Darknet - what is it? And what does Scam List mean?

Darknet. "Other", the dark side of the Internet, surrounded by a halo of mystery and taboo. Some say it has everything from guns and stolen credit cards to live streaming of torture and slave trading. Others - that only intelligence officers and novice programmers are sitting there. So what's really going on on the dark web? And are the police doing anything about it?

The modern Internet can be compared to a huge city. A kind of metropolis, where there are a lot of quarters in which respectable citizens live - sites. A high level of culture reigns here, the order is especially vigilantly monitored. In addition, there are workers' quarters, where the culture is simpler, and they are not condemned for strong expressions and the distribution of not too decent materials. We will also tell you how to determine the Dark Web Scam List yourself.

However, as in any other city, there is a place that is hidden from prying eyes, where its own rules and laws reign, which are not at all like the generally accepted ones, and sometimes even violate them. This is where the darkest things on the internet usually happen. So it is no coincidence that this place was called Darknet, that is, the dark network. The Darknet is the most closed section of the World Wide Web, where even search robots do not enter.

An ordinary Internet user is also unlikely to get here by accident, although those who really need to get here will get where they need to without much difficulty. The more Internet censorship develops, the more the darknet becomes in demand and the more convenient the tools for working with it become.

Content on darknet links are deliberately not indexed. And if in the rest of the Internet site owners are trying to increase the rating of the site and increase its traffic, then in the dark segment they are trying to make the site as less visible to users as possible, especially to law enforcement agencies. For this, encryption, special software, as well as non-standard domain names and protocols are used. All this allows you to hide the IP addresses of the server on which the sites are located.

How the darknet works

Hidden networks exist in parallel to each other and provide anonymity by various technical means. For example, the largest of them is built on the principles of TOR (The Onion Router), or onion routing. It is a data encryption and transmission technology created by the US Department of the Navy Research Laboratory.

Another relatively well-known anonymous network is I2P (Invisible Internet Project). Enthusiasts from all over the world have been developing it since 2004. The technical basis of the project provides a higher speed than TOR, and theoretically even greater security.

However, I2P does not have the funds for rapid development. And in the current state, the tools for using this network are not convenient and simple enough for a wide audience. In terms of the number of users, I2P is significantly inferior to TOR.

What do "anonymity" and "privacy"/"confidentiality" mean on the dark web?

“Anonymity is really dead, as everyone likes to say now,” says an expert in collecting and analyzing big data. “To do something without identifying yourself is now almost impossible. But there are so-called levels of anonymity, depending on what and from whom you hide”, he says.

According to this, Tor Browser allows you to achieve a high level of anonymity for your activities on the dark web. However, the provider always knows who you are: he has your passport data. It can't track specific activities inside the dark web, it can't figure out which user inside the apartment building is there, but it always knows we're using a VPN connection or Tor Browser.

That is, the IP address is the only information available in this case to the Ministry of Internal Affairs and everyone. Therefore, inside the darknet links 2022 itself, you can remain anonymous. However, it all depends on the user - what and to whom he will tell.

Dark Web Scam List

Many people think that they will never fall for the tricks of scammers, that they are outdated and easy to figure out. But this feeling is deceptive. We list the varieties of scammers specializing in different types of attacks:

hackers (hack servers and accounts, steal and sell personal data, come up with new fraudulent schemes);

carders (buy and use stolen bank card databases);

telephone cheaters (social engineering, blackmail);

skimmers (they steal bank card data);

offline scammers (scams outside the Internet, theft of phones, bank card data, personal data);

virus writers (creation and distribution of malicious programs);

manufacturers of fake documents and scans (supply the shadow market with fake documents).

They communicate on the dark web, use each other's services, exchange information and participate in the shadow economy.

Fraudsters are not stupid or illiterate people, they have accumulated a lot of knowledge about their “craft”, they constantly exchange information, improve their skills, look for loopholes, multiply and multiply. They will come up with new non-obvious schemes. However, there is not much movement from the state or banks to protect the population in this direction, despite the fact that the police periodically come to visit the scammers.

Although there is a fairly simple solution against fraudulent call centers. Articles about bank card theft and phone scams continue to appear on the Internet, as well as disappointing statistics about the damage done by digital scammers. But it is profitable for banks to make services convenient, and these conveniences are not always associated with security. Therefore, in the near future it is better to rely only on yourself and be able to defend yourself from attacks.

Unfortunately, there is no 100% protection against scammers. Everyone can get caught. But it is possible to minimize the risks, and even better to play ahead of the curve and make possible attacks unprofitable and difficult. It is important to complete as many items from the checklist as possible in order to ensure the maximum level of protection that works in the complex.

