Computer Security Day: Safeguarding Your Digital Life in the Age of the Dark Web

December 04, 2024

November 30th marked Computer Security Day, a reminder to individuals and organizations about the importance of protecting digital assets and maintaining online safety. In an era where cyber threats are increasingly sophisticated, the dark web plays a pivotal role in facilitating cybercrime. This year, let’s explore Computer Security Day through the lens of the dark web, highlighting the critical need for vigilance in a digitally interconnected world. 

The dark web is a part of the internet that requires specialized tools, such as TOR, to access. While it has legitimate uses, it is notorious for hosting illegal marketplaces, forums, and platforms that trade in stolen data, hacking tools, and other illicit goods. Cybercriminals leverage the dark web to: 

  • Sell stolen personal information (e.g., credit card numbers, passwords, and Social Security numbers). 
  • Distribute malware and ransomware. 
  • Share hacking tutorials and exploit kits. 
  • Launch coordinated cyber attacks against businesses and governments. 

This criminal ecosystem thrives on the vulnerabilities in computer systems, making Computer Security Day more relevant than ever. 

There are many activities on the dark web which exploit computer vulnerabilities. Each of these can cause serious ramifications for organizations so it is important to monitor for these threats and ensure your systems and employees are secure. Some examples of dark web activities to be aware of on Computer Security Day and beyond.  

Data Breaches and Identity Theft 

Stolen data is a commodity on the dark web. Following a data breach, personal and financial information is often listed for sale, enabling identity theft and fraud. (All of the examples below are from DarkOwl Vision) For example: 

  • Credit card details are sold for as little as $10
  • Social media credentials can be bought for under $5 

Once your information is exposed on the dark web, it becomes nearly impossible to reclaim control without proactive security measures. 

Hacking Tools for Sale 

The dark web acts as a one-stop shop for cybercriminals. Tools like keyloggers, phishing kits, and zero-day exploits are readily available, lowering the barrier for entry into cybercrime. Despite some time appearing simplistic in nature, these tools and tried tested and can be very effective in allowing unsophisticated users to achieve maximum disruption.  

Ransomware as a Service (RaaS) 

Ransomware attacks, which encrypt victims’ data until a ransom is paid, are increasingly being offered as “services” on the dark web. This enables even non-technical criminals to launch devastating attacks. It is also used as a way to shame victims, posting samples of data onto Ransomware leak sites and opening organizations in the supply chain to further attacks.  

On Computer Security Day, taking proactive steps to secure your digital presence is crucial, especially given the risks posed by the dark web. Here’s how you can protect yourself and your organization: 

  • Monitor the dark web for activity 
    • Monitor the dark web for your organizations assets to ensure they are not being shared without your knowledge 
    • Monitor activities of dark web actors to stay ahead of trends and activities.  
  • Strengthen Your Passwords 
    • Use strong, unique passwords for every account. 
    • Enable multi-factor authentication (MFA) wherever possible. 
  • Monitor Your Digital Footprint 
    • Use tools like dark web scanners to check if your data has been compromised. 
    • Regularly review online accounts for unauthorized activity. 
  • Update and Patch Systems 
    • Keep your software, operating systems, and antivirus programs up to date. 
    • Apply patches to fix vulnerabilities that hackers could exploit. 
  • Be Vigilant About Phishing 
    • Avoid clicking on suspicious links or downloading unknown attachments. 
    • Educate yourself on identifying phishing attempts. 
  • Secure Your Network 
    • Use a virtual private network (VPN) to encrypt your internet traffic. 
    • Invest in a robust firewall to protect against unauthorized access. 

Computer Security Day reminds us that cybersecurity is everyone’s responsibility. Whether you’re an individual or part of a multinational corporation, your actions can help prevent the dark web from profiting off cybercrime. This includes reporting suspicious activity, supporting ethical tech initiatives, and staying informed about emerging threats. 

While the dark web continues to challenge cybersecurity professionals, advancements in technology, collaboration between law enforcement agencies, and public awareness campaigns are critical steps toward mitigation. By taking the lessons of Computer Security Day to heart, we can create a culture of digital security that limits the power of the dark web and its associated risks. 


Curious about darknet data? Contact us.

Threat Intelligence RoundUp: November

December 02, 2024

Our analyst team shares a few articles each week in our email newsletter which goes every Thursday. Make sure to register! This blog highlights those articles in order of what was the most popular in our newsletter – what our readers found the most intriguing. Stay tuned for a recap every month. We hope sharing these resources and news articles emphasizes the importance of cybersecurity and sheds light on the latest in threat intelligence.

1. Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel – The Hacker News

The advanced persistent threat (APT) WIRTE, believed to be associated with the Hamas-affiliated Gaza Cyber Gang, has expanded its cyber operations to target Israeli entities. The threat actor was previously engaged in espionage operations targeting the Palestinian Authority, Jordan, Iraq, Saudi Arabia, and Egypt. Full article here.

2. Russian Espionage Group Targets Ukrainian Military with Malware via Telegram – The Hacker News

On October 28, Google’s Threat Intelligence Group released a report exposing a suspected hybrid Russian espionage and influence operation targeting the Ukrainian military. As highlighted in the report, the campaign—being tracked as “UNC5812”—utilizes a Telegram persona named “Civil Defense” to deliver malware to its targets. The Telegram account claims to be a “provider of free software programs designed to enable potential conscripts to view and share crowdsourced locations of Ukrainian military recruiters.” In addition to delivering malware, UNC5812 is also carrying out an influence operation intended to undermine support for Ukraine’s mobilization efforts. Read more.

3. U.S. government employee charged in leak of Israel’s plans to attack Iran – CBS News

The U.S. Department of Justice (DOJ) has charged Asif W. Rahman—who was formerly employed by the Central Intelligence Agency (CIA)—for allegedly leaking highly classified U.S. intelligence documents regarding Israel’s plans for a retaliatory strike against Iran. Rahman was charged with “two counts of illegal transmission of national defense information.” Article here.

4. New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers – The Hacker News

Researchers have identified a new Android banking malware dubbed “ToxicPanda” that has already infected over 1,500 devices. Though initially believed to be associated with the TgToxic banking trojan family, analysts at Cleafy Threat Intelligence have identified “significant differences in the campaign’s code,” which has prompted the Cleafy team to track the new family as ToxicPanda. Read article.

5. Hacker gets 10 years in prison for extorting US healthcare provider – Bleeping Computer

In a November 13 press release, the U.S. Department of Justice (DOJ) announced that 45-year-old Robert Purbeck from Meridian, Idaho, was sentenced to 10 years in prison “for hacking into the computer servers of 19 victims across the United States.” Purbeck also stole the personally identifiable information (PII) of more than 132,00 individuals and was found to have engaged in multiple attempts of extortion. Full article here.

6. Redline, Meta infostealer malware operations seized by police – Bleeping Computer

On October 28, the international law enforcement task force “Operation Magnus” disrupted the RedLine and META infostealer operations. The task force consisted of the Dutch National Police as well as authorities from the U.S., U.K., Belgium, Portugal, and Australia. As highlighted in a press release from the European Union Agency for Criminal Justice Cooperation (Eurojust), RedLine and META had targeted “millions of victims worldwide,” making them two of the most prevalent infostealers in the world. Full article.

