{"id":84948,"date":"2023-06-29T11:00:27","date_gmt":"2023-06-29T09:00:27","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=84948"},"modified":"2023-07-25T09:27:16","modified_gmt":"2023-07-25T07:27:16","slug":"deep-and-dark-web","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/deep-y-dark-web\/","title":{"rendered":"Deep and Dark Web"},"content":{"rendered":"<h2 class=\"wp-block-heading\"><strong>The Deep and Dark web<\/strong><\/h2>\n\n\n\n<p>They are two concepts that are quite related for most people. You automatically think of (cyber)crime, drugs, weapons and a long list of criminal elements. People who have that in mind are simply wrong. The reality is that both concepts do not necessarily have anything to do with each other. It could be said that they are only united by the fact of being part of the immense and infinite cyberspace.<\/p>\n\n\n\n<p>On the one hand, the <strong>Deep Web<\/strong> It is that part of the Internet that you enter using <strong>any conventional browser<\/strong> and <strong>after passing some kind of<\/strong> <strong>authentication<\/strong>For example, the personal bank account, the Amazon account, Telegram, WhatsApp... What&#039;s criminal there?<\/p>\n\n\n\n<p>On the other hand, we have the <strong>Dark Web<\/strong>, that part of the internet is not as easily accessible as the previous one. In this case, a <strong>special browser<\/strong>For example, the well-known <strong>Tor Browser<\/strong>. In this Dark Web we have many resources and they are all common to those that we can find in both the Surface and Deep Web, the only difference would be that the <strong>browsing is anonymous<\/strong>.<\/p>\n\n\n\n<p>As with everything, if someone wants, they can take advantage of it to do evil. But this happens on the street, as well as on the internet, whether Surface, Deep or Dark Web. The fact is that, since someone wants to use the Internet to commit a criminal act, they will try to hide as much as possible. And how do you get that? Making use of the <a href=\"https:\/\/es.wikipedia.org\/wiki\/Darknet\" target=\"_blank\" rel=\"noreferrer noopener\">darknets<\/a> available, such as the Tor network.<\/p>\n\n\n\n<p><strong>On the Dark Web you can find everything humanly imaginable.<\/strong> starting with the best known as they can be <strong>drugs<\/strong> and <strong>weapons<\/strong>, passing through services of <strong>hackers<\/strong> <strong>malicious<\/strong> and purchase of <strong>money<\/strong> <strong>fake<\/strong> and ending with the purchase of <strong>organs<\/strong> for transplants, hiring <strong>hitmen<\/strong>, <strong>kidnappings<\/strong>, And a long etcetera.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The cradle of cybercrime<\/strong><\/h2>\n\n\n\n<p>In this article we focus on the threat actors who take advantage of this anonymous network to create their own cybercrime niches.<\/p>\n\n\n\n<p>A threat actor is a real individual, group or organization that operates with malicious intentions and different motivations such as political, economic or protest, among others.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><u>Markets<\/u><\/strong><\/h2>\n\n\n\n<p>These threat actors operate regularly and openly on the Dark Web. <strong>One of the most common platforms in this type of darknets are Markets<\/strong> of access credentials obtained by botnet-type malware. There are countless of them, however, one of the <strong>best known is Genesis Market<\/strong>. The prices of this Market range between approximately five and 150 dollars per set of credentials and offer the possibility of searching by website or by type of platform. For example, doing a search for Amazon credentials obtained in Spain.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"709\" height=\"355\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen1.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84950\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen1.png 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen1-300x150.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen1-123x62.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen1-500x250.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen1-200x100.png 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n\n<p>Once the credentials pack is accessed, all kinds of useful information appears, including:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>He <strong>country<\/strong> of origin of the affected system<\/li>\n\n\n\n<li>The first two octets of the <strong>IP adress<\/strong><\/li>\n\n\n\n<li>He <strong>OS<\/strong> of the affected device<\/li>\n\n\n\n<li>All the <strong>domains<\/strong> for which malware has <strong>stolen credentials<\/strong><\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"709\" height=\"349\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen2.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84951\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen2.png 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen2-300x148.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen2-123x61.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen2-500x246.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen2-200x98.png 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n\n<p>In this example above, all credentials would be sold for $33.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><u>Forums <em>Underground<\/em><\/u><\/strong><\/h2>\n\n\n\n<p>On the other hand, there are the famous <strong>forums <em>underground<\/em><\/strong> where you can also find everything, however, the most difficult thing is the <strong>sales of RDP type accesses<\/strong> (Remote Desktop Protocol), <strong>VPN<\/strong> (Virtual Private Network), accounts <strong>Domain Controllers<\/strong>, of <strong>Active Directory<\/strong>, etc.<\/p>\n\n\n\n<p>Many threat actors gain this type of access and use it to enter companies&#039; infrastructure and carry out attacks, usually ransomware. Other threat actors only obtain them and then offer them for sale for amounts of money that range from one hundred dollars and can sometimes reach up to two hundred thousand dollars. Of course, access to a network from a large company is not the same as access to a much smaller one since the gain in case of success will also be proportional.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"709\" height=\"221\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen3.