Threat Intelligence From The Dark Web

Threat Intelligence From The Dark Web

The reputation of the “Dark Web” perhaps exceeds its reality

The reputation of the “Dark Web” perhaps exceeds its reality.  Many think of it as a place for criminals to operate.  If used by security teams, however, the “Dark Web” can be ripe with threat intelligence for the picking. 

Note: In this article “Dark Web” refers to any collection of computers that create an internet which requires specific software, configuration, or authorization to access.  For example: Tor, Riffle, FreeNet, anoNet, and ZeroNet.

The Opportunity

The “Dark Web” has many purposes, but it is indeed a place for criminals to buy, sell, and trade goods and services.  This is what makes it valuable to security researchers.  By exploring the “Dark Web”, security teams have the potential to collect actionable intelligence.  This includes malware capabilities, new tactics, compromised technology, and the direction of future attacks. 

Recently, The Security Stronghold’s team of researchers ventured into the “Dark Web” for over four months to survey ransomware capabilities for our clients.  This allowed us to look at how ransomware is targeting different verticals and with what tactics.  Much of what we found is already known, but some intelligence collected helped us to clearly see current capabilities and gave insight into the future direction of ransomware aimed at certain clients.

When looking at threat intelligence from a hunting perspective there are a few specific items to look for. We are going to look at features of malware and underlying tactics.  Keep in mind that scouring the “Dark Web” will give you insight to much more than merely malware.

Ransomware Intelligence Gathering

For this survey we visited a variety of marketplaces and forums ranging from public to private.  By interacting with developers we were able to gain insight into what the underground economy is demanding as well as capabilities of malware. 

The first phase was investigating marketplaces.  Our team wanted to see if there were any obvious disparities between what was being sold and what the security industry was planning to defend against.  Activities in this phase of the survey included identifying marketplaces unknown to the public, creating accounts or procuring access, and interacting with sellers.  Communicating with ransomware developers and sellers was essential because our team needed to ensure that the capabilities and features were legitimate.

The second phase was interacting with developers in forums.  Here our team was able to interact with a developing-centered community and discover the direction of future work.  Many of the developers had experience with all types of malware but it is clear that ransomware is providing the largest return on investment for these criminals at this time. 

The final phase was breaking down all of the information we had gathered. We tested proof of concept, ease of use, availability, looked at how certain variations and families of ransomware would affect different industries, and much more.  With this survey we were able to advise multiple clients about threats that would have not been realized had we not taken the time to threat hunt on the “Dark Web”.

Keep This In Mind

First of all, keep in mind that spending time and money by sending your security team to gather threat intelligence from the “Dark Web” is not smart if your organization does not have the resources, risk, or need to deal with complex threats. 

Focus on the big wins when gathering intelligence.  In the beginning much of what The Security Stronghold team spent their time on did not result in actionable intelligence.  Soon, however, we realized that we should focus on the big wins.  These “wins” are discoveries that will result in actionable intelligence for your organization.  This intelligence will be different for every organization.

The former point brings us to our next one, only collect actionable intelligence.  If you really wanted to, you could spend forever obsessing over every little find.  It is only practical if you collect the intelligence which will lead to real world action.  Plenty of researchers have already gathered the basic information.

Your Turn

Gathering intelligence from the “Dark Web” once to explore is something entirely different than incorporating into security events at your organization.  In order to fully develop threat intelligence capabilities within your security team, you should consider the following:

  • Do you have a threat hunting program in place already?
  • Is there a need for one?
  • Would it be best to outsource?
  • Do you have the resources to effectively hunt for threats in this manner?

Going Forward

The “Dark Web” can allow your organization to gain valuable insight into threats you face, however, the most effective use of your resources may merely be to have your incident response team stay up to date with others who conduct this type of research.  This type of hunting is a can be a great experience and something that properly equipped security leaders may want to consider.  It allows you a look inside the mind of the attacker.

Featured

  • TSA Intercepts 6,678 Firearms at Airport Security Checkpoints in 2024

    During 2024, the Transportation Security Administration (TSA) intercepted a total of 6,678 firearms at airport security checkpoints, preventing them from getting into the secure areas of the airport and onboard aircraft. Approximately 94% of these firearms were loaded. This total is a minor decrease from the 6,737 firearms stopped in 2023. Throughout 2024, TSA managed its “Prepare, Pack, Declare” public awareness campaign to explain the steps for safely traveling with a firearm. Read Now

  • 2024 Gun Violence Report: Fewer Overall Incidents, but School Deaths and Injuries Are on the Rise

    Omnilert, provider of gun detection technology, today released its compilation of Gun Violence Statistics for 2024 summarizing gun violence tragedies and their adverse effects on Americans and the economy. While research showed a decrease in overall deaths and injuries, the rising number of school shootings and fatalities and high number of mass shootings underscored the need to keep more people safe in schools as well as places of worship, healthcare, government, retail and commerce, finance and banking, hospitality and other public places. Read Now

  • Survey: Only 7 Percent of Business Leaders Using AI in Physical Security

    A new survey from Pro-Vigil looks at video surveillance trends, how AI is impacting physical security, and more. Read Now

  • MetLife Stadium Uses Custom Surveillance Solution from Axis Communications

    Axis Communications, provider of video surveillance and network devices, today announced the implementation of a custom surveillance solution developed in collaboration with the MetLife Stadium security team. This new, tailored solution will help the venue augment its security capabilities, providing high-quality video at unprecedented distances and allowing the security team to identify details from anywhere in the venue. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3