7. Phishing emails increasingly use SVG attachments to evade detection – Bleeping Computer

Cybersecurity researchers have observed threat actors using Scalable Vector Graphics (SVG) attachments in phishing emails to evade detection. The SVG image format uses XML-based code rather than pixels to create an image; this format allows the attachments to bypass email protections and thereby distribute malware. As highlighted by BleepingComputer, threat actors are able to create SVG attachments that “not only display images but also create phishing forms to steal credentials.” Read more.

8. Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps – The Hacker News

Researchers at FortiGuard Labs have identified instances of the advanced malicious framework “Winos 4.0” being hidden in gaming-related applications. These have included “installation tools, speed boosters, and optimization utilities.” Winos 4.0 was previously observed being used in the campaigns “Void Arachne” and “Silver Fox,” as documented by Trend Micro and the KnownSec 404 Team in June. Read article.

The DOJ has announced the indictment of two suspected hackers—Connor Riley Moucka and John Erin Binns—for hijacking Snowflake cloud storage accounts to steal data. As many as 165 Snowflake customers may have been impacted by the hackers’ operations. As noted in the indictment, Moucka and Binns used stolen access credentials to gain access to the victims’ Cloud Computing Instances and to download data. Read more.


Make sure to register for our weekly newsletter to get access to what our analysts are reading on a weekly basis.

Your Data Was Leaked – Here’s What to Do Next to Protect Yourself

November 26, 2024

Unfortunately, data leaks have become a part of life, with almost all people’s data being released in a leak in some form. As more and more of our data and information is held on digital platforms, the risk of it being exposed increases. Vulnerabilities mean that both large and small companies that hold our data can be subject to a hack and data being leaked.

Although there are limited actions that can be taken to secure our data, with that responsibility falling to the companies that store our data, it is important to know what actions can be taken when data is leaked to protect people and organizations and minimize the damage.

It is important to note that once data appears on the dark web it cannot be removed, and there is no way of knowing who has access or has accessed that information. However there are actions that can be taken to mitigate risks when your data appears in one of these leaks.

An important first step is actually knowing that your data has been leaked whether personal information or your corporate information. It is important that you are monitoring all PII (personally identifiable information) to identify if it appears in a leak, and if it does what leak it appears in and what information has been exposed.

It is also important to confirm if the details of the leak are correct, what was the source of the leak and what types of data are exposed? Leaks are often reported in the media, by the company themselves usually for regulatory purposes or through leak monitoring services. You should identify what sensitive information has been exposed whether it be an email address or social security number. This can help you focus on securing your most at risk data.

DarkOwl Vision allows you to monitor all of your company’s assets to identify if they have appeared in a data leak. Our Leak Context feature will provide details of the leak, where it was sources and if it has been confirmed.

Figure 1: Example of Leak Context feature

If your passwords are exposed, and maybe if they aren’t, a good step to ensure your accounts are secure is to update your passwords. A company should have a good password policy that means that passwords are updated regularly. Even if it has been identified that a password hasn’t been exposed, it should still be changed immediately.

When reviewing your password policy, whether in response to a leak or as a good security practice the following things should be considered:

  • Use a Strong Password – A strong and unique password should be used for each of your accounts
  • Do not reuse passwords – A unique password should always be used
  • Enable Two-Factor Authentication (2FA) – Where possible ensure you make use of 2FA. Authenticator apps are more secure that One Time Passwords (OTPs)
  • Make use of Password Managers – PMs can ensure that you generate complex and use unique passwords.
Figure 2: Time to Crack Passwords of Varying Degrees of Character Length and Complexity

Especially if a leak includes financial information, you should freeze your credit report. This is also true if sensitive information such as your social security number is exposed. It is best practice to keep your credit report frozen unless you need to use it yourself.

You should also review and monitor your bank and credit card statements to ensure no suspicious transactions take place. Any identified issues should be reported immediately.

The information which appears in leaks can be used to make phishing scams more believable. It can also be used to target individuals who may be associated with a target organization. As AI matures, it is more likely that phishing messages will become more convincing and more difficult to spot. However people should be on the lookout for the following:

  • Any messages which ask for personal information
  • Include attachments or links
  • Urge you to take immediate action
  • Ask you to make any kind of payment

If you think an email or SMS is suspicious always attempt to verify the legitimacy by contacting the alleged sender. You should do this directly not in response to the message.

Figure 3: Example of an unclaimed asset scam email claiming that the recipient was entitled to property from either inheritances, or from unallocated government holdings

While phishing attacks are the most likely threat to occur when data is leaked there are other threats that individuals should be aware of.

Variations of phishing attacks are smishing and vishing. If a phone number is leaked you may become a more likely target for these types of attacks.

As mentioned above in relation to credit freezes, if financial information is leaked you are much more likely to be a victim of financial fraud. This can happen at both the personal and organizational level so it is important to be vigilant for any changes in your finances as well as the possibility of identity theft.

If an organizations network information is exposed, such as private domains, IP addresses or admin credentials are exposed this can leave organizations more vulnerable to hacking attempts. Any data leaked relating to the organizations security or infrastructure should be immediately reported to the cyber security and incident response teams so they can take effective mitigation actions.

If your data is exposed, it is best practice to ensure that all of your accounts are secure, not just the one associated with the data leak. As passwords are often reused and email addresses used across multiple accounts your information could be used to target multiple accounts.

You should also check your privacy settings across all accounts, sometimes information used in phishing attacks and other social engineering attacks can be obtained through data brokers or from social media accounts. You should therefore ensure on all accounts that unnecessary access is revoked and make sure that your accounts are either private or if you need to share information make sure you know what information is being shared and limit this where possible.

For organization that identify their information or their employees information has appeared in a leak, it is important to make sure you inform people of what data has been exposed and what implications this may have for them. It’s important to reassure clients, partners, and employees that you’re addressing the breach and safeguarding their information. Include these elements in your communication plan:

  • Notify Key Stakeholders –  Share essential information with those affected, including an explanation of the breach, the data involved, and recommended steps for safeguarding their own data.
  • Provide Reassurances –  Explain any steps the organization is taking to mitigate the impact, such as enhanced security measures or support resources.
  • Outline Remediation Steps –  If offering credit monitoring, cybersecurity resources, or identity theft protection, make it clear how stakeholders can access these services

In some cases, it may be prudent to have a plan in place for if your organization’s data appears in third party data leak. This will not be required in every case and will depend on which leak data appears in and what data is exposed.

Responses to leaks can be part of an overall Incident Response Plan, mitigating actions that can be part of these plans when it comes to leaks are:

  • Assemble a Response Team –  Bring together key internal stakeholders, including IT, legal, risk management, and PR teams.
  • Engage with the Third Party –  Ensure open communication with the vendor to receive continuous updates and understand what actions they’re taking to address the breach.
  • Coordinate with Legal and Compliance Teams –  Confirm the legal obligations that apply to data exposures resulting from third-party breaches, such as notifying regulatory bodies and customers.

Legal and regulatory compliance is essential when dealing with third-party breaches. Ensure your response is aligned with data protection regulations that apply to your business and industry, such as GDPR, CCPA, or HIPAA. In many cases, your organization is responsible for notifying affected parties, even if the breach occurred due to a third-party vendor.

