Home » Articles

Articles

Tor (the myth and reality.PNG

DeepCorr – A novel efficient system for flow correlation attacks on Tor

Flow correlation represents one of the essential techniques utilized in a myriad of deanonymization attacks launched against Tor. Even though flow correlation attacks are highly important , current flow correlation techniques are ineffective in linking Tor traffic flows when implemented at a large scale, i.e. they require long flow observation rates that are highly impractical, or are associated with high ... Read More »

Valhalla's application architecure.PNG

Valhalla (Scam) cryptomarket analysis and user de-anonymization

Darknet marketplaces are cryptomarkets, where vendors can sell illicit drugs and services to anyone, and anywhere in the world. Darknet marketplaces are hidden services that are accessible via the Tor network. Users of these cryptomarkets usually use PGP to interact with each other and bitcoin as the currency for their various transactions. A recently published thesis performed quantitative analysis of ... Read More »

Bitcoin Russia.jpg

Research: The usage experience of cryptocurrency across Russia

It has been almost 10 years now since Bitcoin was born, and since then the new blockchain based currency has introduced the world to a new concept for payments, establishing a novel economic order. Moreover, the plethora of cryptocurrencies we are witnessing now is representing a massive improvement in monetary systems, which has become a topical and controversial issue in ... Read More »

public internet tunnels.PNG

Research: Improving anonymity of users on I2P with an enhanced outproxy design

It is inarguable that the internet greatly undermines user privacy, and the risks are growing each day. This has fueled the development of several anonymity networks, such as Tor and the invisible Internet project (I2P). While the Tor network is currently the most commonly used solution for promoting anonymity and protecting a user’s privacy online, the low capabilities of I2P ... Read More »

deanonumization 2.jpg

Research: Comparing the performance of IP routing and onion routing (Tor)

The world is currently witnessing many political conflicts. Repressive governments are imposing sanctions on free speech. Many of these governments block the general public from accessing some websites, which led people in these countries to find solutions to be able to browse the internet freely. Researching solutions to this problem led to the practical deployment of a prototype model for ... Read More »

customisable ransomware 2.PNG

Research: How ransomware and hacking services are sold on darknet marketplaces

Black hat hackers, and cyber-criminals are far more sagacious than most of us think. They are no longer script kiddies who are showing off their hacking skills to impress their social circles, but highly professional businessmen who are working meticulously hard to benefit from their exploitative attacks. Research studies have been done on how cyber-criminals market their skills and sell ... Read More »

Cryptomarkets.jpg

Research: Multi-homing vendors and loyal buyers on darknet marketplaces

The past few years have witnessed increased popularity of darknet marketplaces which orchestrate trading of illicit products on the deep web. The darknet marketplace ecosystem is evolving despite government shutdowns and takedown operations. International law enforcement agencies call for a better understanding of these novel illicit trading platforms. Buyers seem to shift to surviving marketplaces when one marketplace is taken ... Read More »

Watermark-Plugin.jpg

Recent flow watermarking techniques for detection of Tor hidden services

Tor is by far the most widely used anonymous network that is increasingly being exploited by users hosting and publishing content via hidden services. In most cases, Tor’s hidden services are used to distribute content that is morally or illegally deplorable, e.g. child pornography. Law enforcement agencies (LEAs) are constantly trying to identify users hosting and distributing such content. Innovative ... Read More »

fentanyl.jpeg

The rise of Fentanyl in the US and EU darknet marketplaces

Fentanyl is a “Schedule I” drug and one of the widely used synthetic opioids in medicine. In the United States, illegally produced fentanyl, as well as its analogues, New Psychoactive Substances (NPS), which are newly available drugs whose chemical structure is being modified to skirt around law enforcement agents (LEAs). They are used by traffickers to adulterate namely heroin, and ... Read More »

ANALYSIS OF THE REPORT ON FENTANYL DISTRIBUTION IN THE US

At the start of the month, a report was issued by Mathew C. Allen, the Assistant Director of Domestic Operations, Homeland Security Investigations. The report was given before the United States Senate Caucus on International Narcotics Control. The main agenda was to inform the officials on the measures that were being taken to combat the smuggling of illegal Fentanyl from ... Read More »

Analysis of Chinese and Russian Hacking Communities

Recorded future has been actively analyzing forums and markets that are tailored towards the Chinese and Russian audiences over the last annual period and has discovered several differences in the hosted contents within the forums and the differences in the forum conduct and organization. Recorded Future Insikt group analyzed posts, interactions, and advertisements in criminal and hacking forums to explore ... Read More »

Dream Market 1.PNG

Research: The aftermaths of Operation Bayonet and the migration of vendors to Dream Market

In the summer of 2017, an international operation, known as Operation Bayonet, led by the FBI and the Dutch National High Tech Crime Unit (NHTCU) targeted two popular darknet marketplaces. The FBI successfully took down Alphabay, and the NHTCU silently took over, administered, and shut down Hansa Market. By coordinating these international efforts, both agencies expected vendors active on Alphabay ... Read More »

web-crawler.jpg

AutoCrawler – Crawling dynamic web applications and furthering deep web outreach

Web crawlers, also referred to as web spiders, have been extensively studied ever since the world wide web was launched. More recently, researchers have been concerned with web crawlers that attempt to crawl parts of the web that require completion of forms, which represent parts of the deep web. According to recent research studies and the statistics of BrightPlanet published ... Read More »

BTC weekly 6.11.1.PNG

Bitcoin weekly price analysis – 6.11.2018

After dropping down to a low of $6,242 last week, bitcoin price started rising regularly hitting a week high of $6,529. Even though technical analysis of last week’s charts denoted that we are likely to witness a bearish market during most of the week’s trading sessions, a new upwards wave began manifesting itself last Wednesday following a short bearish move. ... Read More »