Author: DarkOwl Content Team

Foreus, Austria’s Leading Agency Against Crime, Partners with DarkOwl to Enhance Intelligence Data

November 12, 2024

DarkOwl, a leading provider of darknet intelligence and insights, is excited to announce a strategic partnership with Foreus, a premier intelligence firm specializing in combating white-collar and cybercrimes across Europe and around the globe. This collaboration will enhance the collection, analysis, and application of critical intelligence needed to counter the ever-increasing number of cyber threats.
 
Because the darknet serves as a sanctuary for illicit activities, insight into its activities is essential for a comprehensive view of cyber risk and digital footprints. The darknet is a thriving ecosystem that many organizations struggle to incorporate into their security posture. However, it is an increasingly vital component for organizations with forward-thinking strategies. DarkOwl’s comprehensive darknet and deep web monitoring capabilities, powered by advanced machine learning and human expertise, provide secure, anonymous access to real-time data.
 
By having access to DarkOwl’s leading darknet database, Foreus’ ability to uncover, process, and leverage difficult-to-obtain intelligence. Together, the two companies will deliver advanced, timely intelligence solutions to prevent fraud, espionage, and other illicit activities affecting governments, businesses, and individuals worldwide.
 
Mark Turnage, CEO and Co Founder of DarkOwl, shared “Foreus’ expertise in fighting cyber and white-collar crimes, combined with our unparalleled darknet data, will provide a powerful solution for identifying and addressing emerging threats on a global scale. This partnership is another exciting step forward in our mission to provide our clients with the most comprehensive and actionable darknet intelligence.”
 
Foreus shared the same excitement, “We are thrilled to partner with DarkOwl. By incorporating DarkOwl’s ethically sourced darknet data, we will be able to offer an even broader range of intelligence capabilities to our clients.”
 
The partnership between DarkOwl and Foreus represents a shared commitment to delivering high-quality, secure, and actionable intelligence in an increasingly complex digital landscape.
 
About DarkOwl
DarkOwl is the industry’s leading provider of darknet data. We offer the world’s largest commercially available database of information collected from the darknet. Using machine learning and human analysts, we automatically, continuously, and anonymously collect and index darknet, deep web, and high-risk surface net data. Our platform collects and stores data in near real-time, allowing darknet sites that frequently change location and availability to be queried in a safe and secure manner without having to access the darknet itself. Customers are able to turn this data into a powerful tool to identify risk at scale and drive better decision making. For more information, contact us.
 
About Foreus
Foreus specializes in uncovering, collecting, and processing hidden, difficult-to-procure intelligence and data used to fight both white-collar and cyber-crimes throughout Europe, as well as internationally. The company specializes in using the Intelligence Cycle to prevent fraud, espionage, and other illicit activities. In this age of information, Foreus diligently protects their clients and provides timely, vetted information to strategically combat criminal activities against governments and civil society. DarkOwl is honored to have gained their trust and be included in their high-quality intelligence offerings. For more information, visit www.foreus.at.

Initial Reactions to Election 2024 Across the Darknet

November 06, 2024

DarkOwl analysts have been closely monitoring darknet sites like Ramp4U, BreachForums, XSS, and Exploit in addition to chat platforms like Telegram and Discord for any concerning or threatening language in the lead up to, on the day of, and following the November 5, 2024 American presidential election.

We have identified individuals across the deep and dark web—particularly on the dark web-adjacent messaging app Telegram—spreading misinformation regarding the electoral process. On the morning of November 5, Cambria County Commissioner Scott Hunt in Cambria County, Pennsylvania announced a “ballot printing issue” that resulted in tabulators being unable to scan ballots. The issue was caused by “how the ballots were printed,” and was not a problem with the machines. Numerous individuals online, however, were observed misrepresenting the information and spreading numerous conspiracy theories. These have included unfounded claims that voting machines were tampered with to undermine the Republican vote.

These conspiracy theories fall into a larger trend of mis- and disinformation undermining trust in the electoral process, which gained significant traction following the 2020 presidential election. On the day of the election, analysts continued to observe the spread of false narratives suggesting that voting system manufacturers like Dominion Voting Systems are “changing votes.” Many individuals in far-right Telegram channels are also continuing to reiterate the conspiracy theory that the 2020 presidential election was “stolen.”

As noted in DarkOwl’s recent 2024 U.S. Presidential Election Disinformation on the Dark Web whitepaper, U.S.-based conspiratorial political movements like QAnon are actively sharing false information pertaining to the 2024 presidential election. In the weeks leading up to the election—and on Election Day—QAnon Telegram channels have spread misinformation claiming that the “deep state” is taking steps to “steal the election.” The conspiratorial political movement, for instance, has pointed to the length of time needed to count ballots as a sign of interference. Many of these unfounded claims stem from—and are amplified by—falsities spread by prominent political figures, including former President Donald Trump. Far-right Telegram channels have notably picked up on posts made by Donald Trump on Election Day claiming that there is “massive cheating” taking place in Philadelphia. Philadelphia officials have already issued a statement in response countering the former president’s unfounded claim.

Furthermore, on Election Day, the Federal Bureau of Investigation (FBI) announced that there are fabricated videos spoofing the FBI—using both its name and insignia—currently circulating online. As highlighted by CBS News, the videos are spreading “false information about security threats and election integrity.” Although the threat actors behind the videos have not been identified at this time, researchers believe it is likely that Russia is behind the disinformation. This would be consistent with expectations that nation states—particularly Russia, Iran, and China—would ramp up disinformation operations closer to November 5.

Mis- and disinformation claiming that the election is being “stolen” and that voting machines are being hacked was increasingly observed on the night of November 5 and in the early hours of November 6, prior to the announcement of president-elect Donald Trump’s victory. Following the announcement, individuals in far-right Telegram chats were seen claiming that the “steal” was stopped “at the last minute.” Moreover, since the results have come in, DarkOwl has observed left-wing individuals—particularly on Twitter/X—spreading conspiracy theories claiming that the election was “rigged” in favor of president-elect Donald Trump. As was the case with far-right conspiracy theories, there is no evidence to support these claims.

DarkOwl analysts identified a post on RAMP4U titled, “USA state of Georgia Police Department Captain email hacked | ELECTIONS SPECIAL HACK.” This post, originally published by the user, Pwnstar, on 11/02/2024, has gained attention, and the threat actor stated it was being shared specifically ahead of the election.

Below is a screenshot of Pwnstar’s original post, which claims to have 2.3 GB of emails belonging to “Captain of Georgia PD.” No city, county, or town was named, but the user further alleges that this data goes all the way back to 2012 until Sep 2024. Most replies asked the user for the price of the data leak and whether the information is genuine.

The following screenshot also appeared on Pwnstar‘s original post. The image is an alleged data sample from the Georgian police captain’s leaked emails – specifically a “Municipal Court Jail Docket Sheet.”

The Georgia police captain post has continued to receive attention from prospective buyers clarifying details about the leak followed by the threat actor, Pwnstar, responding. Below are a couple noteworthy comments.

Pwnstar accused Dinamit of being a journalist or law enforcement agent:

A thread titled, “USA Voter Databases Collection” originally appeared on Breachforums in June 2023, but has recently resurfaced as a popular thread in light of the 2024 election. Several users claim to have recent data for various states including the following information:

  • Voter ID Number
  • First & Last Names
  • DOB
  • Full Addresses
  • Email & Phone Numbers

This post did not continue to receive additional replies after the elections results were finalized. However, DarkOwl Analysts identified an actor named OriginalCrazyOldFart that has a particular interest in US voter data.

There are 13 pages of replies. Pages 12 and 13 contain comments from 11/1/2024 until Current Date. One response worth noting was from OriginalCrazyOldFart on 11/2/2024 where this user claims that they have current Voter lists for various states like Georgia and Iowa.

