50 Shades of Dark….Threat Intelligence Reveals

There’s a lot of talk about the dark web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials.
Using open source intelligence (OSINT), “Recorded Future”  team explored the surface, deep, and dark parts of the web and investigated the links between them.
What the dark, deep, and surface web really are and why your information security team should care.
How stolen credit card information, credentials, and even exploit kits are marketed.
How OSINT sheds light on the darker parts of the web to help identify malicious activity.

Below  Free White Paper on: How You Can Use the Dark Web for Threat Intelligence

Summary Report

There is a lot of talk about the Dark Web these days, not least about how cybercriminals use it to spread malware, leak intellectual property, and publish user account credentials.”Recorded Future” decided to explore the Surface, Deep, and Dark parts of the Web to see what information is available and how it is connected. What they found was that there really is no sharp border between them. Information tends to seep into the Surface Web from its darker parts, and it is more appropriate to talk about one Web, with di erent shades of darkness. The logic behind this is that brokers of illicit information on the Dark Web need to market their products, and hence need to post links to them on the Surface Web (Brian Krebs has noted the same1).Using Recorded Future’s real-time threat intelligence we can identify paste sites and forums as primary nodes of communication between the Surface and Dark Web, and show how these are used to link to both TOR/Onion sites and various download sites.This connectivity allows us to harvest and analyze metadata (such as link patterns, activity levels, and topics) about the Dark Web from the Surface Web, giving us access to valuable information for threat analysis.

Full Report 50-shades

About chainsoff.

Intelligence Media Service, Monitors and Analyzes Extremists’ activities, including and not limited to: The Muslim Brotherhood, Kurdish Terrorism, Syrian Politics, Jabhet Al-Nusra, Hezbollah, Cyber Crime, and Taliban activities in Syria. Well known for her deep knowledge on Terrorism. Open Source Exploitation expert in the discovery, collection, and assessment of foreign-based publicly available information, also known as Open Source Intelligence (OSINT), HIMNT
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s