic would be harder to trace due to the increased number of users. This move allowed civilians, journalists, and other non-government users to benefit from the anonymity that Tor provided, thereby expanding the user base and enhancing network security through sheer volume. Tor’s release as an open-source software encouraged further development by a global community of privacy advocates and researchers, transforming Tor into a more versatile tool over time. 

The public release of these tools as well as the advent of blockchain technology allowed for more of these networks to be developed over time, each being accessed in a slightly different way and used in different ways by different types of individuals.  

We will explore nine different dark web networks that are currently available, reviewing how they work, how they are accessed and how they are used by criminals. Although there are many networks it is worth noting that they do not all serve the same function and they are not all equally popular.  

Tor (The Onion Router) 

Tor is the most well-known anonymizing network that helps users maintain privacy and anonymity online. It routes your internet traffic through a series of volunteer-operated servers (called nodes), making it difficult to trace your online activity. Websites accessed via Tor use the “.onion” domain, providing anonymity for both users and hosts. The network is run by a not for profit who prioritize privacy. However TOR is also widely used by criminals to buy and sell illicit goods and activities. It is also used to share CSAM and adult materials. It has also famously been used to advertise hitmen.  

  • Creation Date: 2002 
  • Created By: Tor was initially developed by the U.S. Naval Research Laboratory to protect government communications. The project was later released to the public in 2002 to promote privacy and anonymity online. 
  • Access Method: To use Tor, you must download and install the Tor Browser, which routes your web traffic through the Tor network. 
  • Key Features: High privacy, decentralized, resistant to censorship, ideal for users who need anonymity. 

I2P (Invisible Internet Project) 

I2P is an anonymizing network, known as eepsites, designed to offer privacy and censorship resistance, particularly for hosting and accessing “hidden” services. Unlike Tor, which is more focused on browsing the surface web anonymously, I2P is optimized for internal, peer-to-peer communication. For this reason it can be popular with individuals wishing to communicate directly. It is known to be sued for sharing CSAM material, but the network also hosts marketplaces and forums similar to TOR.  

  • Creation Date: 2003 
  • Created By: I2P was created as an anonymizing network by a group of developers led by a person known as “Zer0.” It was designed as a secure alternative to the Tor network, focusing more on peer-to-peer communication and internal services. 
  • Access Method: To access I2P, users need to download and install the I2P software, which establishes a network of encrypted tunnels for communication. 
  • Key Features: Decentralized, highly anonymized peer-to-peer services, primarily used for file-sharing and private communications. 

ZeroNet 

ZeroNet is a decentralized, peer-to-peer network that uses blockchain technology to host websites. Sites on ZeroNet are resistant to censorship and operate through distributed nodes, meaning that users don’t rely on central servers. It uses Bitcoin’s blockchain for verifying content and uses the BitTorrent protocol for content distribution. This can make it very difficult to identify new content.  

  • Creation Date: 2015 
  • Created By: ZeroNet was created by an anonymous developer, “Zero,” and leverages the BitTorrent protocol and blockchain technology to provide decentralized websites that are resistant to censorship. 
  • Access Method: Users need to install ZeroNet software and can then access ZeroNet websites, which often use the “.bit” domain. 
  • Key Features: Blockchain-based, decentralized, resistant to censorship, peer-to-peer file sharing. 

Freenet 

Freenet is a decentralized, peer-to-peer platform designed for anonymous browsing and file sharing. It allows users to publish and access content in a way that is both private and resistant to censorship. Freenet operates on a distributed network where data is stored in a way that’s anonymous and cannot easily be removed. Criminals use Freenet to share illegal files, including pirated content, child exploitation material, or stolen intellectual property, with a high degree of anonymity. It can also be used to communicate anonymously.  

  • Creation Date: 2000 
  • Created By:  Freenet was launched in 2000 by Ian Clarke, a computer science student at the University of Edinburgh. It was developed to offer anonymous and censorship-resistant content sharing and communications. 
  • Access Method: Users download and install the Freenet software, which enables them to access “freesites.” 
  • Key Features: Censorship-resistant, decentralized, peer-to-peer, focused on anonymity and privacy. 

Loki (Oxen) 

Loki, now known as Oxen, is a privacy-focused cryptocurrency and decentralized platform. It uses the Oxen blockchain and features the Loki network, which facilitates private messaging, anonymous transactions, and secure browsing. Oxen enables users to create decentralized applications (dApps) that offer privacy and anonymity. Oxen can be used to conduct cryptocurrency transactions for illicit reasons and to communicate anonymously. The apps can also be used to create darkweb marketplaces and forums.  