  • Consult Legal and Compliance Experts –  Engage your legal team to understand notification requirements and determine if the breach must be reported to regulatory bodies.
  • Document Your Response –  Maintain thorough documentation of all actions taken in response to the breach, including communications with the third party, incident assessments, and mitigation measures. This can protect your organization if regulators review your actions later.

It is also important that organizations provide regular cyber security training to their employees to ensure that they understand how they should be protecting both their personal and corporate data. This training can also advise individuals on what action should be taken should their information be leaked and what risks they should be on the lookout for and how to mitigate them. All employees should understand how to handle corporate data securely and what to do if they notice suspicious activity.

While data leaks are alarming, having a plan can make a big difference in minimizing their impact. By acting quickly and taking the necessary steps to protect your or your organization’s information, you can significantly reduce the potential risks to finances and privacy.

Data breaches involving third-party vendors pose unique challenges, but with a proactive approach, organizations can mitigate the impact. By responding swiftly, communicating transparently, and strengthening security practices, organizations can protect thier data, reputation, and relationships with stakeholders

Stay vigilant, be proactive about security, and take charge of your or your organization’s digital footprint—it’s the best defense against future breaches.


Learn how access to darknet data can help your organization stay safe. Contact us.

Beware of Black Friday Scams: Protecting Yourself in the Online Shopping Frenzy

November 20, 2024

As Black Friday approaches, the excitement for holiday shopping fills the fall air. Countless look forward to and save all year for the unbeatable deals, seasonal savings, and frenzied shopping experience. Yet there is a dark side of this retail bonanza which often goes unnoticed. Just as shoppers flock to stores for discounts, scammers are ready to exploit the rush. With an increase in online shopping, especially post-pandemic, the risks of falling victim to Black Friday scams have never been higher. 

Black Friday, traditionally the day after Thanksgiving, marks the beginning of the holiday shopping season. It has transformed into a global phenomenon, with retailers offering massive discounts both in-store and online. According to the FBI’s internet Crime Complaint Center (IC3), reports of online fraud make a significant spike during this global phenomenon. In 2022 the IC3 reported over 800,000 complaints related to various forms of internet crime, with significant losses attributed to online Black Friday shopping scams. 

The Federal Trade Commission (FTC) noted that in 2022, Americans lost approximately $1.3 billion to online scams, with a substantial portion occurring during the holiday shopping period. As consumers scramble for the best deals, scammers capitalize on their urgency and excitement, creating the breeding ground for fraud. This number has only gone up since 2022 and FBI’s annual internet crime report indicated that in 2023 there was a 22% spike in losses from online scams. 

Understanding the different types of common scams prevalent during Black Friday can help consumers recognize potential threats 

Phishing Emails and Fake Websites

Scammers will often send emails that appear to be from legitimate retailers, offering unbelievable deals. These emails may contain links to counterfeit websites designed to steal personal information, such as credit card numbers and login credentials. According to ProofPoint, phishing attempts increase by nearly 200% during the holiday season. Be wary of unsolicited emails, especially those urging you to click links of provide sensitive information. Go directly to the company websites and see if the deals are available there. 

Figure 1: Walmart phishing site deployed in Brazil, Source: phishtank.org

Counterfeit Products

As shoppers seek discounts, some may fall victim to fake retailers selling counterfeit goods. Whether it is electronics, clothing, or popular toys, scammers often advertise products at prices that seem too good to be true. The National Association of Secretaries of State (NASS) reports that counterfeit goods lead to billions in losses every year. This only amplifies during the high-demand season. Before making a purchase always research the seller and check for reviews before clicking that “purchase” button. 

Figure 2: Counterfeit Rolex watches for sale

Online Auction and Marketplace Scams

Platforms such as eBay and Facebook Marketplace can be breeding grounds for scams during Black Friday. Fraudsters may list items at enticing prices, only to disappear after receiving the payment. The Better Business Bureau reported a 25% increase in complaints related to online marketplace scams during the holiday season in 2023. It is pivotal to verify the credibility of sellers and if a deal seems too good to be true, it probably is. 

Figure 3: User looking to sell counterfeit gold through a verified eBay seller; Source: DarkOwl Vision

Anyone can fall victim to online scams, however certain demographics are more vulnerable than others. According to FTC, older adults are often targeted because they have less experience with online shopping and digital safety practices. The other demographic that is often targeted is young shoppers as they can be more focused on finding a good deal than watching for warning signs. Regardless of age, it is crucial for all consumers to be aware of potential scams and educate themselves on how to identify them. 

  1. Verify Website Security: Always check for “https://” at the start of the URL and look for the padlock icon in the address bar before entering any personal information. These indicate that the site is secure. 
  1. Research the Retailer: Prior to making a purchase from an unknown site or company, research the retailer. Look for reviews and check the Better Business Bureau for any complaints. Remember if a deal seems too good to be true it likely is so take time to ensure the legitimacy of the website and its offers.  
  1. Use Secure Payment Methods: Opt for secure payment methods, such as credit cards or trusted payment services like PayPal, Venmo, or Zelle. These options often provide buyer protection in case of fraud. Avoid sending money via wire transfer or using prepaid gift cards, these are common methods scammers use to receive payments. 
  1. Be Wary of Emails and Ads: Always avoid clicking on links in unsolicited emails or advertisements. Instead, navigate to the retailer’s website directly by typing the URL into your browser. Legitimate retailers will not ask for sensitive information via email. 
  1. Enable Multi-Factor Authentication: For added security, enable two-factor authentication on all accounts. This adds an extra layer of protection against unauthorized access. Always take advantage of security features offered by online platforms. 
  1. Stay Informed: Knowledge is power, be aware of the latest scams circulating. Websites such as IC3 and FTC regularly publish alerts and information on prevalent scams during the holiday season. Staying informed is a powerful tool in protecting yourself and your loved ones from fraud. 

While Black Friday can be an excellent opportunity for savings, it’s essential to approach it with caution. The dark web serves as a reminder of the dangers lurking in the digital space, where scammers exploit human psychology and urgency. This year for Black Friday, start by prioritizing your safety by staying informed and adopting best practices to protect your personal and financial information. By being proactive and vigilant, you can enjoy the holiday shopping experience, find some great deals, and keep the funds you don’t want to spend, safely where they belong. 


Don’t miss any research and tips from the DarkOwl team. Follow us on LinkedIn.

Darknet Marketplace Snapshot Series: MGM Grand Market 

November 14, 2024

In DarkOwl’s Darknet Marketplace Snapshot blog series, our researchers provide short-form insight into a variety of darknet marketplaces: looking for trends, exploring new marketplaces, examining admin and vendor activities, and offering a host of insights into this transient and often criminal corner of the internet. This edition features Dark Empire Market. 

Don’t forget to subscribe to our blog at the bottom of this page to be notified as new blogs are published. 

Darknet marketplaces (DNMs) are synonymous with the dark web where users can buy and sell illicit goods. It began with the Farmer’s Market, followed by the more prolific Silk Road. Ever since Silk Road was taken down by law enforcement, different markets have jostled for supremacy. As such, DNMs are some of the most recognized features of the dark web.   

Recently law enforcement has improved its ability to seize darknet marketplaces (DNMs), meaning that the vendors must migrate to new sites. There have also been several exit scams from marketplaces with the admins closing the site and taking the funds that are held in escrow.  