DarkOwl analysts searched BreachForums and discovered OriginalCrazyOldFart has posted several threads related to US voter data as well as regularly publishing various types of leaked databases related to private companies and government agencies around the world. One thread titled, “2024 Statewide North Carolina Voter list. 8,695,045 lines (plus OHIO VOTERS),” was originally created on 7/31/2024, but has continued to receive comments as recent as 11/6/2024. This actor claims to have the following data for voters in North Carolina and Ohio:

  • DOB
  • Phone Number
  • Race
  • Driver’s License Numbers

OriginalCrazyOldFart replied to 4 different users asking to clarify the type of data for sale. In this particular response they go into details about how they obtained data from various states including:

  • New York
  • Pennsylvania
  • Wisconsin
  • Missouri
  • Arkansas
  • Kansas
  • Utah

These posts highlight the interest that threat actors have in voting information, even after information has been available for long periods of time. Although given the PII (personal identifiable information) available in these leaks it is more likely the information would be used for traditional hacking and phishing techniques rather than to perpetrate any type of data fraud. However, once a threat actor obtains this kind of data it is difficult for us to know how they are going to use it.

Furthermore, watching activity on the dark web in the run up to the election, during election day and in the immediate aftermath, highlights the effect that this event has had on certain aspects of the community. Rhetoric from those on Telegram and other sites noticeably changed in light of the result. DarkOwl analysts will continue to monitor these groups and conversations to see how the conversation changes in the coming months up to an including the inauguration to understand if threats, conspiracy theories and other threatening rhetoric persists or increases from both sides of the aisle.


Keep up to date with DarkOwl’s research. Follow us on LinkedIn.

Threat Intelligence RoundUp: October

November 04, 2024

Our analyst team shares a few articles each week in our email newsletter which goes every Thursday. Make sure to register! This blog highlights those articles in order of what was the most popular in our newsletter – what our readers found the most intriguing. Stay tuned for a recap every month. We hope sharing these resources and news articles emphasizes the importance of cybersecurity and sheds light on the latest in threat intelligence.

1. Discord blocked in Russia and Turkey for spreading illegal content – Bleeping Computer

On October 8, Russian state-owned news agency TASS reported that Russia’s communications regulator blocked Discord “for violating Russian law.” A day later, on October 9, Turkish authorities announced that it too had blocked the instant messaging app. Turkey cited “crimes of ‘child sexual abuse and obscenity’” as the reason for its decision. Many Discord users have since begun to protest the decision online due to the sudden changes which were made without warning. Full article here.

2. U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown – The Hacker News

In an October 3 press release, the U.S. Department of Justice (DOJ) announced the seizure of 41 internet domains that have been used by Russian intelligence agents for computer fraud in the U.S. The DOJ’s seizure was coordinated with Microsoft, which seized 66 additional domains used by the same threat actors. According to the DOJ’s press release, the domains were used in a phishing campaign run by the Russian government to steal American citizens’ sensitive information. Read more.

3. Police arrest four suspects linked to LockBit ransomware gang – Bleeping Computer

In a recent press release, Europol announced the arrest of four individuals linked to the ransomware gang LockBit. The first arrest was of a LockBit ransomware developer and occurred in August 2024. Two more individuals were subsequently arrested by British authorities that same month. A fourth suspect—believed to be the administrator of a bulletproof hosting service used by LockBit—was arrested in Madrid by Spain’s Guardia Civil. In addition to the four arrests, the United States, United Kingdom, and Australia also announced sanctions against an actor the UK’s National Crime Agency identified as a “prolific affiliate of LockBit and strongly linked to Evil Corp,” the Russian cyber-crime gang. The UK sanctioned 15 additional Russian citizens for ties to Evil Corp, the US sanctioned six, and Australia sanctioned two. Article here.

4. U.S. Charges Three Iranian Nationals for Election Interference and Cybercrimes – The Hacker News

In a September 27 press release, the DOJ announced the indictment of three Iranian nationals allegedly employed by the Islamic Revolutionary Guard Corps (IRGC) for attempting to undermine the U.S. electoral process. The individuals are being charged for hacking into the accounts of “current and former U.S. officials, members of the media, nongovernmental organizations, and individuals associated with U.S. political campaigns,” as part of Iran’s continued efforts to sow discord and influence U.S. elections. Read article.

5. New FASTCash malware Linux variant helps steal money from ATMs – Bleeping Computer

Cybersecurity researcher HaxRob has discovered a new Linux variant of FASTCash malware being utilized by North Korean hackers. The malware is used to infect payment switch systems and perform “unauthorized withdrawl[s] of cash from ATMs.” The new Linux variant is reportedly similar to the previous Windows and AIX variants of FASTCash. Full article here.

6. China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration – The Hacker News

Researchers at the cybersecurity firm ESET have identified a new China-aligned threat actor dubbed CeranaKeeper. The threat actor has been observed targeting governmental entities predominantly in Southeast Asia since early 2022. Targets have included Thailand, Myanmar, the Philippines, Japan, and Taiwan. Most notably, starting in 2023, CeranaKeeper has targeted government entities in Thailand specifically. These targets are consistent with those previously targeted by Chinese state-sponsored threat actors. Full article.

7. US disrupts Anonymous Sudan DDoS operation, indicts 2 Sudanese brothers – Bleeping Computer

In an October 16 press release, the U.S. Department of Justice (DOJ) announced the indictment of two Sudanese nationals for their alleged role in cyberattacks carried out by the hacktivist group Anonymous Sudan. The group, which launched in 2023, has conducted “over 35,000 DDoS attacks in a year” targeting a variety of sectors, including “critical infrastructure, corporate networks, and government agencies in the United States and around the world.” Read more.

8. Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation – The Hacker News

In an October 8 press release, Dutch police announced the arrest of three administrators of “Bohemia/Cannabia,” a notorious dark web market. The international law enforcement operation, which was carried out with the U.K., U.S., and Ireland, resulted in the dismantling of the dual marketplace, which was one of the world’s largest and longest running platforms “for the trade of illegal goods, drugs, and cybercrime services.”  In total, the joint law enforcement operation seized over 8 million euros in cryptocurrency from the arrested platform administrators. Read article.

Cybersecurity researchers from NSFOCUS have discovered a new botnet malware family dubbed “Gorilla Botnet.” According to the cybersecurity firm’s report, between September 4 and September 27, the botnet issued “over 300,000 attack commands, with a shocking attack density.” The botnet has targeted a variety of sectors, including education, government, finance, and communications. Over 100 countries have been impacted, “with China and the U.S. being the hardest hit.” Read more.


Make sure to register for our weekly newsletter to get access to what our analysts are reading on a weekly basis.

Exploring the Darknet: A Halloween Journey

October 31, 2024

Imagine walking through a neighborhood on Halloween night. The streets are dimly lit by flickering jack-o’-lanterns, and each house holds its secrets. Some doors open to friendly treats, while others conceal hidden tricks. This scene mirrors the Darknet, a hidden part of the internet that remains largely unseen and inaccessible to the average user. Like Halloween, the Darknet blends curiosity, excitement, and potential risks. Understanding what it is, how to access it, what lies within its depths, and how to navigate it safely is essential for anyone intrigued by this mysterious digital realm.

The darknet is a segment of the internet that is not indexed by standard search engines like Google or Bing. Unlike the surface web, accessible to anyone with an internet connection, the darknet operates on encrypted networks, ensuring high anonymity for its users. This anonymity makes it a haven for both legitimate and illicit activities.

At its core, the darknet uses specialized software to mask users’ identities and locations. This encryption is like wearing a costume on Halloween, allowing individuals to interact without revealing their true selves. The primary purpose is to provide a secure space where privacy is paramount, shielding users from surveillance and tracking.

Accessing the darknet requires specific tools and precautions, like preparing for a Halloween adventure. The most common method involves using the Tor Browser, a specialized web browser designed to anonymize your internet traffic by routing it through multiple servers worldwide. This process makes it difficult for anyone to trace your online activities back to you.

Many users also employ Virtual Private Networks (VPNs) to add an extra layer of security. A VPN masks your IP address, further protecting your identity and making your internet connection more secure. Some individuals use secure operating systems like Tails, designed to leave no trace on your computer, ensuring maximum privacy.