  • Creation Date: 2017 
  • Created By: Created as a privacy-focused cryptocurrency and platform to offer secure, anonymous communication. The Oxen (formerly Loki) project was launched in 2017 to provide privacy-enhanced features, including secure messaging and decentralized apps. 
  • Access Method: Users can interact with the network using the Oxen wallet or by utilizing the Loki Messenger app, which is designed for private, encrypted communication. 
  • Key Features: Privacy-centric, anonymous messaging, decentralized, uses blockchain for secure operations. 

Yggdrasil 

Yggdrasil is a decentralized, encrypted mesh network aimed at offering secure, encrypted, and anonymous communication. It is an experimental, overlay network that seeks to integrate the concepts of privacy, anonymity, and security into a global decentralized infrastructure. 

  • Creation Date: 2016 
  • Created By: Yggdrasil Computing, Incorporated, a company founded by Adam J. Richter in Berkeley, California, developed the Yggdrasil Linux/GNU/X (LGX).  
  • Access Method: Yggdrasil operates as a virtual network overlay and requires the installation of specific software to connect to it. 
  • Key Features: Peer-to-peer, encryption, decentralized communication, secure and private. 

 IPFS (InterPlanetary File System) 

IPFS is a peer-to-peer protocol and network designed to make the web faster, safer, and more open by creating a decentralized file system. It allows for the storage and sharing of data in a distributed way, meaning that files are not stored on central servers but instead across the network. This can make it attractive to criminals who are wishing to share stolen data.  

  • Creation Date: 2015 
  • Created By: IPFS was proposed by Juan Benet and launched in 2015. Its goal is to create a distributed, peer-to-peer file system that makes the web faster, safer, and more open by using a decentralized model 
  • Access Method: To use IPFS, you need to install an IPFS client and access data stored across the distributed network. 
  • Key Features: Decentralized file storage, censorship-resistant, peer-to-peer, versioning of files, faster content delivery. 

Unigrid 

Unigrid is a decentralized, secure, and censorship-resistant platform that focuses on providing internet access and data storage through peer-to-peer networks. It aims to offer a unified and decentralized infrastructure to facilitate hosting and accessing content across the web. 

  • Creation Date: Unigrid does not have a widely recognized specific creation date or public history, as it is a relatively obscure and niche decentralized project. However, decentralized grid computing projects like Unigrid began emerging around the mid-2010s in response to growing interest in distributed infrastructures. 
  • Access Method: Users can interact with Unigrid through decentralized applications that are built on top of its infrastructure. 
  • Key Features: Decentralized, peer-to-peer, secure, censorship-resistant.  

Mysterium 

Mysterium is a decentralized VPN and proxy service that allows users to securely access the internet while maintaining privacy. The Mysterium network is built using blockchain technology and is powered by a global network of nodes. Users can choose to either be consumers of VPN services or providers. 

  • Creation Date: 2017  
  • Created By: The Mysterium Network was founded in 2017 by a group of developers and entrepreneurs who wanted to create a future where users could access information freely 
  • Access Method: Users can download the Mysterium VPN app and select from a range of available nodes in the network to securely browse the web. 
  • Key Features: Decentralized VPN, privacy, blockchain-based, secure internet access. 

Many different dark webs exist, although they were primarily created in order to allow users to anonymously access the internet, to protect privacy and defeat censorship as well as ensuring there are decentralized network that are not controlled by one organization.  

However these features mean that these networks are also attractive to criminal users. Although each are used to a different degree, each of them are used in a similar way to conduct similar activities. However as law enforcement becomes more successful at taking down sites hosted on TOR, it is likely that criminals will move to other networks and other means of communications to conduct their criminal activity.  


Curious about DarkOwl’s coverage? Contact us.

Threat Intelligence RoundUp: January

February 03, 2025

Our analyst team shares a few articles each week in our email newsletter which goes every Thursday. Make sure to register! This blog highlights those articles in order of what was the most popular in our newsletter – what our readers found the most intriguing. Stay tuned for a recap every month. We hope sharing these resources and news articles emphasizes the importance of cybersecurity and sheds light on the latest in threat intelligence.

1. Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics – The Hacker News

The Lazarus Group, a North Korean state-backed cyber threat actor, was found to have targeted at least two employees at an unnamed “nuclear-related” organization. The attacks occurred in January 2024 and, according to BleepingComputer, involved the deployment of a new backdoor dubbed “CookiePlus.” The attacks were part of the ongoing cyber espionage campaign “Operation Dream Job.” Read full article.