This is DarkOwl’s third blog in a series dedicated to reviewing the most popular darknet marketplaces (DNMs) since Kingdom, Incognito, and Bohemia marketplaces were seized by law enforcement. We will explore the various sorts of products regularly sold and well as how much the product pricing can vary within or between product categories.   

Traditional DNMs are defined as dark or deep web sites where numerous (often hundreds) vendors can sell various types of products ranging from drugs, digital goods, leaked databases, counterfeit documents, credit cards, etc. The most popular traditional DNMs that remain today are: 

  1. Ares Market 
  2. Archetyp Market 
  3. MGM Grand Market  
  4. Dark Empire Market 
DISCLAIMER: Please note that this list specifically excludes any forum that also has a marketplace section like XSS or Exploit, as well as marketplaces that specialize in one product category like digital goods on Russian Market. 

Our first two blogs focused on Ares & Dark Empire Market. Today we will review MGM Grand Market.  

MGM Grand has gained more popularity as several marketplaces have shut down since 2023. According to open-source research, 10 DNMs have shut down since 2023 either due to law enforcement seizures or exit scams. The following markets are listed as having closed down in 2024.  

  • Genesis Market 
  • TOR Market 
  • Vice City Market 
  • ASAP Market 
  • Tor2Door Market 
  • Royal Market 
  • Kingdom Market 
  • Bohemia Market 
  • Incognito Market 
  • Nemesis Market 

MGM Grand Market originally surfaced in April 2021 and has quickly become one of the most talked about DNMs on Dread along with Archetyp Market (which we will cover in our next blog on this topic) .  

According to DarkOwl’s Vision, we have over 11,600 results pertaining to MGM Grand Market. DarkOwl first saw MGM Grand mentioned on the popular darknet hacking forum, Dread, in January 2022, when a Dread user created a post rating various vendors on the site. DarkOwl has since seen “MGM Grand” mentioned on this forum at least 364 times. Typically, Dread users discuss experiences with marketplace vendors: 

Recently DarkOwl analysts discovered a Dread user asking which DNM is best for carding or credit card fraud. One user responded, “MGM Grand is decent, but make sure it has escrow bc some vendors don’t have it enabled.”

MGM Grand Market allows transactions to be processed using only Bitcoin (BTC), which is unique. Most DNMs allow transactions in BTC as well as other cryptocurrencies such as Monero, Litecoin, Ethereum, and Dash. Additionally, DarkOwl analysts have increasingly seen other currencies like Tether also being used on the darknet.  

Homepage 

The below screenshot displays MGM Grand Market’s Homepage. MGM Grand’s site format is familiar because it resembles the format of search engines like DuckDuckGo and Google: including a search bar, popular topics, site logo, and design.  

Credentials are required to log in and view content, but the registration process is simple. It requires a username, password, pin, and completing a simple captcha. 

Underneath the search bar is an overview of MGM Grand’s most popular product categories including: 

  • Fraud (2364 Listings) 
  • Drugs (5599 Listings) 
  • Digital Goods (2261 Listings) 
  • Guides & Tutorials (2121 Listings) 
  • Miscellaneous (996 Listings) 

 Currently there is a total of 13,341 product listings. The drugs section currently contains the most product listings, while Miscellaneous contains the fewest listings. 

The fraud category on MGM Grand Market offers a wide range of fraud products from bank accounts, credit cards, fintech accounts, leaked databases, and more. Currently there are 2364 product listings, and the below screenshot previews 3 products.  

  • Verified Bank Drops, $600.00 USD 
  • USA leaked CCN + personal details, $35.00 USD 
  • Western Union Cashout Methodology, $3.25 USD 

Looking a step further, a review of the content on one of the posts which is advertised as, “Verified Bank Drops EU/US Crypto Exchanges Fast Delivery + Custom Name Accounts” and is for sale for $600.00. The vendor claims they are selling a “fully verified” sumup.com account with Ireland IBAN and Kraken Crypto Exchange Account info including all personal account details. This product received a 4.5 Star rating, despite showing “0 sold” at the time of review.  

This vendor further alleges they can also sell bank account details for various banks, money transfer services, and crypto currency exchanges, the below is a list of financial institutions the vendor claims to be able to provide access to.  

The drugs category on MGM Grand offers a wide variety of illicit narcotics and prescription drugs such as cocaine, Ritalin, Xanax, LSD, and more. Currently there are a total of 5599 drug listings on this market. The below displays a preview of these listings: 

  • Speed Paste Amphetamine, $1.07 USD 
  • Cocaine, $40.00 USD 
  • Xanax, $1.60 USD 

The Digital Goods category has a total 2261 listings. Products range from accounts for sale, e-books, malware, RDP, gift cards, and more.  

The above screenshot previews 3 common products under the Digital Goods category including: 

  • 2024 ANY COUNTRY RDP server, $35.00 USD 
  • 10x Live and active socks5, $28.00 USD 
  • Live RDP Remote Desktop Protocol – 2 months Access. $50.00 USD 

DarkOwl analysts selected one product (see below screenshots) to further examine. The below product is a large collection of hacking tools ranging from RATs, cracking tools, fake emails, keyloggers, VPNs, DDOS tools, etc., which the vendor, Safety1st, alleges is worth over $12,000.00 USD, but is generously offering this “mega pack” for $3.26 per each tool. According to the description this vendor has so far sold 1 product and accepts escrow. The vendor also has received a 5-star rating. 

A full list of the hacking tools available from this vendor is shown below: 

“How to” guides and methodology tutorials are some of the most sold products across the darknet. There are a total of 2,122 products listed under MGM Grand’s Guides & Tutorials section. The content of these guides varies greatly from how to grow weed, how to hack a phone, how to deploy infostealer malware, how to create a counterfeit id, etc. 

The products listed in the above screenshot are: 

  • The Drug Users Bible, $3.25 USD 
  • Hydroponic Heroin How To Grow Opium Poppies Without Soil, $3.25 
  • Buy Anonymous SIM Cards Worldwide – Anon Phone SIM Card, $3.25 

Miscellaneous product categories exist on most DNMs, but the product listings are quite random and sometimes contain porn and other NSFW (not safe for work) content. However, MGM Grand has included counterfeit ids, money, and services under this category. There are currently a total of 966 products listed under Miscellaneous on MGM Grand Market. DarkOwl analysts have shared a preview of a few products below and their prices: 

  • Updated Counterfeit Money Bible (Fake Euro & Dollar), $6.51 USD 
  • Mixing Bitcoin Service – We Mix Clean Your BTC – Bitcoins Cleaning, $10.86 USD 
  • Generate Unlimited Mobile Phone Numbers of Any Country, $3.26 USD 

MGM Grand Market is a popular destination for those looking to purchase fraud products, digital goods, drugs, tutorials, counterfeit ids/currency, and more. MGM Grand’s popularity is expected to continue increasing as more marketplaces shutdown either due to law enforcement seizures or exit scams. During our next blog in this series of DNM reviews we will look at Archetyp Market.  


Subscribe to email to receive the latest research directly into your inbox every Thursday and don’t miss our next Darknet Marketplace Snapshot.  

