7 The Dark Web: where is stolen data traded?
This chapter covers:
- Learning the difference between the three main Dark Web protocols, and how they differ from the normal Internet.
- Demonstrating how to download TOR and access the TOR Dark Web, and hidden Onion sites.
- Understanding how, where, and why encryption and anonymity do and don’t protect you on the Dark Web.
- Learning how the desire for anonymity and security drove both the development of the Dark Web and Bitcoin; how Bitcoin is—and isn’t—related to the rise of dark markets; and what you should know about Bitcoin for your company.
There’s no point in understanding what motivates attackers, and how they work, if you don’t understand what the payoff can be. What is the point of stealing millions of credit cards, or millions of social security numbers? How can an attacker successfully cash in on all that stolen data? Understanding what the payoff is, and why it motivates attackers, is the key piece of the puzzle in understanding how attackers think. It’s what shifts the focus of the breach at Marriott, from the theft of information of over 500m guest stays, to a potential state sponsored attack aimed at stealing information on US military personnel and contractors.
In this chapter we’ll look at the main destination for attackers to trade, sell, and store their stolen data: the Dark Web.