Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

WHAT SURFACES FROM THE DEEP, DARK WEB
SecuritybIntelligence ^ | JULY 17, 2015 | John Kuhn

Posted on 08/05/2015 1:12:24 AM PDT by nickcarraway

The terms Deep Web, Dark Web and darknet have begun piercing the bubble of popular culture. They’re used continuously in shows like CBS’ “CSI: Cyber” and “Mr. Robot” on the USA Network. While not quite as popular as terms like malware, give them some time and they’ll get there eventually.

The Deep Web is typically referenced as a place where criminals meet and sell various illegal wares first and foremost. My previous report, “Dangers of the Deep, Dark Web,” demonstrates this is indeed true. It is, however, also a place from which cybercriminals issue attacks.

Onions Have Layers One very popular platform used on the Deep Web is Tor, originally known as The Onion Router. As its name suggests, it is a layered platform built to facilitate privacy in online activity. Tor is one of the most popular anonymizing platforms on the Internet. Each peer or node that is part of Tor adds a layer of obfuscation to traffic and content, like an onion, protecting them from exposure to unintended eyes.

Once the traffic arrives at a destination, it has to be de-obfuscated to a legible form, thereby exiting the network via an exit node. Exit nodes are the connection from the Tor network to the surface Web, or the publicly accessible Internet. These nodes translate the anonymous, peer-to-peer traffic streamed between Tor nodes on the Deep Web, allowing it to reach websites on the surface Web.

Hiding Attacks in the Layers My latest report, “What Surfaces From the Deep, Dark Web,” focuses on this aspect of the Deep Web. What exactly are criminals using Tor and its exit nodes for? Are some criminals hiding behind Tor to issue attacks against corporations? The answer to that is yes, they are.

This answer is arrived at through an understanding of the exit nodes themselves, where they are placed and what their proxying capabilities are. An exit node has a legitimate purpose: It masks the IP of the original senders, allowing them to conduct their Web surfing with some degree of anonymity. Unsurprisingly, this is what some criminals use Tor for — to disguise their attacks’ content and origins.

The chart below, based on IBM Managed Security Services (MSS) data, shows a steady increase in malicious attacks from Tor, suggesting that more and more adversaries are hiding behind the program to execute attacks. What’s also interesting are the sudden peaks of traffic. We have evidence that these peaks are tied to malicious botnets that reside within Tor.

Malicious attacks from Tor have been on the rise since the beginning of 2015

Figure 1: Malicious attacks from Tor have been on the rise since the beginning of 2015. Source: IBM Security.

The report also takes a closer look at the most commonly used attacks. There are some interesting patterns emerging, from SQL injection and distributed denial-of-service (DDoS) botnets to malicious vulnerability scanning.

More Information on the Dark Web

For more detail on what we’ve learned and our recommendations on how to prevent attacks from the Deep Web, please read “What Surfaces From the Deep, Dark Web” and be sure to check out the additional reports offered in our threat research series.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS:

1 posted on 08/05/2015 1:12:24 AM PDT by nickcarraway
[ Post Reply | Private Reply | View Replies]

To: nickcarraway
Are denizens of the *Dark Web* called Darkies?


2 posted on 08/05/2015 1:28:55 AM PDT by Daffynition ("We Are Not Descended From Fearful Men")
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

and then there is Hillary’s server...


3 posted on 08/05/2015 1:35:09 AM PDT by wastoute (Government cannot redistribute wealth. Government can only redistribute poverty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

10 secs of your time

https://www.youtube.com/watch?v=nXKeNKvl-J4


4 posted on 08/05/2015 1:54:01 AM PDT by thesligoduffyflynns (https://en.wikipedia.org/wiki/Abortion_iShrimp Egg Foo Young- A tasty dish! gravy on the side please)
[ Post Reply | Private Reply | To 1 | View Replies]

bkmk


5 posted on 08/05/2015 1:57:26 AM PDT by SaveFerris (Be a blessing to a stranger today for some have entertained angels unaware)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
I've been watching Mr. Robot and find it interesting. At the very least, they get the technology correct. When they show him working at the CLI, it makes sense. The commands are what one would actually use for the task. Mostly.

Unlike just about every other TV show or movie that is supposed to be techno-edgy. I always find myself yelling at the screen, "That makes no sense! You can just get to a login on a secure system by typing in a MAC address!"

6 posted on 08/05/2015 7:44:25 AM PDT by Bloody Sam Roberts (Democracy is not freedom. Democracy is simply majoritarianism. It is incompatible with real freedom.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson