The Dark Web

The dark web, also known as the dark net, refers to the hidden portion of the internet that can only be accessed through specialised software and tools, such as the Tor browser. While the dark web is often associated with illicit activities, it also has legitimate uses, such as providing an inconspicuous platform for certain entities to communicate and share information anonymously.

Understanding the dark web is crucial to cybersecurity, as it can be a breeding ground for various cyber threats, including the sale of stolen data, malware distribution, and the coordination of elaborate cyber-attacks. By familiarising yourself with the dark web and the tactics threat actors use, you can better prepare yourself and your organisation to mitigate the risks posed by this hidden corner of the internet.

Cybersecurity Education and Training Begins Here

Start a Free Trial

Here’s how your free trial works:

  • Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure
  • Within 24 hours and minimal configuration, we’ll deploy our solutions for 30 days
  • Experience our technology in action!
  • Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks

Fill out this form to request a meeting with our cybersecurity experts.

Thank you for your submission.

What Is the Dark Web?

The dark web refers to the hidden and encrypted portion of the internet that’s inaccessible through traditional web browsers. It is a part of the deep web, which encompasses all the content on the internet that is not indexed by search engines and inaccessible through standard search queries.

The dark web is a network of hidden websites and services that operate on specialised software and protocols, such as the Tor browser. These websites and services are typically identified by their unique .onion domain extensions, designed to conceal the actual location and identity of the website’s operators.

The dark web is often used for both legitimate and illicit purposes. On the legitimate side, it can be used by journalists, activists, whistleblowers, and others who value privacy and anonymity to communicate and securely share information without fear of surveillance or censorship. This is particularly important in regions with authoritarian regimes or where free speech is restricted.

However, the dark web is also a notorious hub for various illegal activities, including the sale of illicit goods (e.g., drugs, weapons, and stolen data), the distribution of malware, the coordination of cyber-attacks, and the exchange of child exploitation material. Threat actors often use the dark web to conduct their operations anonymously, making it a significant concern for cybersecurity professionals and law enforcement agencies.

To access the dark web, users typically need to download and install specialised software like the Tor browser, which encrypts their internet traffic and hides their IP address, making it difficult to trace their online activities. While the Tor browser provides a high level of anonymity, it does not guarantee complete privacy or security, and users should exercise caution when navigating the dark web.

What Is the Dark Web Used For?

The dark web hosts a myriad of activities, spanning from wholly legitimate to highly illegal. Its uses are as diverse as the users who navigate its depths. Here’s an exploration of the various purposes it serves:

  • Anonymity and privacy: The dark web offers unparalleled anonymity for users. This feature is crucial for activists, whistleblowers, and journalists working under oppressive regimes or in situations where privacy and security are paramount.
  • The trade of illegal items: Infamous for its concealed marketplaces, the dark web facilitates transactions involving narcotics, weaponry, counterfeit products, and stolen data. These hidden bazaars operate under a cloak of anonymity but are often the focus of sophisticated law enforcement operations aimed at dismantling them.
  • Cybercrime services: Cyber criminals leverage the dark net’s obscurity to offer services from initiating DDoS attacks to crafting bespoke malware designed to infiltrate specific targets or organisations.
  • Anonymous financial transactions: The preference for cryptocurrencies on the dark web stems from further obscuring transaction details, making financial exchanges virtually untraceable and preferred for legitimate privacy concerns and illicit dealings.
  • Secure communication: Encrypted messaging services on the dark web provide secure communication channels that protect sensitive information from interception or surveillance—valued by individuals seeking privacy and organisations requiring confidentiality.
  • Access to restricted information: In countries with severe censorship laws, the dark web is vital for accessing blocked websites or resources freely without fear of reprisal.
  • Research purposes: Cybersecurity professionals often delve into the dark web to research cyber threats, track potential security breaches, and stay ahead of emerging malware trends—a testament to its importance in digital defence strategies.
  • Whistleblowing platforms: This hidden layer contains several platforms designed explicitly for whistleblowing, enabling individuals to share information about illicit activities anonymously with news organisations or watchdog groups.
  • Hosting sensitive content: From platforms advocating free speech in oppressive regimes to unsavoury content that faces legal actions worldwide, hosting services on the dark web cater to a wide array of needs—highlighting its role as a double-edged sword in digital spaces.

The range of uses of the dark net sheds light on broader societal challenges intertwined with anonymous online interactions. Its duality presents an ongoing challenge for individuals navigating it with legitimate intentions and authorities striving to curb its misuse while respecting privacy rights.

Dark Net Price Data

The prices of illegal transactions on the dark web vary depending on the type of goods or services being traded. Here are some examples of dark web prices based on data from Statista and Merchant Fraud Journal.

