Cybercrime and Dark Web Research

Show
Forums are Forever – Part 1: Cybercrime Never Dies
December 4, 2019

  If one could predict the future back in the late 1990s when the first cybercriminal web forums emerged, few …

read more

Cryptonite: Ransomware’s answer to Superman…

January 14, 2020

  Update: It appears that the Cryptonite website is no longer active, such is the rapidly changing nature of cybercrime. …

read more

The Closure of Market.ms: A Cybercriminal Marketplace Ahead of Its Time

December 18, 2019

In the world of “what could have been,” the cybercriminal marketplace market[.]ms would be a leader in the cybercriminal underground. …

read more

2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

December 18, 2019

  If all the holiday fuss isn’t reminder enough, 2020 is almost upon us. 2019 was an unusual year in …

read more

Forums are Forever – Part 3: From Runet with Love

December 17, 2019

  The rise of alternative technologies hasn’t spelled the end of forums, which seem to be prospering against all odds. …

read more

Forums are Forever – Part 2: Shaken, but not Stirred

December 10, 2019

  Cybercriminal forums continue to thrive despite law-enforcement takedowns and the emergence of more efficient and secure alternatives. Digital Shadows …

read more

Probiv: The missing pieces to a cybercriminal’s puzzle

November 26, 2019

A husband wants to find out who owns the unknown number that’s been ringing his wife’s cell phone late at …

read more

Black Friday Deals on the Dark Web: A cybercriminal shopper’s paradise

November 21, 2019

  Black Friday. You love it, you hate it, you love to hate it. Whether you’re already getting your finances …

read more

DarkMarket’s Feminist Flight Towards Equality and the Curious Case of Canaries

November 19, 2019

  In late August, Dark Fail (a Tor onion link repository service) added several onion domains for two new dark …

read more

VoIP security concerns: Here to stay, here to exploit

November 14, 2019

  VoIP, or Voice over Internet Protocol, is the protocol via which voice communication and multimedia session are delivered via …

read more

Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

October 31, 2019

  With the recent breach that targeted BriansClub, automated vending carts (better known as AVCs), have received significant media attention …

read more

Cybercriminal credit card stores: Is Brian out of the club?

October 31, 2019

  If you’re an avid follower of Digital Shadows’ blogs, or just have a general interest in the cybercriminal landscape, …

read more

Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

October 17, 2019

Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of …

read more

Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

October 16, 2019

Typosquatting. It’s a phrase most of us know in the security realm and think we’ve got our hands and minds …

read more

Cybercriminal Forum Developments: Escrow Services

October 15, 2019

Financial transactions made on cybercriminal forums tend to look remarkably similar to transactions made on legitimate platforms. You have a …

read more

Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

October 9, 2019

In 1984, science fiction writer William Gibson became the father of the Cyberpunk fiction genre with his novel, Neuromancer. Neuromancer …

read more

Top Threat Intelligence Podcasts to Add to Your Playlist

October 3, 2019

Looking for some new threat intelligence podcasts to add to your playlist? Look no further! Our Photon Threat Intelligence Research …

read more

Domain Squatting: The Phisher-man’s Friend

October 1, 2019

In the past we have talked about the internal assessments that we perform here at Digital Shadows. As part of …

read more

Singapore Cyber Threat Landscape report (H1 2019)

September 26, 2019

Despite being the second smallest country in Asia, Singapore is a global financial and economic hub. On top of this, …

read more

Nemty Ransomware: Slow and Steady Wins the Race?

September 19, 2019

As we outlined recently, ransomware is a key theme of the NCSC Cyber Trends Report: it’s a pervasive threat that …

read more

Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

September 17, 2019

Data breaches are not slowing down. Nobody expects to be a victim, but the data shows the exponential growth in …

read more

Dark Web Monitoring: The Good, The Bad, and The Ugly

September 11, 2019

Dark Web Monitoring Overview Gaining access to dark web and deep web sources can be extremely powerful – if you …

read more

Envoy on a Mission to Bring Stability to the Criminal Underground

September 4, 2019

Recent Turbulence in the Underground From the sudden disappearance and ongoing instability issues of KickAss and Torum, to the high …

read more

Emotet Returns: How To Track Its Updates

August 26, 2019

What is Emotet? Emotet started life as a banking trojan in 2014; targeting financial information on victim computers. However, over …

read more

The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

August 19, 2019

Black Hat and DEFCON are a wrap! Digital Shadows was there in a big way this year and it was …

read more

Fresh blow for dark web markets: Nightmare market in disarray

August 13, 2019

Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several …

read more

Capital One Breach: What we know and what you can do

July 31, 2019

Monday blues. It’s a thing. It’s when you start the week feeling moody because your weekend is over. The feeling …

read more

The Account Takeover Kill Chain: A Five Step Analysis

July 30, 2019

It’s no secret that credential exposure is a growing problem. Take a look at Troy Hunt’s https://www.haveibeenpwned.com – a tool …

read more

A Growing Enigma: New AVC on the Block

July 19, 2019

This week, in a ground breaking announcement, the Bank of England named Alan Turing the new face of the £50 …

read more

Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

June 27, 2019

The announcements of Facebook’s new cryptocurrency “Libra” and its associated digital wallet “Calibra” have conjured up discussion, debate, criticism, and …

read more

BlueKeep: Cutting through the hype to prepare your organization

May 24, 2019

Over the last week we have all been tuning into our news feeds and listening to the security folks chatting …

read more

FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

April 23, 2019

This week, the Federal Bureau of Investigation released its 2018 Internet Crime Complaints Center (IC3). In 2018, the IC3 responded …

read more

Easing into the extortion game

April 3, 2019

One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber …

read more

Predator: Modeling the attacker’s mindset

April 2, 2019

Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage …

read more

Cyber Risks and High-frequency Trading: Conversation with an Insider

March 26, 2019

Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the …

read more

Dark Web Typosquatting: Scammers v. Tor

March 21, 2019

Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can …

read more

Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

March 6, 2019

Authors: Simon Hall, Isidoros Monogioudis   Here at Digital Shadows we perform regular purple team exercises to continually challenge and …

read more

Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

February 21, 2019

In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of …

read more

Photon Research Team Shines Light On Digital Risks

February 13, 2019

I’m very excited to announce the launch of the Digital Shadows’ Photon Research Team. We have decided to bolster our …

read more

SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

February 5, 2019

We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of …

read more

Security Practitioner’s Guide to Email Spoofing and Risk Reduction

January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

January 22, 2019

The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents …

read more

Thedarkoverlord runs out of Steem

January 16, 2019

On 31 December 2018, the notorious extortion actor known as “thedarkoverlord” announced on Twitter and Reddit that they were in …

read more

TV License and Vehicle Tax Fraud: New Year, Same Old Scams

January 8, 2019

Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. …

read more

Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad

December 20, 2018

As 2018 comes to a close, Digital Shadows partnered with the FBI’s Cyber Division for a webinar to discuss some …

read more

Bomb Threat Emails: Extortion Gets Physical

December 14, 2018

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas before these emails tried to …

read more

Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

December 12, 2018

Overall, the infosec community has done a relatively good job in securing systems. While a measure of restrained back-patting is …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more

Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

November 29, 2018

I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our …

read more

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more

Black Friday and Cybercrime: Retail’s Frankenstein Monster

November 20, 2018

With every year that passes, Black Friday seems to morph into a creation its original proponents could not have even …

read more