What Data Could an MSSP Monitor on the Darknet on Behalf of their Client and Why

November 13, 2024

In the age of cybercrime, it is imperative that organizations are monitoring the dark web and dark web adjacent sites in order to identify threats and risks that may be posed to them and their organization. These risks can be reputational, financial, security related or have real world physical implications. In order to identify and combat these threats, organizations will often turn towards a Managed Service Provider to assist them. In this blog we will investigate what MSP and MSSPs should be monitoring for on behalf of their customers.  

A Managed Service Provider (MSP) is a company that manages a customer’s IT infrastructure and end user systems. They are usually responsible for monitoring sources and attributes which pose a threat to networks, infrastructure, security, communications and data storage. While some of these tasks will require monitoring network traffic and performance and ensuring compliance, they are also often responsible for cyber security services such as monitoring threats on the dark web.  

A Manages Security Service Provider (MSSP) is a type of MSP that focuses on security, particularly cyber security. They will monitor devices, systems, remote security operations centers (SOC). Their main focus is to protect their clients IT infrastructure from cyber threats. But increasingly they also need to protect their client’s data and how it is accessed and potentially shared.  

For all MSP and MSSP it is imperative that they monitor the dark web in order to mitigate any threats that may be posed to their clients. We will explore some of the information that is available that they should be monitoring for. 

Ransomware attacks continue to increase in 2024, with most groups now releasing the data of their victims on dark web shame sites when their requested ransom is not paid. The information leaked can contain huge amounts of data from all areas of an organization.  

The leak of this data can not only cause reputational damage but can also leave the organization, their employees and organizations in their supply chain open to further attacks, depending on what information is contained in the leak.  

It is important the MSSP monitor the leak pages of all ransomware groups to identify if any of their clients have fallen victim to a ransomware attacks. However, they should also be reviewing the leaked data for any organizations that are linked to their client to ensure that none of their client’s data has been exposed. DarkOwl Vision can be used to alert MSSPs when any information relating to their client appears on a ransomware site.  

Data leaks are being released at an alarming rate and can include vast amounts of data relating to individuals and organizations. Leaks predominately will contain credentials, usually email addresses and passwords but can also include information such as Social Security Numbers, IP addresses, Physical addresses and other identifying details.  

It is important that MSSPs monitor all domains linked to a client organization to identify if any of their employees’ credentials have been leaks. Leaked credentials can be used to obtain further access to a network and so steps should be taken to ensure that the leaked password is no longer in use.  

Information in leaks can also be used to conduct social engineering attacks so MSSPs should arrange for cyber security training so employees know what to be on the lookout for. In some cases, if individuals are high profile enough leaked information could also lead to real world implications.  

Stealer logs, while not the same as leaks, also provide details of individuals credentials. Stealer logs tend to have fresher information in them due to the way that they a collected by malware so immediate steps need to be taken.  

An Initial Access Broker (IAB) is an someone who specializes in gaining unauthorized access to systems or networks and then sells this access to other malicious actors.  IABs will often sell their access on the dark web through forums or marketplaces. The price for access typically varies based on the organization’s size, industry, or the level of access achieved. 

IABs will often name the sector that their victim is in but will not always advertise the true identity for fear of tipping off the victim to the vulnerability. However, they will often provide images of panels or other proof that they have access.  

It is important that MSSPs monitor all known IABs on marketplaces and forums on the dark web, as well as any other chatter around access to organizations. Particularly those in the industry of the client. DarkOwl Vision allows you to create alerts which can monitor these types of threat actors and this chatter.  

The dark web and dark web adjacent sites, particularly Telegram are increasingly being used to spread mis- and dis-information. In some cases, this rhetoric can lead to direct threats against organizations and or individuals. Although in the majority of cases those making threats are usually “trolls” who don’t intend to follow through on their threats, some individuals share this information as part of leakage, sharing their true intentions of real threats they intend to carry out. It is therefore important that MSSPs are vigilant for these types of discussions and ensure they are able to make an assessment about the threat in conjunction with other available sources. However, this can be difficult due to the anonymous nature of the dark web. 

Threat actors can also share information about individuals on the darkweb, including their location and other sensitive information about the individual. This is generally known as a Dox, although information can be shared in other ways. A Dox of an individual can include their home address, their telephone numbers other PII and details of social media accounts. This is something that MSSPs should be extra vigilant for as can have a real-world impact.  

MSSPs should ensure that they are monitoring for as many of their client’s assets in the dark web as possible, this includes but is not limited to” 

  • Email addresses 
  • Domains 
  • IP addresses 
  • Physical addresses 
  • Financial information 
  • Social Security Numbers 
  • Full names 

As well as assets MSSPs should monitor for attacks or chatter against the industry their clients are from as well as their geographical locations  

As part of an MSSPs and MSPs role in security the IT and cyber security of a company, it is important that they are monitoring for threats and risk that is being shared and talked about on the dark web. This is the only way that they can ensure that they have insights into what activities criminals are engaging in and who they are potentially targeting.  


Curious how DarkOwl can help your organization? Contact Us.

Initial Reactions to Election 2024 Across the Darknet

November 06, 2024

DarkOwl analysts have been closely monitoring darknet sites like Ramp4U, BreachForums, XSS, and Exploit in addition to chat platforms like Telegram and Discord for any concerning or threatening language in the lead up to, on the day of, and following the November 5, 2024 American presidential election.

We have identified individuals across the deep and dark web—particularly on the dark web-adjacent messaging app Telegram—spreading misinformation regarding the electoral process. On the morning of November 5, Cambria County Commissioner Scott Hunt in Cambria County, Pennsylvania announced a “ballot printing issue” that resulted in tabulators being unable to scan ballots. The issue was caused by “how the ballots were printed,” and was not a problem with the machines. Numerous individuals online, however, were observed misrepresenting the information and spreading numerous conspiracy theories. These have included unfounded claims that voting machines were tampered with to undermine the Republican vote.

These conspiracy theories fall into a larger trend of mis- and disinformation undermining trust in the electoral process, which gained significant traction following the 2020 presidential election. On the day of the election, analysts continued to observe the spread of false narratives suggesting that voting system manufacturers like Dominion Voting Systems are “changing votes.” Many individuals in far-right Telegram channels are also continuing to reiterate the conspiracy theory that the 2020 presidential election was “stolen.”

As noted in DarkOwl’s recent 2024 U.S. Presidential Election Disinformation on the Dark Web whitepaper, U.S.-based conspiratorial political movements like QAnon are actively sharing false information pertaining to the 2024 presidential election. In the weeks leading up to the election—and on Election Day—QAnon Telegram channels have spread misinformation claiming that the “deep state” is taking steps to “steal the election.” The conspiratorial political movement, for instance, has pointed to the length of time needed to count ballots as a sign of interference. Many of these unfounded claims stem from—and are amplified by—falsities spread by prominent political figures, including former President Donald Trump. Far-right Telegram channels have notably picked up on posts made by Donald Trump on Election Day claiming that there is “massive cheating” taking place in Philadelphia. Philadelphia officials have already issued a statement in response countering the former president’s unfounded claim.

Furthermore, on Election Day, the Federal Bureau of Investigation (FBI) announced that there are fabricated videos spoofing the FBI—using both its name and insignia—currently circulating online. As highlighted by CBS News, the videos are spreading “false information about security threats and election integrity.” Although the threat actors behind the videos have not been identified at this time, researchers believe it is likely that Russia is behind the disinformation. This would be consistent with expectations that nation states—particularly Russia, Iran, and China—would ramp up disinformation operations closer to November 5.