  • Payment processing services: Verified Stripe accounts with payment gateways are one of the most expensive offerings at $1,200, while new payment processing services like Revolut ($1,600), Switzerland online banking logins ($2,200), and Payoneer verified accounts ($200) have entered the dark web marketplace.
  • Cryptocurrency accounts: Accounts from popular platforms like LocalBitcoins ($70), ($85), Coinbase ($250), and Kraken (soaring from $250 in 2022 to $1170 in 2023) saw notable price hikes.
  • Credit card details: The average price for credit card details ranges from $1 (in the U.S., Canada, and Australia) to $20 each (in Hong Kong). However, prices for credit cards fell by 27% this year, but prices for PayPal accounts went up 194%.
  • Hacked PayPal accounts: Hacked PayPal account logins can be purchased for $150.
  • Hacked online banking logins: Stolen online banking logins for accounts with a $2,000 minimum are priced at $120.
  • Drugs: Over 50 illicit drug marketplaces operate on the dark web, with prices varying by drug and quantity.
  • Malware: The prices for malware attacks range from $70 for a low-quality batch of malicious tools to $6000 for a set of premium malware tools.
  • DDoS attacks: A 24-hour DDoS attack targeting an unprotected website with 10-50k requests per second costs an average of $45, while the same attack lasting for a month costs $850 on average.

These prices are subject to change due to various factors, such as supply and demand, the popularity of certain goods or services, and law enforcement efforts. It’s also important to note that these prices are for illegal transactions, and engaging in such activities is against the law and can result in severe penalties.

Dark Web vs. Deep Web vs. Surface Web

The internet offers a vast expanse of information living on different layers of the World Wide Web. To understand its structure, we can categorise it into three distinct layers: the surface web, the deep web, and the dark web.

Surface Web

This is the most familiar layer to everyday internet users. It comprises websites and resources indexed by search engines like Google, Bing, or Yahoo. These are publicly accessible pages that can be found using standard browsers without any special configuration—ranging from news websites and eCommerce platforms to social media networks and informational sites. The surface web represents only a small percentage of what’s available on the entire internet but is where most online activities occur.

Deep Web

Contrary to popular belief, the deep web isn’t nefarious by nature. Instead, it encompasses all content on the internet that is not indexed by traditional search engines, making it inaccessible through simple search queries. This includes private databases such as academic journals’ archives, government records, healthcare portals, and even personal email accounts.

Essentially, the deep web hosts protected or gated content requiring specific credentials (like login details) for access. While vastly larger than the surface web, most of its content is mundane data stored securely online.

Dark Web

The dark web is a concealed portion of the deep web, made accessible only through special encryption technologies like the Tor network. This layer is intentionally hidden from the general public and can only be accessed with specific software, settings, or authorisation. It’s designed to offer users complete anonymity and privacy for their online activities, which range across both lawful and unlawful spectrums.

The dark web has a reputation as a haven for criminal activities due to its focus on privacy. However, it also serves vital roles in protecting free speech, aiding in secure communication for dissidents under oppressive regimes, and allowing cybersecurity professionals to conduct anonymous research.

The Malicious Side of the Dark Web

The dark web’s anonymity and encryption make it an attractive platform for these illicit activities, as it significantly hinders law enforcement efforts to track and apprehend the perpetrators. It’s become a hub for a wide range of illegal activities and cyber crime. Some of the most prevalent illicit activities taking place on the dark web include:

  • Drug trafficking: The dark web has emerged as a major marketplace for the sale of recreational and pharmaceutical drugs, with vendors offering a wide variety of illegal substances.
  • Weapons trading: Firearms, explosives, and other weapons are also sold on dark web marketplaces, often to individuals unable to obtain them through legal channels.
  • Human trafficking: The anonymity provided by the dark web has made it a platform for the exploitation of vulnerable individuals, including sex trafficking and the sale of personal information.
  • Child exploitation: Horrifyingly, the dark web is also used to distribute child pornography and other exploitative content involving minors.
  • Stolen data and identity theft: Cyber criminals use the dark web to buy and sell stolen personal information, such as credit card details, social security numbers, and hacked account credentials.
  • Hacking and malware distribution: The dark web serves as a marketplace for hacking tools, malware, and other cyber crime services, enabling threat actors to coordinate attacks and distribute malicious code.
  • Assassination services: One of the most disturbing aspects of the dark web is the existence of “assassination markets”, where individuals can pay to have someone killed.
  • Extremist and terrorist activities: The dark web also provides a platform for the spread of extremist ideologies, the coordination of terrorist activities, and the dissemination of related content.

While the overall volume of dark web transactions remains relatively small compared to global illicit commerce, the rapid growth and severity of these crimes have become a major concern for authorities.

Threats on the Dark Web

The dark web poses a significant threat to both individuals and organisations due to the wide range of illegal and malicious activities within this hidden corner of the internet. Some of the key threats associated with the dark web include:

  • Cybercrime: The dark web is a hub for various cyber criminal activities, such as identity theft, credit card fraud, and malware distribution. Threat actors use the anonymity the dark web provides to conduct these illicit operations without fear of detection.
  • Illegal marketplaces: The dark web hosts numerous marketplaces where users can buy and sell a wide range of illegal goods and services, including drugs, weapons, stolen data, and even contract killings.
  • Malware distribution: Cyber criminals leverage the dark web to distribute malicious software, such as ransomware, viruses, and trojans, which can infect users’ devices and compromise their personal and financial information.
  • Scams and fraud: Many dark web websites are designed to steal users’ personal information or money through various scams and fraudulent activities.
  • Exploitation and trafficking: The dark web has become a platform for the exploitation of vulnerable individuals, including human trafficking and the distribution of child pornography.
  • Extremism and terrorism: The dark web also provides a haven for the spread of extremist ideologies and the coordination of terrorist activities.
  • Surveillance and monitoring: While the dark web offers a high degree of anonymity, it is not entirely free from authority oversight. Law enforcement agencies and intelligence services have been known to infiltrate and monitor dark web activities, potentially putting users at risk of being identified and prosecuted.