Using these tools is essential for maintaining anonymity. Just as a costume can conceal your identity on Halloween, these technologies help protect your personal information and online presence from prying eyes.

The darknet hosts a wide range of content and activities. Its anonymity attracts legitimate users seeking privacy and those engaging in illegal activities.

Marketplaces operate as online stores where users can buy and sell goods anonymously. While some offer legitimate products, others deal in illegal items such as drugs, weapons, and stolen data.

Forums allow individuals to discuss various topics without fear of censorship. These can be free speech places but also harbor discussions related to criminal activities.

Whistleblowing sites like SecureDrop enable whistleblowers to share information securely and anonymously with journalists and the public, promoting transparency and accountability.

Content-sharing platforms facilitate the exchange of files, documents, and other digital content without tracking, supporting both legal and illegal information sharing.

While these opportunities exist, it’s important to recognize that not everything found there is safe or legal. Illegal activities and malicious content pose significant risks to those who navigate this hidden internet realm.

The darknet embodies both positive and negative aspects. Understanding these dualities is crucial for anyone considering exploring them.

On the positive side, it protects privacy, shielding users from government surveillance and corporate tracking. It offers a platform for free speech, allowing individuals to express their opinions and share information without fear of censorship or retaliation. Researchers, journalists, and activists can access resources and communicate in ways that might not be possible on the surface web. Additionally, it facilitates connections among individuals dealing with sensitive issues, offering support and resources that might be stigmatized elsewhere.

On the negative side, the darknet is a breeding ground for illegal activities, including the sale of drugs, weapons, and stolen data. Cybercrime such as hacking, fraud, and identity theft are prevalent, posing significant threats to individuals and organizations. It can host disturbing and illegal content, including extremist material and illicit pornography. The lack of regulation and oversight increases the risk of encountering fraudulent schemes and deceptive practices.

Recognizing the darknet’s dual nature helps users make informed decisions about their engagement, balancing the potential benefits against the inherent dangers.

Navigating the darknet requires a cautious approach to ensure safety and security. Implementing the following practices can significantly reduce risks:

  • Use a VPN to encrypt your internet connection and mask your IP address.
  • Install the Tor Browser to anonymize your browsing by routing your connection through multiple servers.
  • You should stay anonymous by avoiding sharing personal information such as your real name, address, or financial details.
  • Verify the legitimacy of websites and users before interacting or making transactions to avoid scams and fraudulent activities.
  • Avoid downloads from untrusted sources to prevent malware infections that can compromise your device and data.
  • Keep all your tools and software updated to protect against security vulnerabilities and exploits.

Ask yourself: Are you prepared to handle the risks? Do you know how to protect yourself?

Beyond the fundamental safety measures, implementing practical strategies enhances your security on the darknet. Use strong, complex passwords for all your accounts to prevent unauthorized access. Enable two-factor authentication wherever possible to add an extra layer of security to your accounts.

Regularly back up your data to protect against loss or theft, ensuring you can recover important information if needed. Monitor your online activity to keep track of your presence and detect any suspicious behavior that could indicate a security breach. Educate yourself about the latest threats and best practices to improve your security measures continuously

These strategies build a robust defense against the risks, allowing you to navigate more confidently and securely.

The darknet poses significant risks that users must be aware of to navigate safely. Being informed about these dangers is the first step in mitigating them.

Illegal activities can lead to severe legal repercussions, including prosecution and imprisonment. Personal information can be exposed through hacks or malicious activities, leading to identity theft and financial loss. Scams and fraudulent schemes are common, resulting in the loss of money and valuable assets. Additionally, exposure to disturbing or illegal content can have adverse effects on mental well-being, causing stress, anxiety, or trauma.

Evaluate your motives for accessing the darknet and weigh the potential benefits against these risks to make informed decisions about your online activities.

Despite its notorious reputation, the darknet offers several benefits that can be harnessed for positive purposes. Journalists use it to communicate securely with sources, protecting their anonymity and the integrity of their investigations. Academics and researchers access uncensored information and collaborate without the constraints of mainstream internet censorship. Activists organize and communicate without fear of retaliation, supporting movements that seek social and political change. It also champions the right to online anonymity, advocating for user privacy and freedom from surveillance.

These benefits highlight the darknet’s potential as a tool for empowerment and positive change, offering avenues for those who prioritize privacy and freedom of expression.

Navigating the darknet is not without its challenges. Accessing and using it requires certain technical knowledge and familiarity with specialized tools and software. Verifying the credibility of information and users can be difficult, increasing the risk of encountering scams and fraudulent activities. The landscape is continuously changing, with new platforms emerging and existing ones shutting down, making it challenging to stay up-to-date. Laws regarding the Darknet vary by region, creating confusion and potential legal risks for users who may inadvertently engage in illegal activities.

Overcoming these challenges requires a proactive approach, continuous learning, and vigilance to navigate safely and effectively.

The darknet is poised to evolve alongside technological advancements and changing societal dynamics. Governments may implement stricter controls and surveillance measures to curb illegal activities, impacting user anonymity and access. Enhanced encryption technologies will bolster security, making it even more challenging for authorities to monitor activities. As mainstream technologies adopt features that prioritize privacy and security, the distinction between the surface web and the darknet may become less pronounced. Innovative platforms will continue to emerge, offering new ways for users to interact and share information securely.

These developments will influence how the darknet is used and perceived, shaping its role in society and the broader internet ecosystem.

The darknet embodies the duality of Halloween—where light and shadows coexist. It offers a space for privacy, free speech, and access to uncensored information while harboring illegal activities and potential dangers. Understanding its structure, the tools required to access it, the content it hosts, and the best practices for safe navigation are essential for anyone venturing into this hidden digital world. Stay informed and cautious to explore its opportunities while safeguarding against inherent risks.


Curious how darknet data could be important to your business? Contact us.

USDoD: Dark Web Threat Actor Arrested

October 29, 2024

The dark web community of those buying, selling, trading and sharing data is extremely active. Dark web sites such as BreachForums and LeakBase are heavily used by threat actors to trade data, ask about what is available and provide links to stolen data. However, some individuals in this community are more active than others, regularly sharing data leaks from high profile organizations, often claiming they have hacked the data themselves or worked with other hackers to make the data available.  

One such threat actor is known as USDoD. He has been very active on BreachForums, sharing multiple leaks and also claiming to be starting his own site to share data. However, it was reported late last week that he had been arrested in Brazil. Here we will review some of USDoD’s activities and what lead to his arrest.  

USDOD has had a profile on BreachForums since July 2023. In that time, he had posted 112 times, created 33 threads and earned a reputation of 891. His profile also states that he had referred 31 people to join the forum. He also won awards as a “leaker,” “hacker,” and “God.”

Figure 1: USDoD’s BF profile which has been banned subsequent to his arrest

While most threat actors active on the dark web tend to try and hide details about themselves, USDoD shared further information on his profile. While this information is likely false, it is notable that any information at all was shared. The profile also provides links to his Telegram channel and his Twitter/X account.  

Figure 2: Additional information provided on USDoDs BF profile 

While many threat actors are active on Telegram, it is unusual that USDoD linked his dark web profile to an open web social media profile. Linking this digital footprint allows investigators more avenues to identify the true identity behind USDOD’s alias.  

USDoD was known to share posts on Twitter/X which would detail his activities such as, visiting family members in hospital and watching the US election debates. While these details could have been shared to throw off researchers, it is still unusual and risky behavior for a threat actor. His Twitter/X account is currently suspended.  

USDoD leaked a lot of data on BreachForums. Some high-profile leaks and data scrapes included: 

  • LinkedIn 
  • InfraGard
  • National Public Database
  • USA Criminal Records
  • Crowdstrike IoC list
  • Gov UK database
  • EPA.gov

Such high-profile targets meant that many governments and law enforcement operators were likely keen to identify and apprehend USDoD. 