Is it true that only criminals use the dark web?

An expert in cybersecurity explains: “The prefix “dark” in the word “darknet” does not mean that it must belong to something illegal, it only says that this is a segment of the Internet where everything works a little differently. We would translate it as "reverse" rather than "dark" side.

In addition to shady forums with illegal activities, the darknet includes a large number of resources that are not used to do something illegal: libraries without state censorship, analogues of social networks, portals for communication, and much more.

How do intelligence agencies search for people on the dark web?

“It is important to remember that on the dark web, they are not trying to deanonymize specific users, but the servers on which they communicate. Let's say I'm hosting a server in New Zealand but only making it accessible via Tor.

“So far, no one knows where it is located, everything is fine”, - says Deputy Head of the Group-IB Computer Forensics and Malicious Code Research Laboratory. - “As soon as this becomes known, special services will come to the hoster and seize the server and all the data on it. The log will show who visited the server, who is its administrator, lists of users and messages. The server is deanonymized, as a rule, due to incorrect site or browser settings: as a result, part of the data is transmitted over the open Internet, and it can be tracked.”

According to his words, specific users are searched much less often, since there is much more data on the server. Such opportunities are available only to special services that use SORM (a set of technical measures for access to mobile and network traffic) for this, and only if users exchange traffic within the same country.

What can be found on the dark web?

There are many different resources on the dark web, including:

those that specialize in database leaks and the sale of information from them: (cellular operators, banks, civil services);

anonymous mail services;

portals for communication and discussion of any (including prohibited) topics;

resources for the sale of goods, the circulation of which is limited by law or is completely prohibited;

analogues of social networks; online libraries.

Most often sold on the dark web:

database;

data from account hacks - mail, social networks, instant messengers;

settlement accounts and bank cards issued to nominees; services for "breakthrough" in the databases of companies or government services;

services for cashing and money laundering; false documents;

anonymous proxy servers;

services of various employees and insiders.

Specialists argue that the dark web mainly features various forums that have existed since the early 2000s. “There is a huge layer of the cybercriminal community that provides hacking, illegal access, DDoS attacks and database dumping services. All this can be bought, including through cryptocurrency. There are special intermediaries who guarantee the deal. Users can see the nickname and data on the number of transactions made - this is the main indicator that a person can be trusted,” notes Deputy Head of the Group-IB.

Persons carrying out offline trade in illegal goods and other criminal activities, including contract killings, also moved to the hidden segment of the Network. In January 2021, the world's largest darknet trading platform, DarkMarket, was closed in Germany.

More than 500 thousand people were registered on the site, who sold and bought illegal substances, counterfeit money, stolen credit and SIM cards. In total, they made more than 320 thousand transactions worth €140 million. The owner of DarkMarket, a 34-year-old resident of Australia, was detained, and more than 20 thousand servers in several European countries were confiscated.

How and where does data leak to the dark web?

Now the entire bases, as in the 2000s, can no longer be stolen. But the operators who work with them - in the police, the Federal Migration Service, banks, mobile operators - provide "breakthrough" services. There is a large chain of intermediaries working here. Getting a bank statement is easy. It happens like this: the operator is sitting somewhere in the region, he checks the credit history of two clients, and the third check is the very “breakthrough”, which he simply photographs on the phone. It is technically difficult to prevent this, despite the built-in protection - DLP systems.

Specialists have not yet encountered biometrics leaks, because no one yet understands how to make money on it. Many banks now want to introduce a single biometric system to issue loans remotely. If it works, then biometric data will be of interest to someone.

According to data collected by SearchInform, in 2020, 58% of companies surveyed by the developer suffered from information leaks and 16% from industrial espionage. Only 12% of them brought the case to court. In more than 40% of cases, the culprits were account managers, in 22% - accountants and financiers, in 20% - procurement and supply managers. 90% of companies said that their IT infrastructure has become much more vulnerable during the pandemic.

How to prevent your data from being leaked to the dark web?

It is impossible to completely protect yourself from a leak: otherwise you will have to abandon the mobile bank, public services and most of the documents. But you can minimize the amount of data that can fall into the hands of fraudsters:

do not post photos of documents on the Web, including e-tickets and visas;

do not publish your geolocation in the public domain, or at least do it in a private profile;

do not enter personal and payment data on suspicious sites;

do not click on links in letters and messages if you are not sure about the sender;

use varied and complex passwords for different accounts. To do this, you can use a special service for selecting passwords. Change passwords at least once every three months;

Use two-factor authentication wherever possible;

do not indicate the main phone number and email when registering on ad sites or filling out forms to receive loyalty cards and credits, participate in promotions. Instead, use an additional or virtual number (many operators have such a service);

pay attention to applications that require permissions that are not necessary for them to work (in the case of Android OS), warnings from antivirus software, and messages about suspicious activity or account logins from unknown devices.