Mis- and disinformation claiming that the election is being “stolen” and that voting machines are being hacked was increasingly observed on the night of November 5 and in the early hours of November 6, prior to the announcement of president-elect Donald Trump’s victory. Following the announcement, individuals in far-right Telegram chats were seen claiming that the “steal” was stopped “at the last minute.” Moreover, since the results have come in, DarkOwl has observed left-wing individuals—particularly on Twitter/X—spreading conspiracy theories claiming that the election was “rigged” in favor of president-elect Donald Trump. As was the case with far-right conspiracy theories, there is no evidence to support these claims.

DarkOwl analysts identified a post on RAMP4U titled, “USA state of Georgia Police Department Captain email hacked | ELECTIONS SPECIAL HACK.” This post, originally published by the user, Pwnstar, on 11/02/2024, has gained attention, and the threat actor stated it was being shared specifically ahead of the election.

Below is a screenshot of Pwnstar’s original post, which claims to have 2.3 GB of emails belonging to “Captain of Georgia PD.” No city, county, or town was named, but the user further alleges that this data goes all the way back to 2012 until Sep 2024. Most replies asked the user for the price of the data leak and whether the information is genuine.

The following screenshot also appeared on Pwnstar‘s original post. The image is an alleged data sample from the Georgian police captain’s leaked emails – specifically a “Municipal Court Jail Docket Sheet.”

The Georgia police captain post has continued to receive attention from prospective buyers clarifying details about the leak followed by the threat actor, Pwnstar, responding. Below are a couple noteworthy comments.

Pwnstar accused Dinamit of being a journalist or law enforcement agent:

A thread titled, “USA Voter Databases Collection” originally appeared on Breachforums in June 2023, but has recently resurfaced as a popular thread in light of the 2024 election. Several users claim to have recent data for various states including the following information:

  • Voter ID Number
  • First & Last Names
  • DOB
  • Full Addresses
  • Email & Phone Numbers

This post did not continue to receive additional replies after the elections results were finalized. However, DarkOwl Analysts identified an actor named OriginalCrazyOldFart that has a particular interest in US voter data.

There are 13 pages of replies. Pages 12 and 13 contain comments from 11/1/2024 until Current Date. One response worth noting was from OriginalCrazyOldFart on 11/2/2024 where this user claims that they have current Voter lists for various states like Georgia and Iowa.

DarkOwl analysts searched BreachForums and discovered OriginalCrazyOldFart has posted several threads related to US voter data as well as regularly publishing various types of leaked databases related to private companies and government agencies around the world. One thread titled, “2024 Statewide North Carolina Voter list. 8,695,045 lines (plus OHIO VOTERS),” was originally created on 7/31/2024, but has continued to receive comments as recent as 11/6/2024. This actor claims to have the following data for voters in North Carolina and Ohio:

  • DOB
  • Phone Number
  • Race
  • Driver’s License Numbers

OriginalCrazyOldFart replied to 4 different users asking to clarify the type of data for sale. In this particular response they go into details about how they obtained data from various states including:

  • New York
  • Pennsylvania
  • Wisconsin
  • Missouri
  • Arkansas
  • Kansas
  • Utah

These posts highlight the interest that threat actors have in voting information, even after information has been available for long periods of time. Although given the PII (personal identifiable information) available in these leaks it is more likely the information would be used for traditional hacking and phishing techniques rather than to perpetrate any type of data fraud. However, once a threat actor obtains this kind of data it is difficult for us to know how they are going to use it.

Furthermore, watching activity on the dark web in the run up to the election, during election day and in the immediate aftermath, highlights the effect that this event has had on certain aspects of the community. Rhetoric from those on Telegram and other sites noticeably changed in light of the result. DarkOwl analysts will continue to monitor these groups and conversations to see how the conversation changes in the coming months up to an including the inauguration to understand if threats, conspiracy theories and other threatening rhetoric persists or increases from both sides of the aisle.


Keep up to date with DarkOwl’s research. Follow us on LinkedIn.

Threat Intelligence RoundUp: October

November 04, 2024

Our analyst team shares a few articles each week in our email newsletter which goes every Thursday. Make sure to register! This blog highlights those articles in order of what was the most popular in our newsletter – what our readers found the most intriguing. Stay tuned for a recap every month. We hope sharing these resources and news articles emphasizes the importance of cybersecurity and sheds light on the latest in threat intelligence.

1. Discord blocked in Russia and Turkey for spreading illegal content – Bleeping Computer

On October 8, Russian state-owned news agency TASS reported that Russia’s communications regulator blocked Discord “for violating Russian law.” A day later, on October 9, Turkish authorities announced that it too had blocked the instant messaging app. Turkey cited “crimes of ‘child sexual abuse and obscenity’” as the reason for its decision. Many Discord users have since begun to protest the decision online due to the sudden changes which were made without warning. Full article here.

2. U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown – The Hacker News

In an October 3 press release, the U.S. Department of Justice (DOJ) announced the seizure of 41 internet domains that have been used by Russian intelligence agents for computer fraud in the U.S. The DOJ’s seizure was coordinated with Microsoft, which seized 66 additional domains used by the same threat actors. According to the DOJ’s press release, the domains were used in a phishing campaign run by the Russian government to steal American citizens’ sensitive information. Read more.

3. Police arrest four suspects linked to LockBit ransomware gang – Bleeping Computer

In a recent press release, Europol announced the arrest of four individuals linked to the ransomware gang LockBit. The first arrest was of a LockBit ransomware developer and occurred in August 2024. Two more individuals were subsequently arrested by British authorities that same month. A fourth suspect—believed to be the administrator of a bulletproof hosting service used by LockBit—was arrested in Madrid by Spain’s Guardia Civil. In addition to the four arrests, the United States, United Kingdom, and Australia also announced sanctions against an actor the UK’s National Crime Agency identified as a “prolific affiliate of LockBit and strongly linked to Evil Corp,” the Russian cyber-crime gang. The UK sanctioned 15 additional Russian citizens for ties to Evil Corp, the US sanctioned six, and Australia sanctioned two. Article here.

4. U.S. Charges Three Iranian Nationals for Election Interference and Cybercrimes – The Hacker News

In a September 27 press release, the DOJ announced the indictment of three Iranian nationals allegedly employed by the Islamic Revolutionary Guard Corps (IRGC) for attempting to undermine the U.S. electoral process. The individuals are being charged for hacking into the accounts of “current and former U.S. officials, members of the media, nongovernmental organizations, and individuals associated with U.S. political campaigns,” as part of Iran’s continued efforts to sow discord and influence U.S. elections. Read article.

5. New FASTCash malware Linux variant helps steal money from ATMs – Bleeping Computer

Cybersecurity researcher HaxRob has discovered a new Linux variant of FASTCash malware being utilized by North Korean hackers. The malware is used to infect payment switch systems and perform “unauthorized withdrawl[s] of cash from ATMs.” The new Linux variant is reportedly similar to the previous Windows and AIX variants of FASTCash. Full article here.

6. China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration – The Hacker News

Researchers at the cybersecurity firm ESET have identified a new China-aligned threat actor dubbed CeranaKeeper. The threat actor has been observed targeting governmental entities predominantly in Southeast Asia since early 2022. Targets have included Thailand, Myanmar, the Philippines, Japan, and Taiwan. Most notably, starting in 2023, CeranaKeeper has targeted government entities in Thailand specifically. These targets are consistent with those previously targeted by Chinese state-sponsored threat actors. Full article.