Figure 3: List of threads posted by USDoD highlighting his targets 

When BreachForums was seized in early 2024, USDoD posted on Twitter/X that he was planning to create his own forum, hosted on the surface web which would allow users to continue to share data.  

He claimed that this new site would be completely run by him, as he did not trust anyone else. He also outlined the technology he would use, the domains he had registered and how he would operate the site and what information would be allowed on it.  

He stated that he was launching this platform for the good of the community rather than for financial gain. USDoD named the new site BreachNation, and even spent time uploading profile images and media related to the new site.  

Figure 4: Twitter posts from USDOD announcing BreachNation 

Ultimately USDoD backtracked on his promise to launch this site. In a lengthy post on Twitter/X he stated that he did not have the time to run the site in the way that he wanted to. He stated he had a social life to maintain and if he ran this site it would take up all of his time and he would not be able to live his life.  

By this point, BreachForums was back up and running as usual, albeit with some more security to enter the forum. USDoD continued to use BreachForums to share more leaked data.  

Reporting in August 2024 suggested that USDoD had been doxed and that his true identity had been identified. However, no information was identified on the usual dox sites such as Doxbin and Pastebin.  

Chatter quickly stated that the information had come from CrowdStrike, one of the targets of USDoD. A Brazilian news agency stated that they had been leaked a “detailed report from CrowdStrike” which had identified USDoD as a 33-year-old man living in Minas Gerais, Brazil. 

The article further stated that all of the information relating to this individual had already been passed on to Law enforcement Agencies.  

After this article came out, USDoD appeared to confirm that the information shared, and his true identity were correct. He stated that he would be turning himself in for the actions that he had taken.  

Figure 5: USDoD quote confirming his identity 

However, many in the community thought that the information was incorrect and that the information was made up to protect USDoD’s true identity.  

On October 16, 2024, Brazil’s Policia Federal announced that they had arrested a suspect in Brazil as part of Operation Data Breach, who was allegedly responsible for hacking the Federal Police and other international institutions.

In their release, the police went on to state that the suspect had also boasted of several other “cyber invasions” including the hack of InfraGard.  

The community which USDoD seemed very proud to be a part of was quick to spread the news of the arrest, looking for information to confirm if it was true, with some noting that they were wrong to doubt the authenticity of the “dox.”

Figure 6: Chatter on BF related to USDoD’s arrest 

The arrest of the individual behind USDoD highlights Law Enforcement’s continued efforts to counter the spread of stolen information and apprehend the individuals for hacking into organization’s systems on a global scale.  

However, USDoD presents an interesting case given his transparency about his daily life and his seeming indifference to hiding his identity, usually a hallmark of those individuals who operate on the darkweb. The fact that he was willing to confirm his true identity and suggest that he would turn himself over to law enforcement maybe suggests he had become disillusioned with his criminal activities.  

Whatever the case may be, USDoD was a prolific hacker and sharer of sensitive data. His apprehension by Brazilian authorities will contribute to a safer ecosystem until some other actor steps up to take his place. But a message has been sent to the stolen data sharing community that they are not safe from law enforcement action.  


Keep up to date with DarkOwl. Subscribe to our emails!

[Webinar Transcription] Dark Web Influence on the 2024 US Presidential Election

October 25, 2024

Or, watch on YouTube


In this webinar, DarkOwl analysts explore the disinformation landscape on the dark web in the context of the upcoming U.S. presidential election. What emerges is a complex, multifaceted online space characterized by a variety of actors, ranging from nation states to American citizens and U.S.-based conspiratorial political movements. All of the above play key roles in both creating and amplifying mis- and disinformation which has seeped from the deep and dark web onto the surface web, and vice versa. As a number of prominent social media platforms maintain policies of limited disinformation regulation, false narratives previously concentrated on the dark web and alternative social media platforms have become mainstream, thereby gaining traction and reaching greater audiences. Combined, these factors reflect a complex environment in the lead up to the election and highlight the importance of identifying and combatting mis- and disinformation.

Make sure to check out our full report on this topic.

NOTE: Some content has been edited for length and clarity.


Erin: We’re excited to kind of talk about this topic. I’m Erin, I’m the Director of Collections and Intelligence at DarkOwl, and I’m joined by my colleague Bianca who works on all of our investigations and services and has been digging into this topic quite a bit. So obviously, it’s November next week, which I find insane. And we’re just about two weeks out from the election. And there’s a lot of things going on out there on mainstream media, obviously. But we wanted to take a deep dive and see what we’re seeing from our side of things on the dark web. So, with that being said, I think we can dive right in and Bianca, I guess the first question would be:

Bianca: Well, during this election period, as with previous elections and recent years, particularly since 2016, we’re seeing disinformation narratives gaining pretty significant traction. And disinformation, as we know, can play quite a significant role in influencing voters. And much of these false narratives that we’re seeing are originating on the dark web and dark web adjacent spaces, especially Telegram. And so, because of that, in order to get a comprehensive picture of the online disinformation landscape and the role it can play influencing voters, it really is vital to examine the role that the dark web plays in spreading that disinformation.

I think you can basically broadly divide the main groups into two categories. And I’d say that the first one is nation states and then you also have domestic actors. So, starting off with the nation states, two of the main actors we’re seeing are Russia and Iran. Russia of course has a history of leading influence operations against the US as we’ve seen since 2016. Russia’s strategy this year though, it’s worth noting, does seem quite different compared to previous years. Most notably, they really seem to be taking advantage of domestically produced conspiracy theories more and more really this year, as opposed to, as we’ve seen previously from them – creating their own false narratives and then sharing and disseminating those narratives. And I think that shift in tactics is a reflection of the domestic disinformation landscape that we’re seeing right now, where you have these absurd conspiracy theories entering the mainstream and then being viewed by millions of people online. So really, nation states like Russia that are leading these foreign influence operations are recognizing that that’s unfortunately something they can take advantage of these domestically produced conspiracy theories.

Other than Russia moving on with these nation -state actors, we are of course seeing Iran emerging as a key player right now in election influence operations. In the lead-up to November 5th, Iran has already carried out cyber-attacks against election campaigns with the DOJ – just recently announcing the indictment of, I believe, three Iranian hackers for targeting former President Donald Trump’s campaign. Importantly though, Iran is also actively sharing content that like Russia’s, is aimed at sowing discord in the US. And that’s something we’ve seen from Russia, of course, since 2016, increasingly. And for Iran, Microsoft researchers in particular identified these websites associated with Iran that are basically posing as American sources and spreading in disinformation.

So we’ve got Russia, Iran, and continuing on with nation states, we really shouldn’t forget China was also leading its own election -focused influence operations. One of its influence operation campaigns has been active since 2017. And we’ve recently been seeing increased activity from that campaign. But I do want to highlight that researchers do seem to believe that China’s efforts likely will be more restrained compared to Russia and Iran. And they don’t really seem to be aiming to undermine one campaign over another. So whereas you see Russia attempting to undermine Vice President Kamala Harris’s campaign and Iran attempting to undermine former President Donald Trump’s campaign, we’re not really seeing that lean or favoring from China to the same extent. So those are the main nation-state actors.
 
Erin: It’s interesting as well, sorry to interrupt you, but how the landscape has changed since 2016, right? So I saw some reporting with Russia as well that they didn’t necessarily get what they wanted maybe out of the Trump presidency and is that impacting what their goals are and how they’re reacting now. So it seems like as you were just saying, that they’re more trying to focus on just creating that conflict internally in the US, as well as still, promoting Trump, but it’s interesting how they’ve changed their tactic.
 
Bianca: Yeah, that’s a great point. And they’re just continuing to so discord, like that seems to be the number one priority, really, and undermining faith in the election process and undermining faith in democracy. So that’s something we’re still seeing from them. Those are the main nation-state actors to answer your question that are kind of the main players right now in the disinformation landscape.

