Home » Featured

Featured

pump and dump.PNG

Research: How to orchestrate a cryptocurrency pump-and-dump scheme

The almost total anonymity offered by the cryptocurrency verse has rendered it a fruitful arena for a myriad of fraudulent activities including Ponzi schemes, currency heists, and pump-and-dump schemes. Even though pump-and-dump schemes represent a well known form of ruse that have long taken place across traditional financial markets, they have recently found a new area to flourish in – ... Read More »

hacking products.png

Research: Analyzing trading of hacking related products on darknet marketplaces

The size of the deep web is estimated to be five hundred times that of the surface web. The dark web comprises around 6% of the deep web and involves all forms of illegal activities including illicit drug trading, weapons trafficking, counterfeiting, and trading of malicious and hacking products. Dark web marketplaces, or crypto markets, represent unique forms of platforms ... Read More »

legal-illegal.jpg

Research: The cost of being legit on the dark web

The dark web has been always thought of as a place to conduct illegal activities, such as trading illicit drugs, buying hacking products, facilitating online child abuse, and weapons trafficking. However, many studies have shown that considerable legal activities also take place on the dark web. The online anonymity offered by Tor renders it indispensable for political activists, whistleblowers, and ... Read More »

Former Rugby Player Used Bitcoin to Purchase MDMA Over the Dark Web

A former rugby player in the A-grade Darwin Rugby League in Australia was given an 18 month prison sentence after he pleaded guilty to possession of MDMA pills with the intent to supply. The rugby player allegedly acquired hundreds of MDMA pills from a dark web marketplace; prosecution failed to disclose the name of the marketplace. According to court documents, ... Read More »

BTC 20.1.1.PNG

Bitcoin price weekly analysis – 20.1.2019

Bitcoin price has been moving sideways during most of last week, ranging between $3,600 and $3,800 throughout most of last week’s trading sessions. The week started by bitcoin price rising to record a week high of $3,800 on Monday. After the week high was recorded, bitcoin price started dropping down to record a week low of $3,606 on Thursday. Thereafter, ... Read More »

US Law Enforcement Agencies Say Drug Gangs Are Using China Crypto Channels for Money Laundering

U.S. law enforcement agencies have reported an increasing use of Chinese and Asian cryptocurrencies for money laundering proceeds obtained from drug trafficking in the U.S., Europe, and Australia. This has risen from the estimated U.S. $2 trillion of funds laundered worldwide, of which almost $60 billion is from drug sales in the U.S. only. Most of these drugs are illicit ... Read More »

Lubbock Man Sentenced for Stealing Mail and Selling Personal Details on Dark Web

In Lubbock, Texas, a resident was prosecuted in a federal court of law on December 28 and sentenced to a four-year imprisonment along with an additional three years on probation following the prison sentence. The 31-year-old male named Garrett Austin Malone confessed to the crime of stealing mail in Lubbock and selling the personal information and credit cards obtained from ... Read More »

Stochastic.PNG

Research: Using stochastic geometry to analyze network traffic and exclude heterogeneous (malicious) darknet traffic

Throughout the past few years, the explosive advancement of receivers and the rapid surge of data traffic have greatly impacted the current network architecture. According to data presented by the Cisco Complete VNI in 2017, the monthly internet traffic per receiver will rise to around 43 GB by the year 2021. As such, in order to attain optimum network management ... Read More »

onion o.jpg

Research: Analyzing the Tor routing protocol to identify structural weaknesses

The Onion Router (Tor) has been developed in order to protect the privacy, integrity, and availability of communications taking place across its network. This unique network is based on a community that utilizes a special network protocol to enable users to browse the internet anonymously. Even though the protocol’s open source code is publically available, some of its aspects, including ... Read More »

SGX-Tor.PNG

SGX-Tor: Maximizing Tor’s anonymity via SGX enclaves

With the growing popularity of Tor as an anonymity network, a large number of attacks have emerged to undermine its anonymity. Guaranteeing total anonymity despite adversaries targeting Tor represents an extremely difficult task, especially since Tor relay nodes are hosted by volunteers located all over the globe. Presently, one can obtain sensitive information, such as identifiers of hidden services and ... Read More »

French Startup Offers Dark Web Compass (Not For Everyone)

The dark web has been gaining popularity among people who desire to hide their identity as they surf through various items and engage in different kinds of business. The ability to safely operate with the help of the TOR browser has allowed the platform to harbor terrorists, murderer-for-hires, and illegal drug dealers. The anonymity offered makes it difficult for law ... Read More »

Two Young Men Arrested for Importing Dark Web Drugs Worth Lakhs

Police in Delhi have arrested two young men for importing illegal drugs worth several lakhs. The two suspects are accused of using the dark web to place online orders of illicit drugs and paying for the orders with virtual currencies. The imported drugs were then delivered through a courier firm. The two young men, who are in their early 20s ... Read More »

Identification of darknet hacker communities (forums, IRCs, carding shops, and darknet marketplaces)

Cyber attacks lead to global losses that exceed $450 billion each year. To address this problem, ethical hackers and researchers put great efforts into Cyber Threat Intelligence (CTI) development in order to identify hackers and emerging threats. CTI analysts have highlighted the significance of studying the ever-growing online hacker communities. Despite their valuable CTI importance, collection of data from online ... Read More »

Tactical_Cyber_Threat_Intelligence-780x365.jpg

Research: Cyber threat intelligence and the dark web – Overseeing current approaches

Research studies that analyze information regarding various communities on the deep web and dark web have unfolded novel angles in the domain of security informatics. The existence of dark web communities that operate with high levels of anonymity opens the door for data driven approaches that target different means of adversarial reasoning. Such approaches would require certain data that is ... Read More »