Dark World: A Book on the Deep Dark Web 9781032518879, 9781032518893, 9781003404330

What are cyber crimes on the dark web? How people are doing business, and which areas are mostly focused on the dark web

118 99 29MB

English Pages 302 Year 2023

Report DMCA / Copyright

DOWNLOAD FILE

Dark World: A Book on the Deep Dark Web
 9781032518879, 9781032518893, 9781003404330

Table of contents :
Chapter 1 Cybersecurity and the Dark Web

Introduction

Cybercrime and Cybersecurity

Cybercrime

Cybersecurity

Web and Its Levels

Web Levels

Web Categories

The Consequences of Criminal Activity on the DW

Trojan Horses, Worms, and Malware

Ransomware

Distributed DoS Attack

Social Network (SN) Attacks

Scareware

Botnets and Zombies

Key Hitches

Categories of Crime

DW Malicious Activities

Malware Classification

Cyberspace Malware Challenges

Malware Analysis

Static Analysis

Dynamic Analysis

Hybrid Analysis (Includes Both Techniques Above)

Malware Defensive Measure

The DW and Emerging Criminal Threats

Trafficking in Human Beings and Sexual Services

Assassinations and Its Marketing

Terrorist and DW

Drug Transactions

Pornography Industry

Child Pornography

Methods and Challenges for Tracking Criminals on the DW

Summary

Chapter 2 A Guide to the Dark and Deep Web

The Beginning of the Internet

The Deep Web

The Dark Web

Criminals

Law Enforcement

Privacy

Journalism

Drugs and Illegal Substances

Counterfeit Goods

Stolen Information

Hackers

Summary

Chapter 3 Dark Web Access with Tor Browser

Tor Browser

Installing Tor on Linux

Tor Project Recommendation

The Mysterious Wiki

Chapter 4 The Dark Web’s Perils

Online Scams

Avoiding the Risks of a Dark Web Market

The Dark Web’s Perils

Access

Use and Misuse

The Truth about the Risks

Some General Dangers

Summary

Chapter 5 Cybercrime on the Dark Web

Categories of Cybercrime

Computer Fraud

Business Email Compromise

Data Infringe

Denial-of-Service

Malware

Email Account Compromise

Phishing

Ransomware

BadRabbit

Locky

NotPetya

Cyberterrorism

Cyberwarfare

Cyber Extortion

Using the Dark Web for Cybercrime

Drugs

Human Trafficking, Sex Trade, and Pornography

Weapons

Fake Documents

ATM PIN Pad Skimmers and ATM Malware

Counterfeit Currency

Data Dumps

Fake Websites

Exploit Kits

Data Exfiltration

Cybercrime Profitability

Extortion

Phishing

Adverts

Identity Theft by Using Login Information

Premium-Rate SMS

Banking Malware

Money Laundering and Malware-as-a-Service

Exploit Writers

Bot Herders

Malware Writers

Money Laundering

Summary

Chapter 6 Red Room Deep Web

What Is the Red Room Deep Web?

What Is Available on the Red Room Deep Web?

Child Pornography

Murder

Rape

General Torture

Chat

How to Join the Red Room Deep Web?

Red Room Deep Web Pricing Plans and Payment Methods

Is Accessing Red Room Deep Web Illegal?

Why Is the Red Room Considered Non-Existent?

Deep Web Links to Access the Red Room

Chapter 7 Terrorist Acts on the Surface and Dark Web

Introduction

Terrorists’ Online Activities

Propaganda

Propaganda and Social Media

Propaganda and the Dark Web

Content of Propaganda

Rhetorical Structures of Terrorist Websites

Crime as a Service

Communications

Dark Web and Encrypted Communication

Mail2Tor

Signal

Telegram

Surespot

Wickr

Zello

WhatsApp

Kik

Steganography, Internet Memes, and Watermarking

TerroristCrypt

Video Games

Email Dead Dropping

Cybersecurity in Voice Communication

Terrorist Media

Social Media and Surface Web

Twitter

YouTube

Facebook

Pinterest

Tumblr

Instagram

Ask.fm

Online Terrorist Recruitment

Surface Web

Social Media

Websites and Chat Rooms on the Internet

Video Games

Covert Recruitment and Training

Cyberterrorism

Concluding Remarks

Chapter 8 Dark Web Markets

Introduction

Dark Net Black Markets

Characteristics and Features

Goods and Services

Multisignature or Trusted Markets

Escrow Markets

‘Finish Early’ Markets

Invite/Referral Markets

Charges, Transactions, and Payments

Cryptocurrencies

Comparing Cryptocurrencies and Fiat Currencies

Cryptocurrencies and Digital Currencies Differences

How to Obtain Cryptocurrencies

Mining

Trading/Exchanging

Popular Cryptocurrencies

Bitcoin

Ethereum

Litecoin

Monero

Dash/Darkcoin

Active Markets

Wall Street Market

Dream Market

Nightmare Market

Empire Market

Point/T•chka Free Market

Silk Road 3.1

Cannabis Growers and Merchants Cooperative (CGMC)

Berlusconi Market

The Majestic Garden

Hydra

WayAway

RuTor

Cannazon

Active Vendor Shops

CharlieUK

DutchDrugz21

RechardSport

ElHerbolario

Gammagoblin-Pushing Taboo

The Church-Jesus of Rave (JOR)

ToYouTeam

The French Connection

EU Cocaine

GlassWerkz

Cocaine Market

ChemSpain

MaghrebHashish

Vendors and Markets That Are Full of Dead or Scammed People

AlphaBay

Agora

Evolution

Hansa Market

Outlaw Market

Aero Market

Libertas Market

TheRealDeal Market

Mercado Negro

Valhalla (Silkkitie)