2. DOJ Indicts Three Russian Nationals for Involvement in Cryptocurrency Mixing Services – The Hacker News

In a January 10, 2025, press release, the U.S. Department of Justice announced the indictment of three Russian nationals for their role in operating the cryptocurrency mixing services Blender.io and Sinbad.io. Two of the three—Roman Vitalyevich Ostapenko and Alexander Evgenievich Oleynik—were arrested in December, 2024, during an international operation involving the Netherlands’ Financial Intelligence and Investigative Service, Finland’s National Bureau of Investigation, and the Federal Bureau of Investigation (FBI). The third defendant—Anton Vyachlavovich Tarasov—is still at large. Article here.

The Lazarus Group, a North Korean state-backed cyber threat actor, was found to have targeted at least two employees at an unnamed “nuclear-related” organization. The attacks occurred in January 2024 and, according to BleepingComputer, involved the deployment of a new backdoor dubbed “CookiePlus.” The attacks were part of the ongoing cyber espionage campaign “Operation Dream Job.” Read more here.

On January 21, U.S. President Donald Trump pardoned Ross Ulbricht, the founder and operator of the notorious dark web marketplace “Silk Road.” As noted by the Department of Homeland Security (DHS), Ulbricht “deliberately operated Silk Road as an online criminal marketplace intended to enable its users to buy and sell drugs and other illegal goods and services anonymously and outside the reach of law enforcement.” The website was ultimately shut down by law enforcement in October 2013, nearly three years after its founding by Ulbricht in January 2011. The founder was convicted of seven offences, including distributing narcotics, engaging in a continuing criminal enterprise, and conspiring to commit money laundering. Read here.

5. Star Blizzard hackers abuse WhatsApp to target high-value diplomats – Bleeping Computer

In a January 16 report, Microsoft Threat Intelligence detailed a new phishing campaign orchestrated by the Russian threat actor Star Blizzard. According to the report, the campaign occurred in November 2024 and targeted individuals in “government, diplomacy, defense policy, international relations, and Ukraine aid organizations.” The newly observed spear-phishing campaign functioned by sending emails impersonating U.S. government officials and claiming to share invitations to join a WhatsApp group pertaining to non-governmental initiatives to support Ukraine. If replied to, the threat actor would follow up with a second email containing a malicious link. Learn more.

6. Chinese hackers targeted sanctions office in Treasury attack – Bleeping Computer

The Chinese state-backed threat actor Silk Typhoon has been linked to a string of attacks against several U.S. Department of the Treasury offices. In December, Chinese hackers gained access to the Treasury’s Office of Foreign Assets Control (OFAC), Committee on Foreign Investment in the US (CFIUS), and Office of Financial Research. The breaches were part of Silk Typhoon’s incursion into the Treasury Department’s unclassified system. Hackers gained access by breaching a BeyondTrust remote management service. The full impact of the Office of Financial Research hack is still being assessed. Read full article.

7. US charges Russian-Israeli as suspected LockBit ransomware coder – Bleeping Computer

In a December 20, 2024, press release, the U.S. Department of Justice (DOJ) announced it had charged 51-year-old Rostislav Panev—a dual Russian and Israeli national—for his suspected role as a developer for the LockBit ransomware group. Panev was arrested in Israel in August where he is currently awaiting extradition. LockBit, the notorious ransomware-as-a-service (RaaS) operation, first emerged in or around 2019 and was disrupted in February 2024 by an international law enforcement operation dubbed “Operation Cronos.” Read full article.

8. Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware – The Hacker News

Iranian threat actor Charming Kitten (also known as APT35, CharmingCypress, CALANQUE, Mint Sandstorm, Newscaster, ITG18, TA453, and Yellow Garuda) has been observed utilizing a new variant of BellaCiao malware in its attacks. The cybersecurity firm Kaspersky has dubbed the new C++ variant “BellaCPP.“ BellaCiao malware was first observed in 2023 and has since been used in cyber attacks against organizations in the U.S., India, and the Middle East. Learn more.


Make sure to register for our weekly newsletter to get access to what our analysts are reading on a weekly basis.

Ransomware Round Up 2024

January 30, 2025

One of the biggest threats facing organizations from a cyber security perspective is ransomware. In 2024, the ransomware landscape experienced significant shifts, marked by the emergence of new threat actors, high-profile attacks, and evolving tactics. But what remained consistent was the upward trend of those organizations that fell victim to this kind of attack.  