7. US disrupts Anonymous Sudan DDoS operation, indicts 2 Sudanese brothers – Bleeping Computer

In an October 16 press release, the U.S. Department of Justice (DOJ) announced the indictment of two Sudanese nationals for their alleged role in cyberattacks carried out by the hacktivist group Anonymous Sudan. The group, which launched in 2023, has conducted “over 35,000 DDoS attacks in a year” targeting a variety of sectors, including “critical infrastructure, corporate networks, and government agencies in the United States and around the world.” Read more.

8. Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation – The Hacker News

In an October 8 press release, Dutch police announced the arrest of three administrators of “Bohemia/Cannabia,” a notorious dark web market. The international law enforcement operation, which was carried out with the U.K., U.S., and Ireland, resulted in the dismantling of the dual marketplace, which was one of the world’s largest and longest running platforms “for the trade of illegal goods, drugs, and cybercrime services.”  In total, the joint law enforcement operation seized over 8 million euros in cryptocurrency from the arrested platform administrators. Read article.

Cybersecurity researchers from NSFOCUS have discovered a new botnet malware family dubbed “Gorilla Botnet.” According to the cybersecurity firm’s report, between September 4 and September 27, the botnet issued “over 300,000 attack commands, with a shocking attack density.” The botnet has targeted a variety of sectors, including education, government, finance, and communications. Over 100 countries have been impacted, “with China and the U.S. being the hardest hit.” Read more.


Make sure to register for our weekly newsletter to get access to what our analysts are reading on a weekly basis.

Exploring the Darknet: A Halloween Journey

October 31, 2024

Imagine walking through a neighborhood on Halloween night. The streets are dimly lit by flickering jack-o’-lanterns, and each house holds its secrets. Some doors open to friendly treats, while others conceal hidden tricks. This scene mirrors the Darknet, a hidden part of the internet that remains largely unseen and inaccessible to the average user. Like Halloween, the Darknet blends curiosity, excitement, and potential risks. Understanding what it is, how to access it, what lies within its depths, and how to navigate it safely is essential for anyone intrigued by this mysterious digital realm.

The darknet is a segment of the internet that is not indexed by standard search engines like Google or Bing. Unlike the surface web, accessible to anyone with an internet connection, the darknet operates on encrypted networks, ensuring high anonymity for its users. This anonymity makes it a haven for both legitimate and illicit activities.

At its core, the darknet uses specialized software to mask users’ identities and locations. This encryption is like wearing a costume on Halloween, allowing individuals to interact without revealing their true selves. The primary purpose is to provide a secure space where privacy is paramount, shielding users from surveillance and tracking.

Accessing the darknet requires specific tools and precautions, like preparing for a Halloween adventure. The most common method involves using the Tor Browser, a specialized web browser designed to anonymize your internet traffic by routing it through multiple servers worldwide. This process makes it difficult for anyone to trace your online activities back to you.

Many users also employ Virtual Private Networks (VPNs) to add an extra layer of security. A VPN masks your IP address, further protecting your identity and making your internet connection more secure. Some individuals use secure operating systems like Tails, designed to leave no trace on your computer, ensuring maximum privacy.

Using these tools is essential for maintaining anonymity. Just as a costume can conceal your identity on Halloween, these technologies help protect your personal information and online presence from prying eyes.

The darknet hosts a wide range of content and activities. Its anonymity attracts legitimate users seeking privacy and those engaging in illegal activities.

Marketplaces operate as online stores where users can buy and sell goods anonymously. While some offer legitimate products, others deal in illegal items such as drugs, weapons, and stolen data.

Forums allow individuals to discuss various topics without fear of censorship. These can be free speech places but also harbor discussions related to criminal activities.

Whistleblowing sites like SecureDrop enable whistleblowers to share information securely and anonymously with journalists and the public, promoting transparency and accountability.

Content-sharing platforms facilitate the exchange of files, documents, and other digital content without tracking, supporting both legal and illegal information sharing.

While these opportunities exist, it’s important to recognize that not everything found there is safe or legal. Illegal activities and malicious content pose significant risks to those who navigate this hidden internet realm.

The darknet embodies both positive and negative aspects. Understanding these dualities is crucial for anyone considering exploring them.

On the positive side, it protects privacy, shielding users from government surveillance and corporate tracking. It offers a platform for free speech, allowing individuals to express their opinions and share information without fear of censorship or retaliation. Researchers, journalists, and activists can access resources and communicate in ways that might not be possible on the surface web. Additionally, it facilitates connections among individuals dealing with sensitive issues, offering support and resources that might be stigmatized elsewhere.

On the negative side, the darknet is a breeding ground for illegal activities, including the sale of drugs, weapons, and stolen data. Cybercrime such as hacking, fraud, and identity theft are prevalent, posing significant threats to individuals and organizations. It can host disturbing and illegal content, including extremist material and illicit pornography. The lack of regulation and oversight increases the risk of encountering fraudulent schemes and deceptive practices.

Recognizing the darknet’s dual nature helps users make informed decisions about their engagement, balancing the potential benefits against the inherent dangers.

Navigating the darknet requires a cautious approach to ensure safety and security. Implementing the following practices can significantly reduce risks:

  • Use a VPN to encrypt your internet connection and mask your IP address.
  • Install the Tor Browser to anonymize your browsing by routing your connection through multiple servers.
  • You should stay anonymous by avoiding sharing personal information such as your real name, address, or financial details.
  • Verify the legitimacy of websites and users before interacting or making transactions to avoid scams and fraudulent activities.
  • Avoid downloads from untrusted sources to prevent malware infections that can compromise your device and data.
  • Keep all your tools and software updated to protect against security vulnerabilities and exploits.

Ask yourself: Are you prepared to handle the risks? Do you know how to protect yourself?

Beyond the fundamental safety measures, implementing practical strategies enhances your security on the darknet. Use strong, complex passwords for all your accounts to prevent unauthorized access. Enable two-factor authentication wherever possible to add an extra layer of security to your accounts.

Regularly back up your data to protect against loss or theft, ensuring you can recover important information if needed. Monitor your online activity to keep track of your presence and detect any suspicious behavior that could indicate a security breach. Educate yourself about the latest threats and best practices to improve your security measures continuously

These strategies build a robust defense against the risks, allowing you to navigate more confidently and securely.

The darknet poses significant risks that users must be aware of to navigate safely. Being informed about these dangers is the first step in mitigating them.

Illegal activities can lead to severe legal repercussions, including prosecution and imprisonment. Personal information can be exposed through hacks or malicious activities, leading to identity theft and financial loss. Scams and fraudulent schemes are common, resulting in the loss of money and valuable assets. Additionally, exposure to disturbing or illegal content can have adverse effects on mental well-being, causing stress, anxiety, or trauma.

Evaluate your motives for accessing the darknet and weigh the potential benefits against these risks to make informed decisions about your online activities.

Despite its notorious reputation, the darknet offers several benefits that can be harnessed for positive purposes. Journalists use it to communicate securely with sources, protecting their anonymity and the integrity of their investigations. Academics and researchers access uncensored information and collaborate without the constraints of mainstream internet censorship. Activists organize and communicate without fear of retaliation, supporting movements that seek social and political change. It also champions the right to online anonymity, advocating for user privacy and freedom from surveillance.