Apple Market

Your Drug

Stoned 100

QualityKing

Fight Club

L33TER

Agora Market and Forum

Atlantis

Caravan Marketplace

Darknet Heroes League

The RealDeal Market

Sheep Marketplace

Russian Anonymous Marketplace

UK Guns and Ammo

USA/EU Fake Document Store

The Dark Web is a Market for Illegal Goods and Services

Drugs

Weapons

Communication Channels for Terrorists

Hacking

Assassinations

Fraud

Fake IDs/Driving Licenses

Illegal Wildlife Trade

Child Porn

Malware for Sale

Botnets

BTC Laundry

Information about Government and Celebrity Officials’ Secrets is Being Leaked

BTC and Cryptocurrency Fraud

Terrorism

Policing the Dark Markets

Expectations Over the Next Five Years

Chapter 9 We Are Anonymous: We Do Not Forget We Do Not Forgive

Project Chanology

Operation Payback

Operation Tunisia

OpEgypt

The HBGary Hack

OpBART

Occupy Wall Street

Chapter 10 Hitman for Hire

The Con Artist of the Besa Mafia

Russia’s Top Female Anticorruption Investigator was Shot and Killed in the Street

Sinaloa Cartel Hitman

Dark Mambia

Criminal Network

The Black Mob

Mara Salvatrucha

Assassination Network

Hitman from Murder Incorporated

Summary

Chapter 11 The Positive and Evil Side of the Dark Web

Onion Websites

Dark Web Black Market Transactions Involving the Use of Bitcoin

Chapter 12 Techniques for Analyzing Dark Web Content

Introduction

Deep Web versus Surface Web

Mechanisms of Conventional Web Crawlers

Surfacing Deep Web Content

Data Extraction

Schema Matching for Sources

Data Selection

Deep Web Websites Analysis

A Deep Web Website Search Analysis’s Eligibility

The Number of Deep Web Websites: An Analysis

Deep Web Size Analysis

Analyze the Types of Content

Analyze the Popularity of the Website

Log Analysis

Summary

Chapter 13 Information Extraction from Dark Web Contents and Logs

Introduction

Examining Web Content and Logs

Web Content Analysis

Benefits of Content Analysis

Policy Guidelines for Log Analysis

Risk Assessment

Risk Assessment and Mitigation Duties and Responsibilities

Risk Mitigation

Web Content Logs Are the Responsibility of the Person in Charge of Them

Log Analysis Tools

Using the Hadoop Framework Has Many Benefits

Analyzing Files

Unstructured Data Analysis and Information Extraction

Summary

Chapter 14 Dark Web Forensics

Introduction

The Basics of Forensic

The Dark Web’s Crypto Market and Cryptocurrencies

Money Laundering and Cryptocurrencies

ATMs for Bitcoin

Bitcoin Mixers

Monero

Bitcoin Property Exchanges

Schemes for Laundering Cryptocurrency Exposed

Bitcoin-Laundering Arrests

BTC-e

Models and Scope of Forensic Investigations

Scope

Policy and Procedure Making

Evidence Assessment

Evidence Acquisition

Examination of Evidence

Documentation and Reporting

Models for Digital Forensics

Digital Forensics Model (Abstract)

Investigative Model for Digital Forensics

Process of Integrated Digital Investigation

Forensic Toolkit

Anti-Forensics Analysis

Search Engine Characteristics

Detection of Virtual Machines and Sandboxes

Summary

Chapter 15 OsInt Opensource Intelligence

Introduction

Open-Source Intelligence

Security Intelligence and Its Challenges

Dark Web Security Intelligence Companies

Cybercrime-as-a-Service

Increasing the Return on Investment (ROI) for Cyber Weapons on the Dark Web

Intelligence-Gathering Focus

Hacking-as-a-Service

Stolen Intellectual Property

For Sale: Exploits

Vulnerabilities for Sale

Stolen Financial Data

Campaigns for Spam and Phishing

Threat Intelligence on the Dark Web and Its Value

Security Intelligence’s Challenges

Monitoring Tools for Open-Source Intelligence

Recon-Ng

Maltego

The Harvester

Shodan

Google Dorks

Data Gathering

Direct Conversations

Chat Rooms

Advanced Search Queries

Market Listings

The Difficulties of Collecting Data from the Dark Web

Summary

Chapter 16 Emerging Dark Web Trends and Mitigation Techniques

Introduction

Recent Dark Web Evolution

Enhanced Security, Privacy, and Usability

Improvements in User Interface Design

Trust-Based Markets

Continuity

Crime Patterns

Terrorism on the Dark Web

Money Laundering via Cryptocurrencies

Botnets for Hire Are Increasingly Popular

Growth of Hacking-as-a-Service

Increased Malware for Sale Listings

The Black Market for Ivory and Rhino Horn

Preferred Cryptocurrencies

Stolen Data Listings for Sale

Threat Mapping

Fortinet

Norse

Checkpoint

FireEye

Arbor Networks

Threat Map by Kaspersky

Akamai

Trend Micro

Cutting-Edge Mitigation Techniques

Network Investigation Techniques

Memex

Some Conventional Techniques

Informants

Operation Undercover

Individuals’ Tracking

Postal Interception

Cyber Patrols

Disruptions in Darknet Trade

Summary

Chapter 17 The Dark Web’s Future

What Does the Deep Web’s Future Hold for Us?

Dark Web Currency

The Tor Project

Dark Web Markets

ZeroNet

Public Interest in the Dark Web

Summary

Chapter 18 Your Business on the Dark Web

Business Companies

IT Professionals

Law Enforcement Agencies

Cybersecurity Professionals

Military Organizations

Summary

Glossary

Bibliography

Index

Polecaj historie