HackDig : Dig high-quality web security articles for hacker

Dark Web users of a child porn website tracked after visiting file sharing site

The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. The DHS obtained the IP addresses of several suspects that visited a child porn site hosted in the Tor network. According to court filings, the suspects shared links to password-protected child pornography media on the  Zii
Publish At:2017-06-01 12:20 | Read:6388 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Child porn Cybercrime Dar

Red on Red: The Attack Landscape of the Dark Web

We’ve frequently talked about how limited-access networks such as the Dark Web is home to various cybercriminal underground hotspots. Hosted and accessed via the Tor network, these sites house underground marketplaces that sell various good and services, which include cryptocurrency laundering, hosting platforms for malware, and stolen/counterfeit identities
Publish At:2017-05-30 11:35 | Read:3173 | Comments:0 | Tags:Deep Web

Zomato Data breach – Nearly 17 million usernames and hashed passwords stolen

Nearly 17 million Zomato usernames and hashed passwords have been stolen by hackers., the company suspects it is an insider’s job. Nearly 17 million Zomato usernames and hashed passwords have been stolen by hackers. Zomato is the Indian largest online restaurant guide, the company confirmed data breach announcing that hackers have stolen accounts deta
Publish At:2017-05-18 16:45 | Read:3067 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web Hacking Cyber

European law enforcement takes down Darknet marketplace

Europol supported the Slovak NAKA crime unit in an operation that resulted in the seizure of the Bloomsfield darknet marketplace. Another success of the European police, last week Europol supported the Slovak NAKA crime unit in the arrest of a Slovak national believed to operate the Bloomsfield darknet marketplace dealing in drugs and arms. “Bloomsfiel
Publish At:2017-05-08 04:40 | Read:3077 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Bloomsfield Cybercrime Da

Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos

A group of researchers conducted a study on the Dark Web leveraging the Graph theory. This hidden space appears as composed by sparse and isolated silos. A group of experts from the Massachusetts Institute of Technology’s SMART lab in Singapore has recently published an interesting research paper on the Dark Web. The researchers collected and analyzed
Publish At:2017-05-02 01:40 | Read:3198 | Comments:0 | Tags:Breaking News Deep Web Hacking

The Deep Web: Myths And Truths You Need To Know

Every now and then the media comes up with a sensational story about the Deep Web. Often these tales are shocking and frightening – but are they true? What is the Dark Web and Deep Web? Before going further, we need to understand what the Deep Web actually is – fortunately the concept is much easier than you might think. Any web page that you can locate from
Publish At:2017-04-27 12:00 | Read:2602 | Comments:0 | Tags:Mobile News News dark web deep web Internet tor

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Security firm Flashpoint published an interesting paper titled, ‘Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies‘ about cybercriminal communications of threat actors. A recent research by the threat intelligence firm Flashpoint has uncovered how malicious threat actors communicate to share information between them. The r
Publish At:2017-04-21 17:25 | Read:2630 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web anonimity Cybercrime Cybe

Karmen Ransomware, a cheap RaaS service that implements anti-analysis features

Experts at Recorded Future have discovered a cheap RaaS, the Karmen Ransomware that deletes decryptor if detects a sandbox. Security experts from threat intelligence firm Recorded Future have spotted a new ransomware as a service (RaaS) called Karmen. The service allows customers to easy create their ransomware campaign in a few steps and without specific sk
Publish At:2017-04-18 15:45 | Read:2611 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Malware Cybercrime Dark W

Are you searching for stolen US University email credentials? Search on the Dark Web

According to a new research published by the nonprofit DCA, millions of stolen US University email credentials are available for sale on the Dark Web. According to a new research published by the nonprofit Digital Citizens Alliance (DCA) that searched the Dark Web for credentials from the top 300 US universities, millions of stolen email credentials are av
Publish At:2017-03-30 16:00 | Read:2385 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web black markets

Over 20 million Gmail and 5 million Yahoo accounts available for sale on the Dark Web

The vendor “SunTzu583” is offering for sale over 20 million Gmail and 5 million Yahoo login credentials on the Dark Web A vendor with the online moniker “SunTzu583” is reportedly selling millions of login credentials for Gmail and Yahoo accounts on a black market in the dark web. Over 20 million Gmail accounts and 5 million Yahoo acco
Publish At:2017-03-21 10:45 | Read:3538 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Dark Web Gmail Pl

MajikPOS Combines PoS Malware and RATs to Pull Off its Malicious Tricks

by Cyber Safety Solutions Team We’ve uncovered a new breed of point-of-sale (PoS) malware currently affecting businesses across North America and Canada: MajikPOS (detected by Trend Micro as TSPY_MAJIKPOS.A). Like a lot of other PoS malware, MajikPOS is designed to steal information, but its modular approach in execution makes it distinct. We estimate that M
Publish At:2017-03-15 13:20 | Read:2654 | Comments:0 | Tags:Deep Web Malware carding credit card theft MajikPOS POS malw

New variant of the macOS Proton RAT advertised on Russian cybercrime underground

Experts from security firm Sixgill have discovered a new strain of the macOS Proton RAT that is offered for sale on Russian cybercrime underground. The Dark Web is the right place where to find any kind of illegal products and services, malware such as banking trojan and spyware are very popular in cyber criminal underground. Recently a new remote access too
Publish At:2017-03-13 18:05 | Read:2798 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Malware Apple Cybercrime

640,000 stolen PlayStation accounts being sold on the Dark Web

The seller that goes online with moniker SunTzu583 is offering 640,000 PlayStation accounts for USD 35.71 (0.0292 BTC), it source is still a mystery. The dark web is the right place where to buy stolen login credentials to major web services, last week the colleagues at HackRead reported the sale of more than 1 million Gmail and Yahoo accounts by a seller th
Publish At:2017-03-10 13:15 | Read:2516 | Comments:0 | Tags:Breaking News Deep Web Hacking Dark Web PlayStation accounts

Is West Africa Poised for an Underground Market?

Based on an INTERPOL survey featured in a joint Trend Micro-INTERPOL research paper, West African cybercriminals stole an average of US$2.7 million from businesses and an average of US$422,000 from individuals from 2013 to 2015. Scams or various types of fraud, whether simple (like 419 or Nigerian prince scams) or complex (like business email compromise [BEC
Publish At:2017-03-10 01:15 | Read:2818 | Comments:0 | Tags:Deep Web underground West Africa

Stolen EHR data is flooding criminal underground communities in the Deep Web

EHR data are precious commodities in the cyber criminal underground because of the lack of cyber security of healthcare industry. Electronic health record databases are becoming the most precious commodities in the cyber criminal underground. The healthcare sector has been the industry with the highest number of data breaches in 2015 when a total of 113.2
Publish At:2017-02-27 12:20 | Read:2561 | Comments:0 | Tags:Breaking News Cyber Crime Cybercrime Dark Web Deep Web EHR d

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud