7 The Dark Web: Where is stolen data traded?

 

This chapter covers

  • Learning the difference between the three main Dark Web protocols
  • Demonstrating how to download TOR and access the TOR Dark Web and hidden onion sites
  • Understanding how, where, and why encryption and anonymity do and don’t protect you on the Dark Web
  • Learning how the desire for anonymity and security drove both the development of the Dark Web and bitcoin
  • Understand how bitcoin is—and isn’t—related to the rise of dark markets

There’s no point in understanding what motivates attackers and how they work if you don’t understand what the payoff can be. What is the point of stealing millions of credit cards or millions of social security numbers? How can an attacker successfully cash in on all that stolen data? Understanding the payoff and why it motivates attackers is the key piece of the puzzle in understanding how attackers think. It’s what shifts the focus of the breach at Marriott from the theft of information on over 500 million guest stays to a potential state-sponsored attack aimed at stealing information on US military personnel and contractors.

In this chapter, we’ll look at the main destination for attackers to trade, sell, and store their stolen data: the Dark Web.

7.1 What is the Dark Web?

7.1.1 TOR

7.1.2 I2P

7.1.3 Freenet

7.2 How to access the Dark Web

7.2.1 Precautions

7.3 How is the Dark Web used?

7.3.1 Illegal weapons

7.3.2 Illegal drugs

7.3.3 Hackers for hire

7.3.4 Hacktivism

7.3.5 Evading censorship

7.3.6 Making money from stolen data

7.3.7 Bitcoin

Summary