Article Details

Scrape Timestamp (UTC): 2024-07-09 11:05:17.608

Source: https://thehackernews.com/2024/07/humint-diving-deep-into-dark-web.html

Original Article Text

Click to Toggle View

HUMINT: Diving Deep into the Dark Web. Clear Web vs. Deep Web vs. Dark Web Threat intelligence professionals divide the internet into three main components: According to Etay Maor, Chief Security Strategist at Cato Networks, "We've been seeing a shift in how criminals communicate and conduct their business, moving from the top of the glacier to its lower parts. The lower parts allow more security." Spotlight: What is Tor? Tor is a free network, built upon open-source, that allows for anonymous communication. While Tor was originally developed by the United States Naval Research Laboratory, it has become an increasingly popular solution for illegal activities. Conducting these activities on the Clear Web can lead to law enforcement monitoring and allow tracing back to the criminal. But through Tor, communication is encrypted across three layers that are peeled off at every node jump until exiting the network. Law enforcement agencies monitoring Tor will not see the criminal's IP, but the Tor exit node, making it harder to trace back to the original criminal. Tor communication architecture: Etay Maor adds "In the 2000s, a celestial alignment of digital capabilities boosted criminal efforts. First, the Dark Web emerged. Then, hidden and secure services through Tor. Finally, cryptocurrency allowed for secure transactions." Criminal Services Available on the Dark Web Here are a few examples of services that were available on the dark web in the past. Today, many of these have been taken down. Instead, criminals are moving towards the Telegram messaging platform, due to its privacy and security features. Example include - Drug selling: Fake identity services: Marketplace for vendor search, including a warning about phishing attempts: How are Criminal Forums Managed? Creating Trust in an Untrusted Environment Attackers attempt to exploit vulnerabilities and break into systems as a way to turn a profit. Just like any other commercial ecosystem, they use online forums to buy and sell hacking services. However, these forums need to create trust among members, while they themselves are built on crime. Generally speaking, such forums were initially designed as follows: The Path from Malware Infection To Corporate Data Leak in the Dark Web Let's see how the different stages of attack are represented in the Dark Web, through an example of malware used to steal information for ransomware purposes: Pre-incident phases: 1. Data Collection - Threat actors run worldwide infostealer malware campaigns and steal logs of compromised credentials and device fingerprints. 2. Data Suppliers - Threat actors supply data to Dark Web markets specializing in credentials and device fingerprinting from malware-infected computers. 3. Fresh Supply - The logs become available for purchase in the Dark Web market. The price of a log typically ranges from a few dollars to $20. Active incident phases: 4. Purchase - A threat actor specializing in initial network access purchases the logs and infiltrates the network to elevate access. Many times the information purchased includes more than credentials. It includes cookie sessions, device fingerprinting and more. This allows mimicking the victim's behavior to circumvent security mechanisms like MFA, making the attacks harder to detect. 5. Auction - The access is auctioned in a Dark Web forum and purchased by a skilled threat group. Etay Maor notes, "Auctions can be run as a competition or as "Flash", meaning a threat actor can purchase immediately without the competition. Serious threat groups, especially if they are backed by nation states or are large criminal gangs, can use this option to invest in their business." 6. Extortion - The group executes the attack, placing ransomware in the organization and extorting it. This path highlights the various areas of expertise within the criminal ecosystem. As a result, a multi-layered approach fueled by operationalizing threat data can alert and possibly prevent future incidents. The Role of HUMINT Automated solutions are indispensable for fighting cyber crime, but to fully understand this realm, human intelligence (HUMINT) is required as well. These are cyber crime officers, the actors from the law enforcement agencies who log into forums and act like trade actors. Engagement is an art, and also has to be an ART - Actionable, Reliable and Timely. Let's see some examples of the forums tracked by cyber crime officers and how they respond. In this example, an attacker is selling VPN logins: The cyber-criminal officer will try to engage and understand which VPN or client this belongs to. In another example, an attacker is selling Citrix access to an IT infrastructure Solutions and Services Provider in the UK. A cyber crime officer might reach out as a potential buyer and ask for samples. Since the seller is acting from an economic point of view, and might not be in a good financial situation (coming from former-USSR countries), they will be willing to send samples to promote a sale. Protecting Against Network Attacks The Dark Web operates as an economic ecosystem, with buyers, sellers, supply and demand. Therefore, effective protection against network attacks requires a multi-layered approach for each stage of the attack, both pre-incident and throughout the incident itself. Such an approach includes the use of automated tools as well as HUMINT - the art of engaging with cyber criminals online to gather intelligence by mimicking the way they operate. To see more fascinating examples and hear more details about HUMINT and Dark Web forums, watch the entire masterclass here.

Daily Brief Summary

CYBERCRIME // Exploring Cybercrime Dynamics: From Dark Web to HUMINT Engagement

The internet is categorized into the Clear Web, Deep Web, and Dark Web, with increasing levels of anonymity and security in lower layers.

Criminals increasingly use the Tor network for its strong anonymity, which complicates tracking by law enforcement.

Dark Web forums are commercial ecosystems where criminals trade services and goods, including malware and stolen data.

Various stages of malware attacks culminate in ransomware deployment and data extortion, often sold in Dark Web auctions.

Human Intelligence (HUMINT) is vital for understanding and engaging with cybercriminal communities to prevent cybercrimes.

Automated tools, combined with HUMINT, create a robust defense against the sophisticated economic ecosystem of the Dark Web.

Law enforcement agents actively engage with online criminal forums to gather actionable, reliable, and timely intelligence.

Examples include undercover operations where officers mimic cybercriminals to gather essential data on ongoing cyber threats.