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84952\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen3.png 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen3-300x94.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen3-123x38.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen3-500x156.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen3-200x62.png 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"216\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-1024x216.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84953\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-1024x216.png 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-300x63.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-768x162.png 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-123x26.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-500x105.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-800x169.png 800w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-1280x270.png 1280w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4-200x42.png 200w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen4.png 1285w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"207\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen5.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84954\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen5.png 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen5-300x88.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen5-123x36.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen5-500x146.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen5-200x58.png 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen6.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84955\" width=\"689\" height=\"333\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen6.png 445w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen6-300x145.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen6-123x59.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen6-200x97.png 200w\" sizes=\"(max-width: 689px) 100vw, 689px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"392\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen7.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84956\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen7.png 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen7-300x166.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen7-298x165.png 298w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen7-123x68.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen7-500x276.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen7-200x111.png 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n\n<p>All are examples of access sales in Deep and Dark Web forums. As you can see, the threads are updated regularly, even indicating what has already been sold at a given time and is no longer available.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><u>Ransomware groups<\/u><\/strong><\/h2>\n\n\n\n<p>Something that has resonated a lot since the pandemic in 2020 are ransomware groups and their walls of shame or \u201cHall of shame\u201d. Ransomware groups use these platforms to openly publish the information of victims of threat actor groups who have hijacked and\/or encrypted their information.<\/p>\n\n\n\n<p>Among the most common ransomware groups we have Lockbit 3.0, BlackBasta and Play Ransomware. Each and every one of them offers their exfiltration website so that whoever wishes can access and view the data stolen from their victims.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"443\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen8.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84957\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen8.png 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen8-300x187.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen8-264x165.png 264w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen8-123x77.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen8-500x312.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen8-200x125.png 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Illustration 1. Lockbit Wall of Shame.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"346\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen9.png\" alt=\"Deep and Dark Web\" class=\"wp-image-84958\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen9.png 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen9-300x146.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen9-123x60.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen9-500x244.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen9-200x98.png 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Illustration 2. BlackBasta Wall of Shame<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"524\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen10.jpg\" alt=\"Deep and Dark Web\" class=\"wp-image-84959\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen10.jpg 709w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen10-300x222.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen10-223x165.jpg 223w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen10-123x91.jpg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen10-500x370.jpg 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/postimagen10-200x148.jpg 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Illustration 3. Play Ransomware wall of shame.<\/p>","protected":false},"excerpt":{"rendered":"<p>The Deep and Dark web are two concepts that are quite related for most people. You automatically think of (cyber)crime, drugs, weapons and\u2026 <a title=\"Deep and Dark Web\" class=\"read-more\" href=\"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/deep-y-dark-web\/\" aria-label=\"Read more about Deep and Dark Web\">Read more<\/a><\/p>","protected":false},"author":1147,"featured_media":73409,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-84948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/84948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1147"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=84948"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/84948\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/73409"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=84948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=84948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=84948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}