But I do also want to highlight that second bucket I mentioned that’s domestic actors. And there are US-based individuals and political movements that are generating disinformation related to the election and candidates that we’re seeing right now. For instance, the far-right conspiratorial movement, QAnon in particular, which first appeared in 2017, they seem to have effectively entered the mainstream at this point, and their conspiracy theories are seen across the surface web. And that’s a lot of the disinformation that we’re seeing in the current landscape is coming from these far-right conspiratorial
movements. To answer your question, I’d say those are the two main buckets, the nation-states, but then also domestic actors.

I’d say broadly you can group the main narratives into two groups, two categories. So those that are questioning election integrity and then you have those that are targeting presidential candidates. So, for the first category, you have essentially all of the disinformation that’s questioning election integrity. So unfounded claims of voter fraud, which of course was also a very dominant narrative in 2020, and we’ve seen that narrative persist and enter the mainstream increasingly. And some of those narratives are being amplified by foreign actors, but American citizens themselves are also responsible, I think, for a lot of that amplification. That’s the first category and then the second category broadly is disinformation aimed at undermining either Vice President Kamala Harris’ campaign or former President Donald Trump’s campaign. To give an example, you have Russia spreading disinformation that’s again meant to support Trump and undermine Harris and then at the same time Iran spreading disinformation meant to support Harris and undermine Trump. To give a more specific example, one of the most recent examples of disinformation aimed at undermining a candidacy was this staged video that was created by Russia that falsely accused Governor Tim Walz of sexual misconduct. And that was a story in the news this week. The video has already been debunked, but it nonetheless gained hundreds of thousands of views on Twitter and has been shared on the dark web and on groups in Telegram. So, I’d say those are really the two main categories that we’re seeing right now.
 
Erin: I think with AI and things, it really highlights how videos can be made relatively easily these days that can be shared. And by the time that they’re debunked or shown to be false, the damage is almost done, the genie’s out of the bottle. So definitely concerning, but you just touched on the dark web and Telegram.

Well, to address Telegram, right now we are seeing lots of groups on Telegram, especially far-right ones, that are basically spreading disinformation meant to sway voters. And again, some of that disinformation is coming from nation states. There are Russian news bots in a lot of these channels that are sharing headlines and articles that, again, are false and have no basis in fact. So, like you’ll see RT news, Russian bots, RT news, of course, being Russian funded propaganda. And then you’ll also have some of these same Telegram groups and channels sharing disinformation that’s originating from U.S. based individuals and again, conspiratorial movements like QAnon. So going back to this, the role that domestic actors are playing in addition to nation-states. It’s really interesting that a lot of the conspiratorial content that we’re seeing on spaces like Telegram, a lot of that content is leaking into the surface web. And vice versa, there is a lot of content overlap. And that’s concerning given that there used to be a much clearer distinction between the surface web and platforms, dark web adjacent platforms like Telegram. So, you’re seeing a lot of interaction in terms of the content we’re seeing on both spaces.
 
Erin: I think that’s an interesting point, right? Because we tend to think of the dark web, some dark web adjacent platforms like Telegram where there’s limited oversight, although obviously that seems to be changing at the moment, where people want to hide their intentions and stay anonymous. And with this, we’re really seeing people like move over and have less concern about hiding their identity. Like, how do you see that happening and why do you think that’s happening?
 
Bianca: I think it’s not surprising that we’re seeing, you know, anonymity being weaponized to spread this information, right? It’s more difficult to attribute this disinformation to a specific group, even a nation state or an individual, if they’re remaining anonymous, and that’s not just on the dark web, you know, we’re also seeing the anonymity on the surface web with users on Twitter, now X, spreading disinformation, but kind of hiding their true identity. And that’s become a lot easier on Twitter, especially where the verified checkmarks don’t signify reputability anymore that you just buy the checkmark. And it’s easier to kind of stay anonymous and sell yourself as this reputable source.

I did want to touch back about Telegram, though. I think it’s not surprising that we’re seeing a lot of disinformation there, of course, wanting to flag that just a few months ago in August, the app’s founder was arrested and charged in France in relation to an investigation into criminal activity on Telegram. So, it’s really not just disinformation being shared on the platform. The main concern right now also is violent extremist content and child sexual abuse material that we’re seeing on Telegram. But in terms of disinformation, I think it’s worth highlighting that one of the main concerns about Telegram is the sheer size of the groups and channels there. So, channels don’t have a limit on the number of subscribers and groups can have, I think as many as 200,000 members, which is massive, right? And that scale means that disinformation can very quickly reach large audiences and then gets shared and amplified by these massive groups in over and over and over again. So overall, Telegram is absolutely hosting a lot of the disinformation we’re seeing regarding the election, whether that’s false claims of voter fraud or also disinformation targeting presidential candidates. And that’s definitely something to be concerned
about.
 
Erin: Yeah, and I think we’ve definitely seen Telegram being used in other arenas in that way as well. Israel Hamas is an excellent example of disinformation being shared and even actual news information being shared quicker on Telegram than it is on mainstream media. And someone was asking me earlier this week, actually, if I think what’s next after Telegram now that the CEO’s been arrested and moved on
and I was like, honestly, I don’t think people are going to move or not quickly because there’s too many people in too many groups and they’re too well established that I think it will be difficult for them to move and create that with any of the other apps that are out there, but it’s definitely having an impact I think on
a lot of the things that are going on. So that’s a really interesting insight.

Bianca: Conspiracy theories are effectively significantly distorting the information landscape
right now, in the lead up to the election. And as you noted, a lot of them are gaining a lot of traction. And I think, you know, to give an example, a good example of the prominence of conspiracy theories right now is the information landscape we saw during Hurricane Helene and Milton. So you had far-right groups and individuals who were spreading disinformation claiming that the US government was using weather control technology so that the hurricane would be steered towards Republican voters. And you had, as you noted, of course, prominent figures reiterating these theories. There were politicians and public figures amplifying that conspiracy theory. Former President Donald Trump claimed that hurricane relief funds were being spent on illegal migrants, so having public figures reiterate those conspiracy theories lend them more credence, right, and makes it easier for them to gain traction, even though they are completely false. A lot of these conspiracy theories gained millions of views on Twitter and were reshared by more prominent figures in the Republican Party and also by Twitter’s own CEO, Elon Musk. And a lot of the most viral posts were from far-right individuals sharing often xenophobic and racist conspiracy theories. And so, I think the fact that there are millions of people engaging with this content, on Twitter especially, and amplifying and agreeing with the conspiracy theories is very concerning. And it’s ultimately a reflection of the divisiveness that we’re seeing ahead of the election. What we saw with Hurricane Helene and Milton was effectively the weaponization of tragic events, right? To influence voters ahead of the election. And that weaponization unfortunately worked and reached a massive audience. And it of course also had unfortunately real world implications with meteorologists receiving death threats. So absolutely conspiracy theories are playing a key part in this disinformation landscape right now.

Well, that’s a really interesting question because, of course, no political party is immune to conspiracy theories. But based on the research we’re doing right now, far-right individuals, including public figures or Republican members of Congress are dominating the disinformation landscape right now on the dark web and also on the surface web, importantly, and like I said, there is a lot of overlap in terms of content in both of those places. A lot of the dominant conspiracy theories we are seeing right now are rooted in far-right ideas. So again, for the Hurricane Helene and Hurricane Milton response and information landscape, we saw a lot of conspiracy theories and disinformation aimed at undermining the Biden-Harris administration and the Harris Walz presidential campaign. And on dark web adjacent platforms like Telegram, far-right groups are also dominant in terms of election disinformation. The group spreading significant disinformation and with the largest numbers of subscribers are our right groups as we’ve seen up until now. And that’s consistent with findings as well that that type of disinformation does tend to be particularly prevalent and toxic in that far-right online space.

Turning to left-wing conspiracies, the most prominent one I’d say that we’ve seen up until now was the baseless claim that the July 13th assassination attempt against former President Donald Trump in Pennsylvania was staged by the Trump campaign. And a lot of that chatter surrounding that unfounded conspiracy theory, interestingly enough, was on Twitter, X, rather than on the dark web. Ultimately, no political movement is free of conspiracy theories. But the ones gaining the most traction right now do appear to be far right conspiracy theories.
 