In this blog we review the ransomware groups who were most active and the most significant ransomware attacks of 2024. 

RansomHub 

The group RansomHub first appeared in February 2024, with an announcement on the Russian forum RAMP. A user named “koley” made the announcement and invited others to join their affiliate program.  

Figure 1: Source: DarkOwl Vision

RansomHub quickly became one of the most active ransomware groups, claiming 593 victims by the end of the year. The group operates a ransomware-as-a-service (RaaS) model, targeting multiple platforms, including Windows, Linux, and ESXi.  

RansomHub’s affiliate program has been prolific over taking established groups, such as LockBit, in the number of victims they have. Notably, RansomHub was responsible for a significant breach of the U.S. healthcare payment system in 2024. 

LockBit 

Despite facing significant disruptions due to Operation Cronos in February 2024, LockBit affiliates managed to execute a substantial number of attacks, maintaining their presence in the ransomware ecosystem. Although access to their site has been spotty, the group have indicated they will launch Lockbit4.0 and asked people to join their affiliate program.  

Figure 2: Lockbit Leak site 

Play 

Active since June 2022, Play intensified its operations in 2024, with 362 claimed victims during the year. The group is known for exploiting vulnerabilities in widely used software, such as Fortinet, Citrix, and VMware’s ESXi, to gain initial access to target systems. This group continued its aggressive operations, doubling its victim count year-over-year and securing its position as one of the top three most active ransomware groups. However, unlike many other groups they do not offer ransomware as a service.  

Figure 3: Play Leak site 

Akira 

Debuting in March 2023, Akira is considered a successor to the Conti ransomware group. In 2024, Akira claimed 291 victims, continuing its aggressive targeting of various organizations. They follow the Ransomware-as-a-Service business model and practice the double-extortion technique. The adversary seems to target almost exclusively companies originating from and operating in the United States. They have also issued a directive to hit US healthcare organizations. 

Figure 4: Akira Leak site 

Change Healthcare Ransomware Attack (February 2024)  

Change Healthcare, a subsidiary of UnitedHealth Group and a major processor of U.S. medical claims, suffered a ransomware attack by the BlackCat (ALPHV) group. The breach affected the personal information of over 190 million individuals, including health insurance details, medical records, and personal identifiers. The company paid a $22 million ransom to recover the data. This attack, although not related, preceded the assassination of the company’s CEO. After the initial attack, and an exit scam by BlackCat, the company suffered a second extortion from the RansomHub group.  

CDK Global Ransomware Attack (June 2024) 

CDK Global, a key software provider for automotive dealerships, experienced a ransomware attack that disrupted operations across thousands of car dealerships in the U.S. and Canada. The company paid a $25 million ransom to the Eastern European and Russian hacker group BlackSuit to restore services.  

Blue Yonder (October 2024) 

A ransomware attack on Blue Yonder, a major software provider, disrupted operations for several companies, including Starbucks and UK grocery store Sainsbury’s. The attack affected Starbucks’ ability to manage barista schedules and track hours, necessitating manual workarounds. At the end of the year the re-emerging group CL0P also claimed to have hacked the company.

Albyn Housing Society Data Breach (August 2024) 

Albyn Housing Society, one of Scotland’s largest housing charities, was hacked by the ransomware gang RansomHub. Personal data of staff and tenants, including payroll and expenses claims, were leaked on the dark web. The attack highlighted the vulnerability of charitable organizations to cyber threats. 

Medisecure (May 2024) 

An Australian electronic prescription service provider suffered a ransomware attack leading to the theft of personal and health information of approximately 12.9 million individuals. This is the largest breach of data in Australia’s history.

December 2024 witnessed 574 ransomware attacks, the highest monthly total since monitoring began in 2021, indicating an alarming surge in activity. The year end high of victims forebodes what trends we expect to see in 2025, with the number of victims unlikely to decrease, despite efforts from law enforcement to shut down and arrest members of these groups.  

This in part is due to the fact that groups often reemerge after law enforcement action but also because new groups are emerging all the time. The number of active ransomware groups increased by 30% year-over-year, with 31 new groups entering the ecosystem.

In 2024 ransomware actors adopted more sophisticated methods, including the use of artificial intelligence to enhance the precision of attacks, and the emergence of hybrid ransomware combining traditional encryption with data manipulation or destructive malware.

