WHAT IS DEEP WEB ?
What is inside the deep web? Let’s take a look at the figure below.
WHAT IS BLACK MARKET
Recent increases in the use of watering-hole attacks (where users visit popular, legitimate, but compromised websites) based on well-known exploit kits available for sale on the black market
online advertisements that, when clicked, infect a victim’s computer, and call back to an exploit kit to launch additional malware; data is then stolen and sold on black markets
Distributed Denial of Service (DDoS) attacks implemented by rented botnets available on the black market.
Anyone can rent a botnet for the purpose of getting more click count for their websites or videos.
- Paid premium accounts sold at very low prices in the black markets
In the continuation of this section, characteristics and the general structures of black markets, the types of products that can be stolen in these markets, and the costs of these products are explained.
Characteristics of the Black Market
How to access DarkWeb?
Technically, this is not a difficult process. You simply need to install and use Tor. Tor is a free software for enabling anonymous communication and directs internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays. So that, user’s location and the usage are hidden from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. (Reference)
If you want to access DarkWeb, go to Tor Website and download the Tor Browser Bundle, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network. Some IPS’s may block Tor connection. In such cases, all you need is install a VPN, and try again. (Reference)
Products And Their Prices on Black Market
Prices for credit cards, for example, are falling because the market is flooded with records, and botnets and DDoS capabilities are cheaper because so many more options are available.
For example, Yahoo announced hacking incident from its September disclosure that 500 million user accounts had been hacked in 2014, but company has faced another attack, disclosed Wednesday that a different attack in 2013 compromised more than 1 billion accounts. The stolen data include names, email addresses, telephone numbers, birthdays, hashed passwords, and some “encrypted or unencrypted security questions and answers. Yahoo says that they believes no payment card or bank account information was stolen. The interesting thing is, announcement is published in September 2016. The New York Times reports that a billion-user database was sold on the Black Market last August (2016) for $300,000.
It is possible to hack an account by paying a price between $16 – $325 which depends on the type of target account. Average cost to companies per compromised record is estimated $194 considering in form of lost customers, damaged reputation and diminished goodwill. (Source of information : link)
The reference of all the price information in the table below are gathered from the report of Rand Corporation which is published in 2014. If you want to learn more detailed information, we recommend you to read that report. The table below consists of many black market products and their corresponding value in the market. (all prices for US unless specified)