Erin: Yeah, I feel like it seems like the far right are just a lot better at organizing and weaponizing things like social media and telegram and etc. because we did a lot of work to try and balance and see what we could find left-wing group that’s thought of out there talking and you know maybe they’re just better at hiding what they’re saying or maybe they’re not you know doing it in the same way but it’s interesting how it does always seem to lean to that far-right side.

Bianca: Yes, absolutely. For more context, earlier this month, the DOJ announced that they had arrested this Afghan national who was based in Oklahoma City. Like you said, for plotting an attack on election day on behalf of ISIS. And then he was arrested by the FBI for purchasing two AK 37s with his brother-in-law, who was an accomplice, and the suspect admitted that he was going to carry out the attack on election day and expected to die in that attack and go down as a martyr. In terms of his connections to Telegram, the suspect interestingly was very active in pro-ISIS telegram groups and allegedly saved ISIS propaganda, as was noted in the indictment document, to his iCloud account and I believe also to his Google account. So, ISIS propaganda from Telegram. He had also been in contact with an ISIS associate via Telegram who was giving him guidance regarding the upcoming attack that he was plotting. So definitely Telegram connections there and it’s ultimately not that surprising given that Telegram is notorious for being a hotbed or extremist activity, particularly for ISIS. There are lots of pro-ISIS groups there. And not just, of course, pro-ISIS groups, unfortunately, a lot of domestic extremist groups, as I noted, that being one of the main issues leading to the CEO’s arrest recently in France. But absolutely,
the individual had ties to individuals in ISIS,and those connections were through Telegram.
 
Erin: Yeah, it’s interesting how we see this group for really being used in Telegram and how the arrest of the CEO may impact that. I mean, we definitely saw after the announcements that Telegram are going to cooperate with law enforcement and individuals talking about moving to other messaging platforms. As I said, I’m not sure, that they’re all going to move, but I think it’s interesting that they’re having those conversations because Telegram really has been that hotbed and obviously, we’re talking about elections now, but I think you can go to any big event that’s happened or any kind of extremist group and find some kind of telegram footprint for them at the moment.

Well, in 2016, we, of course, had Russia leading extensive disinformation operations against the U.S., also in an effort to interfere with the presidential election, and, as you mentioned, the aim of those campaigns was to sow discord and undermine American democracy, and they used bots and intelligence officers that were masquerading as American citizens to spread this information and again exacerbate divisions. And these operations have not stopped, right? We’re still seeing that activity today. But what’s different now, in 2024 compared to 2016, is that other nation-states have significantly ramped up their influence operations as well, you know, as I mentioned, particularly Iran, and they’re engaging in similar large-scale campaigns, you know, Iran in this election has really emerged as a prominent actor in the current disinformation landscape in the lead-up to November 5th. They’ve already carried out cyber-attacks against presidential candidates, campaigns, they’ve actively disseminated disinformation meant to sow discord among American voters like Russia did in 2016. And you know, as I mentioned, we’ve also seen China similarly amplifying divisive rhetoric and there are Chinese linked influence operations
and campaigns that are spreading disinformation and conspiracy theories.

So, to answer your question, ultimately, this year is quite different from 2016, just in terms of the variety of actors that we’re seeing engaging in large scale influence operations. But also importantly, I think that what’s particularly concerning right now, and especially different from 2016 is the way that, as I’ve noted, conspiracy theories have effectively become mainstream. And that’s really not to say that 2016 was devoid of conspiracy theories. There were, of course, conspiracy theories in 2016 and there will always be conspiracy theories. But the scale of their reach today is on a completely different level. As I mentioned, there are mainstream platforms, particularly X, so not just the dark web, where false claims about presidential candidates and regarding the validity of the election, these conspiracy theories are gaining millions of views. And part of the reason that their It is so significant is that you have US prominent US based individuals that are amplifying those conspiracy theories and allowing it to gain even more traction. And because of that, these conspiracy theories have entered the mainstream and are
not just in the dark corners of the internet anymore. So, I think that’s really the the main difference between 2016 and 2024.
 
Erin: Yeah, I feel like domestically, people are just more emboldened to share their views regardless of if they’re conspiracy theories or even if they’re not, they’re just, I think people are less concerned about the impact that that’s going to have as you say, because on both sides, so many politicians are backing that kind of rhetoric. And as you say, it’s interesting, obviously, we focus on the dark web and
dark web adjacent, that it’s kind of impossible to look at this topic these days without looking at social media, because there’s such an overlap and they interact so much, like the things that are shared on Twitter, and then immediately put onto Telegram and vice versa. And there’s no one policing that or checking that. And the likes of Facebook and Instagram will try and say, this isn’t true or this isn’t verified or read this at your own cost, but Twitter seems to have moved away from doing that a little bit in recent years. And yeah, I think it’s very difficult with the amount of information that individuals are receiving to make sense of everything that’s going around and just the pure, as you say, the sheer size of data and conspiracy theories and things that are being shared now compared to previously. I can see why it’s difficult for people to make a judgment. And as I said earlier, like once these things are out there, it’s really hard to walk them back. There’s a lot of people that however many times you tell them something isn’t true and it’s been debunked, aren’t going to believe you.

Yes, absolutely. It’s very likely that we’ll see a pretty significant increase in disinformation targeting American voters as we get closer to November 5th. Russia, Iran and China are well aware of the fact that their influence operations can have a greater impact closer to the date of the election when they can influence voters. And as individuals have already begun to vote. And US intelligence officials are actually already warning of this increase. There were reports stating that influence operations targeting specific political campaigns have already increased. I think it’s really important to note, though, that foreign influence operations aren’t going to stop after November 5th. And the ODNI actually just released a report, I think yesterday, warning that Russia, China, and Iran are all expected to continue their influence operations well through inauguration day. And it’s very likely that they’ll continue spreading disinformation again meant to sow discord among Americans and to undermine trust in the election process. And that’s something we already saw with the presidential election in 2020. Election officials and intelligence officials have particularly warned that there’s a possibility that Russia, Iran and China could actually try to stoke post-election violence. So that’s something that definitely needs to be closely monitored. But yes, we’re expecting to see an increase in that kind of activity leading up to November
5th, but also well after November 5th up until inauguration day.

I think the most important step and the quickest one, at least for individuals, to combat disinformation and this it seems very simple but it’s to verify sources. So before sharing or reposting anything online, just taking a few minutes to check the credibility of the source and also take the time to cross reference and see if you can find another source that’s also a reputable or sharing the same information. So if you can cross-reference, there’s a greater likelihood that that information is valid. For organizations, I’d say carrying out fact-checking initiatives already is vital. Social media platforms, it’s worth noting, have the ability to give users the opportunity to report disinformation. And that’s huge. But Twitter, again, coming back to Twitter unfortunately removed a feature that allowed users to report misinformation and disinformation. So, bringing that back that feature, I think, and for other organizations and social media platforms implementing that features is a pretty vital first step to combat election related disinformation.
But yeah, fact checking in general and verifying your sources is the way to go.
 
Erin: I think knowing where something came from and make sure that it’s not just circular reporting. Everything is coming from one place. Usually, you know, a place that may not be that legitimate is such an important thing to do. And I think having discussions about that. So just going back to the dark web briefly, I think we’ve talked about how there’s a lot of crossover that’s going to mainstream social media sites. Would you say that there’s anything specific on the dark web relating to elections? I know like in the past, we’ve seen things related to like voting machines and hacking. And you know, DEF CON is famous for having their hacking village. Have we seen an increase in that kind of discussion or not really? Absolutely, seeing a lot of narratives about kind of questioning election integrity, like you said, voting systems.
 