The anonymity and encryption provided by the dark web make it an attractive platform for these illicit activities, as it significantly hinders law enforcement efforts to track and apprehend the perpetrators.

Is It Illegal to Access the Dark Web?

Accessing and browsing the dark web is generally not illegal. The dark web is a part of the internet that can only be accessed through specialised software and has legal and illegal uses. The legality ultimately depends on the user’s specific actions and intentions, not merely the act of accessing the dark web itself.

While the dark web is often associated with illicit activities such as the sale of drugs, weapons, stolen data, and other contraband, simply accessing the dark web is not against the law. However, the anonymity provided by the dark web can enable users to engage in illegal activities, and law enforcement agencies do monitor dark web activity. In turn, it’s crucial for individuals to exercise caution and only use the dark web for legitimate and legal purposes, such as protecting their privacy, accessing censored information, or communicating securely.

How to Access the Dark Web Safely

Accessing the dark web requires specialised software and tools to maintain anonymity and security. The key steps to safely access the dark web are:

  1. Download the proper web browser: The most commonly used browser for accessing the dark web is the Tor Browser. Tor is designed to anonymise your online activity by encrypting your data and routing it through a network of volunteer relays around the world, making it difficult to trace your identity and location.
  2. Configure your browser settings: Once you have an appropriate browser installed, you should configure the settings to enhance your privacy and security. This includes adjusting permissions, enabling cookie and site data controls, and setting up user authentication preferences.
  3. Choose a suitable search engine: While regular search engines like Google cannot access the dark web, there are specialised search engines designed for the dark web, such as DuckDuckGo, Ahmia, and Torch. These search engines can help you find relevant websites and content on the dark web while maintaining your anonymity.
  4. Anonymise your searches: When using a dark web search engine, be sure to enable the “Onionize” or anonymisation feature to further protect your identity and online activities.
  5. Exercise caution: The dark web is an unregulated and potentially dangerous environment, so it’s crucial to exercise extreme caution when accessing it. Avoid clicking on suspicious links, downloading unknown files, or engaging in any illegal activities.
  6. Use a VPN: While not strictly necessary, using a reputable VPN service in addition to the Tor Browser can provide an extra layer of security and anonymity when accessing the dark web.
  7. Avoid accessing the dark web on mobile devices: Never use mobile devices like smartphones or tablets to access the dark web, as they may not provide the same level of security and anonymity as a dedicated dark web browser on a desktop or laptop computer.

By following these steps and maintaining a cautious and vigilant approach, users can safely explore the dark web for legitimate purposes, such as accessing sensitive information, communicating securely, or conducting research. However, it’s essential to understand the risks and avoid engaging in illegal activities, as the dark web hosts a wide range of illicit content and services.

The Role of Cybersecurity on the Dark Net

Cybersecurity professionals play a crucial role in monitoring and mitigating the threats that originate from the dark net.

  • Threat intelligence gathering: Cybersecurity experts closely monitor the dark net to gather intelligence on emerging cyber threats, new hacking techniques, and cyber criminal activity. This information is used to proactively defend against potential attacks and inform security strategies.
  • Vulnerability identification: By analysing the content and discussions on dark net forums and marketplaces, cybersecurity professionals can identify vulnerabilities in systems, software, and processes that threat actors may attempt to exploit. This allows organisations to address these weaknesses before they can be exploited.
  • Incident response and mitigation: When data breaches or other security incidents are detected, cybersecurity teams leverage their dark web intelligence to investigate the source of the attack, understand the tactics used, and implement appropriate countermeasures to mitigate the impact and prevent future occurrences.
  • Collaboration with law enforcement: Cybersecurity experts work closely with law enforcement agencies to share intelligence and support investigations into dark net-related criminal activities.
  • Developing defensive strategies: The insights gained from monitoring the dark net enable cybersecurity professionals to develop more robust and proactive security strategies, including the implementation of advanced threat detection and response capabilities, employee security awareness training, and the adoption of secure communication and collaboration tools.
  • Ethical hacking and penetration testing: Some cybersecurity experts may engage in ethical hacking or penetration testing activities on the dark net to better understand the tactics and techniques used by threat actors, which can then be used to strengthen an organisation’s defences.

By actively monitoring and analysing the dark net, cybersecurity professionals play a vital role in protecting organisations and individuals from the growing threats that originate from this hidden corner of the internet.

Their efforts help to identify, mitigate, and prevent a wide range of cyber-attacks, ultimately enhancing the overall cybersecurity posture of the organisations they serve.

Ready to Give Proofpoint a Try?

Start with a free Proofpoint trial.