You can check if your email and phone number are included in the merged database.

Is it possible to block sites on the dark web?

Government cannot block sites in the Tor network also because there is no one to issue orders: no DNS, no registrar, no owner of the resource. In the case of I2P and similar services, this is simply impossible technically: even if they are blocked, new ones will immediately appear. The most radical option is an analogue of the Chinese firewall: with its help, many foreign resources were blocked in the country.

There is also DPI technology for deep analysis and filtering of traffic packets. It is very expensive to implement, but if done, ISPs will be able to recognize and block all suspicious traffic. But then users will simply switch to I2P, and then somewhere else, and all the resources spent will be wasted.

What is the future of the Darknet?

The main problem of the 21st century is freedom of speech. Even the President of the United States can no longer speak freely. In fact, he was first kicked out of Twitter, then from other social networks. That is, today you cannot make free media: you will either be kicked out of content distribution platforms - YouTube, VKontakte, it doesn’t matter - or, if this is a site, it will be blocked. The domain will be taken down, IP addresses banned, and the conditional Amazon will disconnect you from their servers.

That is why networks like I2P are developing so actively now. All the independent media has to do now is to explain to readers for a year that they need to install an I2P client with a distributed DNS that cannot be blocked. Therefore, the volume of such networks will only grow.”

What is the darknet and what part does it take from the Internet?

The Darknet is not a separate "Hollywood" network. It is less; you could say it's based on the mainstream internet. There is such a clever word - "supervision". Some part of the Internet, not always consciously, is related to the dark web too. Found the right analogy - platform 93/4. That is, the darknet is always there, it is available - it is important to understand what we are looking for.

Dark websites are usually hard to find on Google: they don't seek, and Google doesn't seek, to be in its search results. Google is not the only search engine. If, let's say, you are interested in black finance, there are several well-known forums. And you will see a bunch of sites. They are not in Google, but you can even enter this address into your regular browser and buy some crap. And legally these sites are very difficult to find justice. Is it the Dark Web Scam List? Yes, it is.

How difficult is it to get there now, given special browsers and plugins?

Depending on what you want. The beast runs to the catcher. Suppose your home machine (computer) can suddenly be infected with some of the most popular and uncaught viruses, due to which it becomes a darknet staging post without your knowledge. Overgrown with a small side hobby. There are boxes that purposefully deal only with it, but some of them are unsuspecting machines that participate involuntarily.

If you look at any computer, it looks exactly the same - you can also visit the CNN website from it. He does not live in some hidden bunker that needs to be connected separately.

The dark web is not because it is separate, but because it takes enough measures to be invisible while remaining visible. It may well be that it is not indexed. But the dark web is a concept, and not some pretentious nightclub, in which the entrance is only with passes. It is rather what everyone has in mind, but at the same time only a few can go there. The main leitmotif of what is happening on the darknet sites list is invisibility.

Is the darknet really that anonymous? The person who goes there can't be traced?

This is the other side of what is happening. It is as anonymous as the person who got there took steps to remain invisible. In general, going online can be compared to going to a nightclub when you know that you have a fifth of the condoms in your pocket that are defective. You can pick up a virus, they can steal card data. And the password from some sites is generally easy.

In the case of the dark web, everything is a little more complicated, because when you go to the regular Internet, you need to rely on your antivirus and carefully think about where you enter credit card data. In the case of the dark web, you need to balance how much effort you put into maintaining your anonymity against the illegality of the actions you are about to take.

Are the cyberpolice watching people who use the dark web?

Officially, we left the answer. On the other hand, we saw what the cyberpolice of this country is... If we assume that we are talking about Britain or Australia, they are making some gestures. It is important not to forget that the Internet is an international network, and it is very difficult to do something from a legal point of view if the site that sells drugs is, by all indications, registered and located in Panama.

There is a darknet boom in many countries right now. Are they doing something about it? There is a suspicion that there is only an illusion from the darknet, although we cannot know their specifics. Considering that their state intervened quite globally in initiatives with the Internet, we would suggest that their own darknet area is under strict state control. We will assume at the fantasy level that they have some piece of the global darknet, and there is also their own, in which the FBI grazes.