These developments underscore the escalating complexity and frequency of ransomware threats, necessitating robust cybersecurity measures, dark web monitoring and vigilance as we move into 2025. 


Stay up to date with DarkOwl reporting. Follow us on LinkedIn.

Data Privacy Day: Why It Matters More Than Ever

January 28, 2025

Data Privacy Day, observed annually on January 28, is a global effort to raise awareness about the importance of data privacy and safeguarding personal information. As our lives become increasingly digital, the relevance of protecting personal data has never been more crucial. Whether you’re an individual managing your online presence or a business handling sensitive customer information, understanding data privacy is vital, as well as understanding the risks that are posed to you or your organization when your data privacy is breached.  

Data Privacy Day traces its roots to the signing of Convention 108 in 1981, the first legally binding international treaty dedicated to privacy and data protection. It began in Europe and later gained global recognition, evolving into a day for reflecting on data practices and empowering individuals and organizations to protect their information. Laws have also been created in both Europe, with GDPR, (General Data Protection Regulation) and in the US such as CCPA (California Consumer Privacy Act)., which means that organizations need to comply and ensure that they are not only protecting their own data, but any data they come into contact with which may belong to others such as customers or employees.  

Preventing Identity Theft 

Personal data breaches can lead to identity theft, financial fraud, and other cybercrimes. In 2023 alone, millions of people suffered from scams due to compromised personal data. These types of attacks can be devastating and cause untold financial hardships.  

Personal Risk – Social engineering attacks 

Exposed data can be used to build a picture of an individual which can then be used to inform social engineering attacks which can lead to further data loss and reputational damage. Furthermore, providing too much data about yourself can leave you open to physical risk, such as doxing attacks or stalking. 

Building Trust in Digital Spaces 

For businesses, trust is currency. Transparent data practices help companies build customer loyalty and comply with regulations like GDPR and CCPA. 

Enabling Informed Choices 

When individuals understand how their data is collected, stored, and used, they can make informed decisions about the digital platforms they engage with. Arguably social media companies and advertising agencies hold more data on us than governments. It is important to know how our data is collected, stored and used by these organizations.   

Protecting Personal Freedom 

Data privacy is not just about securing information; it’s about preserving freedom. Unauthorized data collection and surveillance can infringe on fundamental human rights, such as freedom of expression and association. 

Educate Yourself 

Take time to learn about your rights concerning data privacy. Resources from organizations like the Electronic Frontier Foundation (EFF) or the International Association of Privacy Professionals (IAPP) can be helpful. Also understand the best way to protect your data and your organizations data.  

Review Privacy Settings 

Audit your social media and device settings to ensure you’re only sharing information you’re comfortable with. You should always have strong privacy settings so only those you want to see your data can. Also think before you post, do not post personal information online or share locations. 

Enable Multi-Factor Authentication 

Strengthen your online accounts by adding extra layers of security. Using an app is better than using text messages which can leave you open to OTP attacks. Also ensure you use a password manager so that you use a different password for each account. This way if data for one account is compromised it will not affect your other accounts.  

Advocate for Privacy in Your Workplace 

Encourage your organization to adopt robust data protection policies and provide training for employees. And make sure you practice what you preach! 

Know what data has been exposed 

Ensure that you are aware if any of your data has been exposed and what actions you can take to prevent the data loss having an impact on you. DarkOwl will provide monitoring to alert you when your information appears in a breach. 

AI and Privacy  

As artificial intelligence becomes more integrated into daily life, concerns about how AI systems process and store data are on the rise. These systems are built on data models and therefore data is at the heart of how they work. It is not just an issue of how they store data but what data they use to train their models. There are copyright and plagiarism concerns. But in a world where our images and our voices can be used we must expand what we view as “our” data. 

Data Sovereignty  

Countries are increasingly advocating for localized data storage and processing to enhance national security and privacy. Concerns are raised when data is held in countries which do not have strong privacy laws and how that data might be used  

Biometric Data Protection 

With technologies like facial recognition and fingerprint scanning becoming common, safeguarding biometric data is becoming a top priority. 

Data Privacy Day is a reminder that protecting our personal information is a shared responsibility. As individuals, we need to stay vigilant about our online presence, and as a society, we must demand accountability and transparency from governments and corporations. Together, we can create a safer digital world where privacy is respected, and trust is earned. 

This Data Privacy Day, take a moment to reflect on your digital habits and make a commitment to safeguarding your privacy—and that of others. After all, in an era where data is the new oil, protecting it is protecting ourselves. 