These benefits highlight the darknet’s potential as a tool for empowerment and positive change, offering avenues for those who prioritize privacy and freedom of expression.

Navigating the darknet is not without its challenges. Accessing and using it requires certain technical knowledge and familiarity with specialized tools and software. Verifying the credibility of information and users can be difficult, increasing the risk of encountering scams and fraudulent activities. The landscape is continuously changing, with new platforms emerging and existing ones shutting down, making it challenging to stay up-to-date. Laws regarding the Darknet vary by region, creating confusion and potential legal risks for users who may inadvertently engage in illegal activities.

Overcoming these challenges requires a proactive approach, continuous learning, and vigilance to navigate safely and effectively.

The darknet is poised to evolve alongside technological advancements and changing societal dynamics. Governments may implement stricter controls and surveillance measures to curb illegal activities, impacting user anonymity and access. Enhanced encryption technologies will bolster security, making it even more challenging for authorities to monitor activities. As mainstream technologies adopt features that prioritize privacy and security, the distinction between the surface web and the darknet may become less pronounced. Innovative platforms will continue to emerge, offering new ways for users to interact and share information securely.

These developments will influence how the darknet is used and perceived, shaping its role in society and the broader internet ecosystem.

The darknet embodies the duality of Halloween—where light and shadows coexist. It offers a space for privacy, free speech, and access to uncensored information while harboring illegal activities and potential dangers. Understanding its structure, the tools required to access it, the content it hosts, and the best practices for safe navigation are essential for anyone venturing into this hidden digital world. Stay informed and cautious to explore its opportunities while safeguarding against inherent risks.


Curious how darknet data could be important to your business? Contact us.

USDoD: Dark Web Threat Actor Arrested

October 29, 2024

The dark web community of those buying, selling, trading and sharing data is extremely active. Dark web sites such as BreachForums and LeakBase are heavily used by threat actors to trade data, ask about what is available and provide links to stolen data. However, some individuals in this community are more active than others, regularly sharing data leaks from high profile organizations, often claiming they have hacked the data themselves or worked with other hackers to make the data available.  

One such threat actor is known as USDoD. He has been very active on BreachForums, sharing multiple leaks and also claiming to be starting his own site to share data. However, it was reported late last week that he had been arrested in Brazil. Here we will review some of USDoD’s activities and what lead to his arrest.  

USDOD has had a profile on BreachForums since July 2023. In that time, he had posted 112 times, created 33 threads and earned a reputation of 891. His profile also states that he had referred 31 people to join the forum. He also won awards as a “leaker,” “hacker,” and “God.”

Figure 1: USDoD’s BF profile which has been banned subsequent to his arrest

While most threat actors active on the dark web tend to try and hide details about themselves, USDoD shared further information on his profile. While this information is likely false, it is notable that any information at all was shared. The profile also provides links to his Telegram channel and his Twitter/X account.  

Figure 2: Additional information provided on USDoDs BF profile 

While many threat actors are active on Telegram, it is unusual that USDoD linked his dark web profile to an open web social media profile. Linking this digital footprint allows investigators more avenues to identify the true identity behind USDOD’s alias.  

USDoD was known to share posts on Twitter/X which would detail his activities such as, visiting family members in hospital and watching the US election debates. While these details could have been shared to throw off researchers, it is still unusual and risky behavior for a threat actor. His Twitter/X account is currently suspended.  

USDoD leaked a lot of data on BreachForums. Some high-profile leaks and data scrapes included: 

  • LinkedIn 
  • InfraGard
  • National Public Database
  • USA Criminal Records
  • Crowdstrike IoC list
  • Gov UK database
  • EPA.gov

Such high-profile targets meant that many governments and law enforcement operators were likely keen to identify and apprehend USDoD. 

Figure 3: List of threads posted by USDoD highlighting his targets 

When BreachForums was seized in early 2024, USDoD posted on Twitter/X that he was planning to create his own forum, hosted on the surface web which would allow users to continue to share data.  

He claimed that this new site would be completely run by him, as he did not trust anyone else. He also outlined the technology he would use, the domains he had registered and how he would operate the site and what information would be allowed on it.  

He stated that he was launching this platform for the good of the community rather than for financial gain. USDoD named the new site BreachNation, and even spent time uploading profile images and media related to the new site.  

Figure 4: Twitter posts from USDOD announcing BreachNation 

Ultimately USDoD backtracked on his promise to launch this site. In a lengthy post on Twitter/X he stated that he did not have the time to run the site in the way that he wanted to. He stated he had a social life to maintain and if he ran this site it would take up all of his time and he would not be able to live his life.  

By this point, BreachForums was back up and running as usual, albeit with some more security to enter the forum. USDoD continued to use BreachForums to share more leaked data.  

Reporting in August 2024 suggested that USDoD had been doxed and that his true identity had been identified. However, no information was identified on the usual dox sites such as Doxbin and Pastebin.  

Chatter quickly stated that the information had come from CrowdStrike, one of the targets of USDoD. A Brazilian news agency stated that they had been leaked a “detailed report from CrowdStrike” which had identified USDoD as a 33-year-old man living in Minas Gerais, Brazil. 

The article further stated that all of the information relating to this individual had already been passed on to Law enforcement Agencies.  

After this article came out, USDoD appeared to confirm that the information shared, and his true identity were correct. He stated that he would be turning himself in for the actions that he had taken.  

Figure 5: USDoD quote confirming his identity 

However, many in the community thought that the information was incorrect and that the information was made up to protect USDoD’s true identity.  

On October 16, 2024, Brazil’s Policia Federal announced that they had arrested a suspect in Brazil as part of Operation Data Breach, who was allegedly responsible for hacking the Federal Police and other international institutions.

In their release, the police went on to state that the suspect had also boasted of several other “cyber invasions” including the hack of InfraGard.  

The community which USDoD seemed very proud to be a part of was quick to spread the news of the arrest, looking for information to confirm if it was true, with some noting that they were wrong to doubt the authenticity of the “dox.”

Figure 6: Chatter on BF related to USDoD’s arrest 

The arrest of the individual behind USDoD highlights Law Enforcement’s continued efforts to counter the spread of stolen information and apprehend the individuals for hacking into organization’s systems on a global scale.  

However, USDoD presents an interesting case given his transparency about his daily life and his seeming indifference to hiding his identity, usually a hallmark of those individuals who operate on the darkweb. The fact that he was willing to confirm his true identity and suggest that he would turn himself over to law enforcement maybe suggests he had become disillusioned with his criminal activities.  

Whatever the case may be, USDoD was a prolific hacker and sharer of sensitive data. His apprehension by Brazilian authorities will contribute to a safer ecosystem until some other actor steps up to take his place. But a message has been sent to the stolen data sharing community that they are not safe from law enforcement action.  


Keep up to date with DarkOwl. Subscribe to our emails!

Copyright © 2024 DarkOwl, LLC All rights reserved.
Privacy Policy
DarkOwl is a Denver-based company that provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data. We shorten the timeframe to detection of compromised data on the darknet, empowering organizations to swiftly detect security gaps and mitigate damage prior to misuse of their data.