Nation-state actors, too, leverage darknets for espionage and cyber warfare, capitalizing on the obscurity and untraceability they provide. First, there’s the built-in risk of becoming the victim of a scam or buying counterfeit products when purchasing products from underground vendors. Inadvertently buying ineffective COVID-19 protective gear and dangerous remedies from unregulated sellers could physically harm buyers.

Indicators Of Compromise In Threat Intelligence
The platform’s popularity continues to grow, attracting both new and returning customers. Valued at approximately $15 million, Abacus Market is one of the most lucrative platforms in the dark web ecosystem. In 2024, the platform grew significantly in popularity, partly because of its strategic acquisition of users from a number of recently shut-down marketplaces, such as AlphaBay and Incognito Market, which had recently closed their doors. To expand their reach, some marketplaces established parallel channels on Telegram. This further complicates monitoring efforts because now you need to search for the related Telegram channels and track activity there and on the marketplace itself. Still, wherever you have anonymous traffic on hidden networks, the criminal activity will follow.

This can be done by monitoring forums and darknet sites where threat actors are most likely to lurk, discuss upcoming threats, and put exploits up for sale. A hacker recently posted exploits for over 49,000 vulnerable Fortinet VPNs on a forum, for example, some of which belonged to prominent telecoms, banks and government organizations. This was followed by a second forum post in which another threat actor exposed plaintext credentials for all the VPN devices for any adversary to exploit.
Acronis Cyber Protect Cloud: New Version C2505
Their presence can make you wonder why darknet markets and not just the regular online stores. The Silk Road was an online black market where users could buy and sell illicit goods anonymously. The first widely used dark web marketplace, Silk Road operated via darknets, anonymous networks that can only be accessed with specialized software like Tor Browser. Trend Micro Research has been investigating these spaces for around a decade, and business in these markets mostly revolves around the selling of malware, compromised accounts, electronics, and huge databases of valuable information. In 2019, changes in the public sphere provoked changes in the underground markets as fake news and cyberpropaganda services proliferated. Avenues of communication changed, along with the way forums and marketplaces operate.
Unit 42 Global Incident Response Report: Social Engineering Edition

Black marketing in vehicle/cooking fuel became widespread during the 2015 Nepal blockade; even after it was eased and petrol imports resumed, people were not getting the fuel as intended and resorted to the black market. At KELA, we help you identify and mitigate risks by providing actionable intelligence from the darknet. Our solutions empower you to monitor illicit darknet marketplaces and track emerging threats, ensuring you can take proactive measures to protect your organization and reputation.
How Quantum Computing Will Reshape Today’s Cybersecurity
These vendors offer to either support customers in putting together fake websites that allow them to lure victims into disclosing their personal information, or simply provide stolen personal information. The stolen information can be used to file for unemployment benefits or obtain loans. Some vendors go a step further and offer support in the fraudulent benefits application process. One example of the uncertainties that surround protective gear effectiveness comes from one of the encrypted channel platforms we monitored during the first few days of the pandemic. Demand for facemasks was very high at that time, and people around the world were scrambling to find facemasks for personal use.

Dark Web Marketplaces: How Illegal Goods Are Bought And Sold

On the bright side, security professionals and threat analysts can tap into this intel to identify and patch system weaknesses before threat actors can exploit them. Darknet vendors are also selling medications and cures, including effective treatments, like Remdesivir, and ineffective treatments, like Hydroxychloroquine. While governments and suppliers faced difficulties in meeting demand for facemasks, several vendors on these platforms posted ads offering large quantities of facemasks. We have simplified the cybersecurity assessment process and made it accessible for all businesses. IRS special agents recovered more than $3 billion in cryptocurrency from his home, stolen from Silk Road in 2012.
- Impreza provides an affordable hidden space for black websites to base their operations.
- Dark web commerce sites have the same features as any e-retail operation, including ratings/reviews, shopping carts and forums, but there are important differences.
- After all, criminals are getting more creative and professional by the day, running their operations like businesses with customer service and even reviews.
- Likewise, law enforcement agencies each day continue to fine-tune their strategies to get past these networks.
- To secure against these risks, organizations invest in robust cybersecurity strategies, conduct regular security assessments, and educate employees to recognize and mitigate threats.
Who’s Who In The Cybercriminal Underground
In 2020, he was named alongside his colleagues as a Pulitzer Prize finalist in explanatory reporting. Previously, he worked at the New York Times and volunteered as a first responder for refugees arriving on the shores of Lesvos. A Southern California duo face federal sentencing for selling tens of thousands of fentanyl-laced pills and cocaine on the dark web. A screenshot of the marketplace shared by the DOJ in the statement showed cocaine available for bulk purchase from JoyInc on Drughub, a dark web site. Jerrell Eugene Anderson, who federal authorities allege ran a darknet methamphetamine and cocaine trafficking ring from Santa Clarita, was sentenced to 96 months in federal prison.
If you want to improve your security further, you could also use a VPN at the same time as Tor. For the most security-conscious, you can even install the Tails operating system on a flash drive and run Tor from that. That’s not entirely necessary for your first time accessing the dark web if you’re just curious, but it does provide additional layers of security that are worth considering if you continue to use the dark web in the future.

What Is The Black Market? Examples Of Products And Services
A multi-layered cybersecurity strategy incorporating Dark Web monitoring, cybersecurity risk assessments, and employee training can significantly reduce vulnerabilities. This structured process ensures security while maintaining the anonymity of both buyers and sellers, making Dark Web marketplaces a persistent challenge for cybersecurity enforcement. Following Silk Road’s closure, AlphaBay emerged in 2014, introducing advanced security features such as two-factor authentication and multi-signature escrow services to improve vendor credibility. At its peak, AlphaBay had over 400,000 users and facilitated transactions exceeding $1 billion. As part of the operation, Italian authorities also shut down two other dark web marketplaces — DeepSea and Berlusconi — arresting four alleged administrators and seizing €3.6 million ($4.17 million) in cryptocurrency.
The very first of these marketplaces to pair the darknet with Bitcoin was the Silk Road. Over the next two years, the Silk Road set the standard for darknet marketplaces. By the time it was shut down in October 2013 and Ross Ulbricht arrested, the site had traded an estimated $183 million worth of goods and services. Besides, not everyone wants to purchase an illegal item – some want items anonymously. We understand the curiosity to venture into the dark web, but you also need to understand that it’s never safe to venture into this portion of the internet without fully understanding what it entails. Policing involves targeting specific activities of the private web deemed illegal or subject to internet censorship.
Since 2020, 2easy has sold massive stealer logs with sensitive data like passwords, bank cards, and initial access credentials. It supports operations in multiple languages and operates on both clearnet and Tor. One malicious actor was selling access to a U.S. insurance company for US$1,999, and a European software company for US$2,999. While marketplaces like STYX and Russian Market continue to serve as centralized exchanges, a significant portion of the trade now occurs on Telegram—a shift that blends speed, accessibility, and perceived security.