Bianca: Absolutely, a lot of that on the dark web and on telegram channels, especially in a lot of these channels that have as many as, you know, and groups that have as many as 200,000 subscribers. Again, a lot of them are aimed at undermining confidence in the election process in the U.S. and sowing discord. So definitely seeing those conspiracy theories dominant on Telegram, but as you noted as well, you really can’t look at it in the vacuum, right, because a lot of those disinformation narratives are also being seen on mainstream platforms. So, it’s interesting that we’re seeing this kind of dialogue between the two spaces and that theories that previously would have probably been limited to the corners of the internet as it were are now very much so in the mainstream. And it’s sometimes even hard to identify where they first originated? Just because of the fact that we’re seeing them all over the place, all these
conspiracy theories.
 
Erin: Yeah, absolutely. And I think that’s the thing I think on the dark web, the more things that we see are the traditional dark web things that you see people doing, like talking about hacking, or talking about, you know, leaking voter information or information that could be used relating to voters. That’s the dark web bread and butter whereas you know outside of things like Telegram I’m not sure that people are using the dark web for those kinds of conversations because they don’t need to they can do it on mainstream platforms without fear of you know reprisal so it’s a really interesting shift I think that you’re highlighting.

Well, just highlighting again I’m glad that you asked the question about things people can do to combat disinformation and just flagging again the importance of verifying sources. There are lots of great sources online as well from CISA on step selection officials can take to ensure to ensure that we’re combating disinformation right now. Organizations and individuals can do a lot to combat this rise in misinformation and disinformation that we’re seeing right now. Thank you all for joining this webinar.
 
Erin: That just made me think as well – I was at some sessions recently where I feel like you can’t have a dark web or an OSINT or a chat these days about mentioning AI. And I just feel like these days with the way AI is improving and deep fakes in terms of generating stories and generating videos and generating images is just something people that need to be so aware of and goes back to your point about really validating those sources because things can look so believable these days in a way that they couldn’t several years ago. So I think that’s an interesting point as well.


Interested in reading more on this topic? Check Out Our Research Report.

Q3 2024: Product Updates and Highlights

October 23, 2024

Read on for highlights from DarkOwl’s Product Team for Q3, including new exciting product features.

Website Mentions

The team is thrilled to announce that one of our most requested features from clients went live this quarter! Website Mentions is now a feature extraction in our dataset, which provides more inclusive searching and monitoring for domain results. This helps you surface more results when you search—such as results with subdomains as well as domains within URLs. 

Enhanced searching features are available in Vision UI and Search API, including:

  • New Search Tools and search options
  • Updated Filter values
  • Website field included on search results

Additionally, Score API and Ransomware API have been adjusted to use our new Website Mentions feature extraction for increased domain detection.

Password Detection and Classification Updates

We’ve improved our password detection, which identifies more password formats within our data collection, as well as password classification, which identifies whether it is plaintext or hashed. Now, users can see more passwords associated with email addresses than ever. This feature is available in our Vision UI and Entity API.

Actor Explore and Actor API

Based on customer feedback, we’ve added Country Targeted and CVEs as filters on the main Actor Explore page. Recently updated actor dossiers include IntelBroker, USDoD, ShinyHunters, and yalishanda.

Actor API is now available as an add-on option for All-Data-and-Context subscriptions. This allows you to programmatically retrieve all information contained within our actor dossiers. The Actor Summary endpoint allows customers to see what actor dossiers are available in our database.

Explore Training Guides

This quarter, we launched in-app training guides for our Explore section. These complement and expand on our previous Basic Onboarding guides. We walk through all the features in the Actors, Entity, and Leaks sections, showing exactly what to click on. Explanations and tips arm you with all the details you need to get started with these sections.

Query Builder and Template Additions

The new Company query builder makes it easy for users to search for both their company name and company domain in one search. To access, go to the Search Tools menu, and select Query Builders. There, you can select Company, and fill in the two fields.

Site Context for Forums

Site Context is information from the DarkOwl analyst team that gives additional enrichment about search results. This includes the Site Name and any aliases, and may include relevant dates or other information. Where available, options to pivot to Actor Explore, or to pivot to search associated Telegram channels will be present. We initially rolled out this feature for Ransomware sites, and this quarter we’ve expanded it to Forums.

Highlights

This quarter was another one of growth in data collection. The team had 18% growth in credit card numbers, 11% increase in unique crypto wallets, a 14% growth in total collected Tor documents and another 14% growth in total collected records from Telegram – just to highlight a few. 

When your search results are from data leaks, users can review additional information curated by DarkOwl analysts, giving you enrichment on the data leak. The descriptions below are all available in our Leak Context product feature.

LeakBase.io

Data purported to be from LeakBase was posted on Nulled, a hacking forum, on August 10, 2024. According to the post, this is a scrape of the site and contains data on 78,540 users. Data exposed includes user identification numbers (UID), usernames, number of messages, and reaction scores.

National Public Data

Data purported to be from National Public Data (NPD) was posted on BreachForums, a hacking forum, on August 6, 2024. According to the post by threat actor Fenice, the full NPD database was breached by SXUL. Data exposed includes full names, dates of birth, physical addresses, phone numbers, and Social Security Numbers.

Crowdstrike IoC list

Data purported to be from CrowdStrike was posted on BreachForum, a hacking forum, on July 28, 2024. According to the post, UsDoD claims to have the entire IoC (Indicator of Compromise) list from Crowdstrike but only released the first 100,000 records. Data exposed includes indicators, types of malware, actors, reports, kill chains, published dates, latest updates, and labels.

trello.com

Data purported to be from Trello was posted on BreachForums, a hacking forum, on July 16, 2024. According to the post, Trello had an open API endpoint that allowed unauthenticated users to map an email address to a Trello account. Data exposed includes email addresses, names, profile data, user identification numbers (UID), and usernames.

Neiman Marcus

Data purported to be from Neiman Marcus was posted on BreachForums, a hacking forum, on June 27, 2024. According to the post, ShinyHunters breached the Neiman Marcus Group Inc. in May 2024, claiming that the leak contained data on more than 40 million customers, including 29.7 million unique email addresses. Data exposed includes customer account balances, credit cards, dates of birth, gift cards, IP addresses, full names, payment histories and methods, phone numbers, and physical addresses.


Curious how these features and data can make your job easier? Get in touch!

The Rising Tide of Phishing: Exploring Emerging Threats Beyond Email

October 18, 2024

Phishing-related attacks remain a highly effective method used by actors to gain initial access to victims’ environments. Despite increased efforts in cybersecurity education, phishing attacks continue to rise, posing a threat to individuals and organizations alike. According to IBM’s 2024 Threat Intelligence Index Report, initial access due to phishing increased from 30% in 2022 to 41% in 2023. DarkOwl regularly collects discussions on the dark web where bad actors share TTPs (tactics, techniques, and procedures) to perform more sophisticated phishing-related campaigns, some of which we will highlight below.

In the early days of phishing attacks, bad actors simply used emails with malicious links to lure their victims into exposing their credentials. Although this is still very prevalent, these techniques are quickly evolving as threat actors adopt adjacent styles of phishing, like voice phishing (vishing), SMS phishing (smishing), QR code phishing (Quishing), deepfake phishing (AI phishing), and more. It’s important to understand how these attacks are evolving and how threat actors are adjusting their approach to increase the likelihood of success.

Voice Phishing (Vishing)

Vishing is one of the most common forms of social engineering used by threat actors. This method can be highly effective because, unlike traditional email phishing, communicating over the phone (or voicemail) adds a psychological trust element, boosting immediate credibility. A charismatic, personable, professional, or sincere caller can more easily trick a victim into providing sensitive details over the phone.

This tactic becomes even more difficult to prevent or identify due to how easily accessible VoIP (Voice over IP) software is, which enables anyone to spoof any phone number. This allows attackers to mimic the phone number of the entity they are impersonating, making their scam appear even more legitimate. Instead of targeting a specific individual, actors also use automated robocalls to reach thousands of potential victims around the clock. Like phishing emails, this method relies on the “it only takes one” strategy to make the fraud successful.

In 2020, a U.S. federal court indicted an India-based VoIP company on charges related to robocalls originating from their servers that impacted American victims. These robocalls were estimated to be in the tens of millions and resulted in losses of 20 million dollars.

SMS Phishing (Smishing)

Very similar to Vishing, is Smishing which also focuses on mobile devices to lure potential victims into gaining trust and exposing sensitive data. This attack vector also has much in common with traditional Phishing because malicious links are the primary source of exposure. Whether it’s a claim for a digital coupon, a USPS tracking code, or an Amazon shipment update, the actor wants to direct you to another page that entices you to provide your credentials or other sensitive data.

With the 2024 presidential election rapidly approaching, the United States has seen a surge in smishing messages involving fake voter registration pages. According to a recent CBS News report, these text messages claim to provide forms to register to vote online. This dangerous trend highlights the significant impact mass smishing campaigns can have on the public if malicious actors are able to tamper with, misuse, or impersonate citizens’ voter registration data.

Shameless Plug: If you haven’t registered for our webinar on Dark Web Influence on the 2024 U.S. Presidential Election, make sure to register!

QR Code Phishing (Quishing)

Although not as common as other phishing methods, quishing has been observed in the wild to trick victims into navigating to malicious links or downloading malware. A QR code can embed any text or data, with capacities of up to 4,296 alphanumeric characters or 2,953 bytes for binary data, encoded into a digital square. This means bad actors can devise creative and novel ways to lure someone into believing the content is genuine, such as placing malicious QR codes over legitimate ones in public places or online. For this reason, it’s vitally important to use a QR code scanner that provides you with a visual of the URL or data before you interact with it.

The following excerpt, discovered on DarkOwl’s Vision platform, showcases a dark web conversation in which the author explains how QR code exploitation occurs in the wild.

Figure 1: Two criminals putting fake QR codes over the ones on carparks, pub tables and EV charger points that redirect to a lookalike site and steal your credentials; Source: DarkOwl Vision

Deepfake Phishing (AI Phishing)

A more theoretical type of phishing tactic, not yet widespread, involves the use of artificial videos, photos, and audio—also known as deepfakes or AI phishing. Security researchers have explored potential ways actors could utilize these new forms of technology to perform malicious actions, but thus far, the impact has not materialized at a large scale. However, as this technology becomes cheaper, harder to detect, and more accessible, it is likely to become a popular mode of exploitation.

The implications of this attack are not difficult to imagine. In a Financial Times article, UK banks were cited as already grappling with how to best handle Know Your Customer (KYC) regulations, voice impersonation attacks, and other types of AI impersonation tactics that could impact global finance, as well as individual customers.

As phishing attacks continue to evolve beyond traditional email scams, it’s important for individuals and organizations to stay informed of the tactics cybercriminals employ. From vishing and smishing to quishing and deepfake phishing, threat actors are constantly adapting their methods to exploit new technologies and vulnerabilities.


Keep up with the latest from DarkOwl. Follow Us on LinkedIn.

What are Drainers as a Service?

October 16, 2024

Cybersecurity might as well have its own language. There are so many acronyms, terms, sayings that cybersecurity professionals and threat actors both use that unless you are deeply knowledgeable, have experience in the security field or have a keen interest, one may not know. Understanding what these acronyms and terms mean is the first step to developing a thorough understanding of cybersecurity and in turn better protecting yourself, clients, and employees.

In this blog series, we aim to explain and simplify some of the most commonly used terms. Previously, we have covered bullet proof hostingCVEsAPIs, and brute force attacks. In this edition, let’s dive into Drainer as a Service.

Drainers as a Service (DaaS) is a disturbing evolution that makes sophisticated financial fraud accessible to even low-skill criminals. In this blog, we’ll explore what DaaS is, how it works, and why it’s becoming a growing concern in the cybersecurity world.

Drainer as a Service 101

A drainer refers to a malicious tool designed to drain cryptocurrency or traditional financial assets from a compromised account, wallet, or online platform. These tools target everything from crypto wallets to bank accounts and e-commerce platforms, allowing attackers to steal funds quickly and anonymously.

Drainers simplify the process for cyber criminals so you need not be sophisticated in able to use them. This makes this type of fraud much more accessible and easier for individuals on the dark web with very few skills to conduct these types of attacks.  

Drainers can operate in a number of different ways, they can be deployed as part of a phishing kit which will steal users credentials to access their accounts as well as malware which can be deployed to track and collect information about a user’s financial transactions. Depending on how the drainer, they can also automatically “drain” the funds from a victims account, sending them to an account/wallet designated by the threat actor.

Due to the automated nature of drainers, it means that criminals can target large numbers of victims at once. This makes this type of fraud highly profitable.

However, there are threat actors and groups that are also offering the use of drainers as a service. This means that they are selling the tools for others to use. This allows others to purchase, on the dark web, drainers on demand. They will also often be accompanied by support for any issues as well as tutorials on how to use the tools. In this way cyber criminals have commoditized Drainers, selling them much like a legitimate company would sell software.

Providing Drainers as a Service means that the providers are able to profit from this type of activity without directly participating in financial fraud. However this doesn’t make it any less illegal.

Figure 1: Source: DarkOwl Vision

Criminals will advertise their drainer on dark web forums and Telegram and offer subscriptions to the service, this allows them to get access to the tools, the updates that are made as well as support.

Figure 2: Subscription for drainer advertised on carding forum

It is also possible to purchase the tool direct. However criminals prefer to offer this as a service or an affiliate program as this means that they can charge a commission on the funds that are stolen by the buyer or affiliate.

Figure 3: Drainer for sale with commission

Often, Drainer tools will only work with certain cryptocurrencies or wallet types, which can restrict how they can be used. Although some providers will offer customization as part of their service so the buyer can use it as they wish.

Figure 4: Advertisement for Drainer which only works with certain wallets; Source: DarkOwl Vision

Although most drainers do target cryptocurrency, as it is commonly used on the dark web and the transactions are always digital in nature. However, Drainers are also traded on the dark web which are designed to target traditions bank accounts.

Figure 5: Chat with users asking about bank drainers; Source: DarkOwl

The rise of DaaS poses a significant threat to both individuals and organizations. As these tools become more widespread, even unsophisticated attackers can cause substantial financial damage. Cryptocurrency holders, in particular, are at risk, as crypto wallets are often less regulated and less secure than traditional banking systems.

As these services become more prevalent, it is crucial for individuals and organizations to stay vigilant, adopt best security practices, and remain informed about the latest threats.


To see DarkOwl Vision and our collection in action, contact us.

2024 U.S. Presidential Election Disinformation on the Dark Web

In a September 04 press release, the U.S. Department of Justice (DOJ) announced it had seized 32 domains used in Russia’s ongoing foreign influence operations. In addition to efforts to reduce international support for Ukraine and amplify pro-Russian propaganda, the campaign also aimed to influence voters in the upcoming U.S. 2024 presidential election. Since its alleged targeting of the 2016 election, Russia has continued to bolster its disinformation operations in an effort to secure its “preferred outcome in the election.”  Russia is not alone, however, in its endeavors; Iran and China, too, appear to have ramped up influence operations against the U.S.  

In this report, DarkOwl analysts explore the election disinformation landscape on the dark web. What emerges is a complex, multifaceted online space characterized by a variety of actors, ranging from nation states to American citizens and U.S.-based conspiratorial political movements. All of the above play key roles in both creating and amplifying mis- and disinformation which has seeped from the deep and dark web onto the surface web, and vice versa. As a number of prominent social media platforms maintain policies of limited disinformation regulation, conspiracy theories previously concentrated on the dark web and alternative social media platforms have become mainstream, thereby gaining traction and reaching greater audiences. Combined, these factors reflect a complex environment in the lead up to the election, and highlight the importance of identifying and combatting mis- and disinformation. 


Have any questions for our team? Interested in learning how our analyst team can help your research and investigations? Contact us.

Copyright © 2024 DarkOwl, LLC All rights reserved.
Privacy Policy
DarkOwl is a Denver-based company that provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data. We shorten the timeframe to detection of compromised data on the darknet, empowering organizations to swiftly detect security gaps and mitigate damage prior to misuse of their data.