Vulnerabilities / Threats
11/16/2015
10:30 AM
James Chappell
James Chappell
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

Dont Toy With The Dark Web, Harness It

The Dark Web's sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.

High-profile data breaches are once again thrusting the Dark Web into the spotlight, spurring security professionals online to better understand how these conversations might be relevant to the security threat to their organizations. But this renewed – and, in some cases, potentially unhealthy – interest has its own dark side.

To successfully harness the Dark Web as part of a complete threat intelligence program, organizations need to develop a keener understanding of the environment and how cyber criminals are leveraging it. Here are three common misconceptions:

Misconception #1: Almost all cybercrime takes place on the Dark Web.
For those who appreciate its risks and pitfalls, the Dark Web can be a great source for understanding threat actors and their techniques. However those who narrowly fixate on it are likely to be blind to more relevant threats and information sources existing elsewhere.

For example, in the past six months, security researchers at Digital Shadows observed nearly 3,000 instances of credit cards being offered for sale on the visible, surface web. Sites like Reddit and Pastebin -- much easier to browse than the Dark Web’s corners -- increasingly contain stolen account information.

Social media platforms likewise hold important clues; we’ve witnessed examples of drugs for sale on Instagram. Social media often contains vital clues as to the identity of would-be criminals. The Dark Web’s sinister allure draws outsized attention, but many time-strapped security teams would benefit from knowing what is already circulating in places they do not need networks such as Tor or I2P to find.

Misconception #2: Scouring the Dark Web is key to understanding my attack surface.
Researching the Dark Web can be a valuable activity for security professionals, but the reality is that this resource will not be relevant to all organizations. For example, large enterprises, particularly in the financial services industry, are more susceptible to having their customers’ credentials and card details sold in criminal marketplaces as this is readily monetized. These marketplaces exist in the dark, surface and deep webs. Alternatively, smaller organizations should instead look towards the surface and deep web, including social media and traditional search engine platforms, to understand their exposure and attack surfaces.

Search engines are also valuable tools for organizations that want a better understanding of their attack surface. There are many files indexed by search engines, which should not be. These files are often exposed inadvertently by employees, suppliers or third parties, which hackers can harvest and exploit either as part of hostile reconnaissance or bundled together and branded as a data breach. Sensitive information such as email addresses, embarrassing information on employees and technology, can be found on social media and leave an organization exposed. Spoof LinkedIn profiles, over-sharing, and misconfigured privacy settings are all exploited for attackers’ reconnaissance.

Misconception #3: There’s no harm in just poking around.
Not all content on the Dark Web is immediately accessible; it can take considerable time, expertise and manual effort to glean useful information. More importantly, impromptu Dark Web reconnaissance can inadvertently expose an organization to greater security risks because of unknown malicious files that can infiltrate the corporate network.

Additionally, several criminal forums on the Dark Web utilize a "vouching" system, similar to a private members club, that might require an investigator to commit a crime or at least stray into significantly unethical territory to gain access to the content.

Lastly, while it can be tempting to download files pertaining to purported breaches, you should be mindful that taking receipt of stolen goods is a felony in the United States (18 U.S.C. § 2315) and can leave you exposed. Beyond that, your activities may disrupt the legitimate work of legal authorities engaged in enforcement actions.

At the end of the day, there are many legitimate purposes for harnessing the Dark Web, but only when security teams take steps to empower their efforts, not endanger them. To cover the basics, organizations should:

  • Have essential security tools and procedures in place to safeguard data.
  • Understand threats compromising peers and the weaknesses these may reveal in your company.
  • Search the public and deep web to observe how hostile threat actors perceive your organization.
  • Discover where your key information assets, employee credentials or other sensitive documents are being exposed online.
  • Weigh the benefits and enhanced protection from the intelligence you gather against the impact on your limited information security resources. 

James Chappell has over twelve years of technical information security experience, acting as an advisor to large private sector and government organizations. Much of his work has involved counteracting the growth of crime and fraud in computer networks and developing ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NikWhitfield
100%
0%
NikWhitfield,
User Rank: Author
10/4/2016 | 10:15:55 AM
Harnessing the Dark Web
Nice article.
RaymondT175
50%
50%
RaymondT175,
User Rank: Apprentice
12/12/2015 | 11:28:43 AM
Balanced Approach To The Subject
Thank you for putting in words what needs to be stated about the deep web.  The media is focused on the pedo / murder for hire for the attention it makes.  People should be concernend with what is already is in plain sight.

It was guys like Snowden that was able to get the message to us about what is going on through a medium such as this. It cuts both ways at the end of the day.
Poissonpraveen
50%
50%
Poissonpraveen,
User Rank: Apprentice
12/11/2015 | 8:06:32 AM
nice posrt and good information
good information and nice article of this is first time i had impressed with some one by words..
SgS125
100%
0%
SgS125,
User Rank: Ninja
11/17/2015 | 2:47:19 PM
What is the point of the article?
You said: At the end of the day, there are many legitimate purposes for harnessing the Dark Web, but only when security teams take steps to empower their efforts, not endanger them.

 

What were the legitimate purposes?

 

Why make any distinction between networks like "deep web" and "dark web" it's all just a different client or level of privacy enforced by rules or encryption, or as simple as a sign on to a site.   Seems silly to just make up a distinction where none exists in reality.

If you are looking for your data you lost it's already too late for your organization anyway!

Best to spend your time and resources on practicing good privacy protection

 
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
11/16/2015 | 1:28:29 PM
Shining light on the dark
This was a good start to illuminating some facts about the dark web. Like the cloud during its inception, I feel the dark web is not very well understood. It seems the dark web is just referred to as a place where nefarious events take place. Continuing in the path of this article would be a good start to helping people's understanding.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.