But do not forget that the darknet is a collective concept. The Internet itself was initially assembled as a large patchwork quilt. That's what it means - a bunch of patches that together make up a big picture called the Internet. And some shreds with a double bottom. The darknet is the double bottom of some shreds.

There are a lot of myths about the dark web. They say everything is there. What is really not there? To buy credit cards - there is a lot of that. There are enough PayPal accounts, a couple of sites that trade data from Google. Trade in documents, sale of candy wrappers, papers, credit cards, scans of passports and all that - this is also a lot.

There is a basic problem, which is called Hollywood. The standard dark web story is very much in line with the hacker epic. And about hackers, thanks to Hollywood, it is known that with the help of a laptop they can shoot down a helicopter whose only electronic device on board is a cuckoo clock. Or that in a few clicks on some mega-secure laptop, you can launch a couple of rockets, break the Pentagon, or go to some dark web where digital dolphins swim, and you immediately create the fabric of fucking existence in the dark web with these digital dolphins.

Such Hollywood with its epic is a prominent part of the Big Mythical Darknet. And in fact, the main things that we happened to see there are a bunch of undoubtedly talented, but youngsters who are taking their steps in the knowledge of cybersecurity. At the same time, someone gets into trouble with the law, someone manages not to get caught, but in fact they are doing the same thing - they are gaining a flotilla of "broken" cars.

It turns out that people mainly come to the dark web for credit cards and personal data?

As far as we know, yes. Teenagers who consider themselves above the law and use the dark web to avoid being seen by the law don't stoop to filth. It's not in the psychology of the people who are typically the driving force behind the darknet. Their fate is financial fraud. Banal criminality does not fit well with people who are so technically qualified to play darknet games.

There is specificity, first of all, in high-profile economic crimes. Speaking from the point of view of the darknet and criminals, the economy is inherent in it. To have sufficient technical knowledge to seriously cover their tracks - and to engage in banal dirt, for which even three classes of education is a lot - is somehow strange.

What else did you see there?

We saw a lot of stolen documents everywhere - simply because the low level of culture of website creators leads to the fact that credit card data is lying around almost every corner. It's not because hackers are mean - it's because programmers are dumb.

As far as we know, there (on the darknet - ed.) they sell household weapons quite well - we no longer had to climb in this direction, we just know that this is possible. Lately, with the boom of cryptocurrencies that have made it possible to quietly transfer money across borders - no one has to carry suitcases of cash anymore - things have become possible that we can't even imagine. That part of the Internet that the government could not take under its control, in addition to the exchange of information, also allows the exchange of money. As far as information trading and what lives on the regular Internet, you can call it the dark web or whatever, just remember what we said about double-bottom patches.

We came across this a little differently, but it has a direct bearing on the fact that we live in a fucking third world country. Some of the dark web technologies have to be used to protect and legitimize the operation of white businesses in this country.

Explain what DDoS is and it is connected to Scammers

Suppose your machine has caught a virus. You did not notice this and did not immediately cure it - and most often this is exactly what happens. A strange letter came to you in the spirit of "Here is a winning lottery ticket for you, click on me." You clicked, nothing happened, you shrugged.

And what you didn't learn is that your machine now belongs not only to you, but periodically goes to a well-hidden node on the Internet and listens to commands on what to do. As "what should it do" the machine can send out the same congratulatory letters - to expand the infected network. It can quietly go to some websites, wind up views for someone. Or maybe just generate shit so that when this shit generates 60-70 thousand of these machines, it’s “oops” for some website. This is called DDoS.

The most beautiful thing that happened from these DDoS - when a couple of years ago people assembled a network of smart home appliances (all over the world - ed.) - all sorts of irons, coffee makers and refrigerators with Internet access - and collapsed the Google server somewhere in half a day.

For example, craftsmen from the dark web can make citizenship of another country, although this will cost a lot of money. Criminals create new identities for themselves and customers or gain access to police databases.

There are also “harmless” sites on the darknet sites list where pirated products are actively distributed: films, music, books, games. The largest hidden network works on the principle of TOR (The Onion Router). This technology is also known as "onion routing" - it was developed by employees of the research laboratory of the US Department of the Navy.

The principle of operation of TOR is as follows: the message is "wrapped" in several layers of encryption. Then it is transmitted through dozens of network nodes. Each node removes one protective layer from the sent message in order to find out the next node in the common chain. Thus, the intermediary does not see the content and route of the message, since the entire process of data decryption is performed on the side of the recipient.

A few words as a conclusion

We hope that the information above has been useful and relevant to you. We recommend that you study more material on this topic, as well as act with all caution so as not to be a victim of scammers.

Comments 0

Leave a comment

Cancel reply

Login to leave a comment