Don’t miss anything from DarkOwl. Follow us on LinkedIn.

Piracy and Streaming on the Dark Web: An Insight into the Shadowy World of Digital Entertainment

January 23, 2025

In an era dominated by subscription-based streaming platforms, the dark web has emerged as a hidden refuge for those seeking free access to premium content. Movies, TV shows, music, and even live sports are pirated and streamed illegally, with stolen accounts for streaming services often being sold. Thus creating a shadow market that poses significant challenges to content creators, distributors, and law enforcement alike. 

There are several activities which take place on the dark web which allow users to illegally obtain access to TV Shows, music and movies. This can range from directly accessing the content from the dark web, or using it to buy and sell access.  

File Sharing: Users upload and download copyrighted materials, bypassing paywalls and subscription fees. 

Figure 1: Examples of file sharing sites; Source: DarkOwl Vision

Live Streaming: Dark web platforms stream live sports events, concerts, and shows for free, often embedding malicious ads to profit from viewers. 

Figure 2: Streaming examples; Source: DarkOwl Vision

Subscription Bypassing: Some dark web sites distribute cracked versions of popular streaming services, granting unauthorized access to premium content. 

Figure 3: Available streaming services; Source: DarkOwl Vision

These activities thrive on anonymity and low costs. Many pirated content hubs are funded through cryptocurrency donations or ad revenue, allowing them to remain operational even as authorities try to shut them down. 

Accounts Hijacking: Accounts for streaming accounts can also be obtained through stealer log data, allowing hackers to use a legitimate account without having to pay.  

Figure 4: Stealer log data including streaming services; Source: DarkOwl Vision

Forums and tools: The dark web is also a place where users can discuss their illicit activities. With forums being used to discuss piracy and “free” streaming and tips for how to do this or access channels.  

Figure 5: Streaming Forum; Source: DarkOwl Vision

Tools are also shared to assist users.  

Figure 6: Piracy Tools; Source: DarkOwl Vision

There are many reasons why individuals may seek to use the Dark web to stream content or view pirated materials. The most common reason is cost. Illicit users can access this information for free instead of having to pay for the service. With an increasing number of streaming platforms, the cost of subscribing to all of them becomes prohibitive. The dark web offers free access, albeit illegally. 

Some people may also use the dark web to bypass locational controls that they may come across. Certain shows or movies may not be available in specific regions due to licensing restrictions, driving users to pirated sources.  

As with all activities on the dark web, using the dark web for streaming allows users to engage in illegal activities without exposing their identities, reducing the perceived risk. They may therefore feel more comfortable accessing illicit accounts on the dark web rather than surface web sites that also offer access to pirated materials.  

While the allure of free content is strong, accessing pirated material on the dark web comes with significant risks. It is illegal and is not condoned in anyway by DarkOwl. Downloading or streaming copyrighted material is illegal and can lead to hefty fines or legal action.  

However there are other reasons why it is not advisable to access streaming services or pirated materials from the darkweb. Many dark web streaming sites are laden with malware, phishing links, and ransomware. Which leaves the user open to attacks and their own data being stolen. If done using corporate networks this could have much. More dire consequences. 

Furthermore, users often inadvertently support criminal enterprises, including human trafficking and drug trade, by engaging with dark web piracy networks. 

The financial impact of piracy is staggering. According to a 2021 study by the U.S. Chamber of Commerce, global online piracy costs the U.S. economy over $29 billion annually. This loss not only affects studios and streaming services but also impacts jobs and revenue for creatives across the industry. 

Furthermore, piracy undermines the incentive for creators to produce new content. If creators can’t monetize their work effectively, the diversity and quality of entertainment options could diminish. 

Therefore it is imperative that media providers monitor the dark web in order to identify what practices are being used, which actors are active in this area, so disruptive action can be taken and understand what people are accessing.  

The dark web’s role in piracy and illegal streaming highlights the complex interplay between technology, consumer behavior, and the law. While it might be tempting to seek free content through illicit means, the risks and repercussions far outweigh the benefits. By prioritizing ethical consumption and supporting fair compensation for creators, we can ensure a thriving and sustainable entertainment industry for years to come. 


Curious how DarkOwl can help your organization? Contact us!

Copyright © 2024 DarkOwl, LLC All rights reserved.
Privacy Policy
DarkOwl is a Denver-based company that provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data. We shorten the timeframe to detection of compromised data on the darknet, empowering organizations to swiftly detect security gaps and mitigate damage prior to misuse of their data.