Cybercrime and Dark Web Research

Show
Forums are Forever – Part 1: Cybercrime Never Dies
December 4, 2019

  If one could predict the future back in the late 1990s when the first cybercriminal web forums emerged, few …

read more

Probiv: The missing pieces to a cybercriminal’s puzzle

November 26, 2019

A husband wants to find out who owns the unknown number that’s been ringing his wife’s cell phone late at …

read more

Black Friday Deals on the Dark Web: A cybercriminal shopper’s paradise

November 21, 2019

  Black Friday. You love it, you hate it, you love to hate it. Whether you’re already getting your finances …

read more

DarkMarket’s Feminist Flight Towards Equality and the Curious Case of Canaries

November 19, 2019

  In late August, Dark Fail (a Tor onion link repository service) added several onion domains for two new dark …

read more

VoIP security concerns: Here to stay, here to exploit

November 14, 2019

  VoIP, or Voice over Internet Protocol, is the protocol via which voice communication and multimedia session are delivered via …

read more

Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

October 31, 2019

  With the recent breach that targeted BriansClub, automated vending carts (better known as AVCs), have received significant media attention …

read more

Cybercriminal credit card stores: Is Brian out of the club?

October 31, 2019

  If you’re an avid follower of Digital Shadows’ blogs, or just have a general interest in the cybercriminal landscape, …

read more

Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

October 17, 2019

Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of …

read more

Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

October 16, 2019

Typosquatting. It’s a phrase most of us know in the security realm and think we’ve got our hands and minds …

read more

Cybercriminal Forum Developments: Escrow Services

October 15, 2019

Financial transactions made on cybercriminal forums tend to look remarkably similar to transactions made on legitimate platforms. You have a …

read more

Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

October 9, 2019

In 1984, science fiction writer William Gibson became the father of the Cyberpunk fiction genre with his novel, Neuromancer. Neuromancer …

read more

Top Threat Intelligence Podcasts to Add to Your Playlist

October 3, 2019

Looking for some new threat intelligence podcasts to add to your playlist? Look no further! Our Photon Threat Intelligence Research …

read more

Domain Squatting: The Phisher-man’s Friend

October 1, 2019

In the past we have talked about the internal assessments that we perform here at Digital Shadows. As part of …

read more

Singapore Cyber Threat Landscape report (H1 2019)

September 26, 2019

Despite being the second smallest country in Asia, Singapore is a global financial and economic hub. On top of this, …

read more

Nemty Ransomware: Slow and Steady Wins the Race?

September 19, 2019

As we outlined recently, ransomware is a key theme of the NCSC Cyber Trends Report: it’s a pervasive threat that …

read more

Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

September 17, 2019

Data breaches are not slowing down. Nobody expects to be a victim, but the data shows the exponential growth in …

read more

Dark Web Monitoring: The Good, The Bad, and The Ugly

September 11, 2019

Dark Web Monitoring Overview Gaining access to dark web and deep web sources can be extremely powerful – if you …

read more

Envoy on a Mission to Bring Stability to the Criminal Underground

September 4, 2019

Recent Turbulence in the Underground From the sudden disappearance and ongoing instability issues of KickAss and Torum, to the high …

read more

Emotet Returns: How To Track Its Updates

August 26, 2019

What is Emotet? Emotet started life as a banking trojan in 2014; targeting financial information on victim computers. However, over …

read more

The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

August 19, 2019

Black Hat and DEFCON are a wrap! Digital Shadows was there in a big way this year and it was …

read more

Fresh blow for dark web markets: Nightmare market in disarray

August 13, 2019

Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several …

read more

Capital One Breach: What we know and what you can do

July 31, 2019

Monday blues. It’s a thing. It’s when you start the week feeling moody because your weekend is over. The feeling …

read more

The Account Takeover Kill Chain: A Five Step Analysis

July 30, 2019

It’s no secret that credential exposure is a growing problem. Take a look at Troy Hunt’s https://www.haveibeenpwned.com – a tool …

read more

A Growing Enigma: New AVC on the Block

July 19, 2019

This week, in a ground breaking announcement, the Bank of England named Alan Turing the new face of the £50 …

read more

Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

June 27, 2019

The announcements of Facebook’s new cryptocurrency “Libra” and its associated digital wallet “Calibra” have conjured up discussion, debate, criticism, and …

read more

BlueKeep: Cutting through the hype to prepare your organization

May 24, 2019

Over the last week we have all been tuning into our news feeds and listening to the security folks chatting …

read more