Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/10/2019
03:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

Demystifying the Dark Web: What You Need to Know

The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.
3 of 8

What Is the Dark Web?
While it's common for the Dark Web and the Deep Web to be used interchangeably, experts emphasize the two terms mean different things. The Dark Web, which some argue is a subset of the Deep Web, is a smaller slice of the Internet that requires knowledge, tools, and a specialized anonymous network (Tor, for example) to protect users. Most people never use the Dark Web. Not all who do are criminals, either. Many simply want privacy.
Anonymity and location masking are the main appeals of the Dark Web, which is only accessible via networks designed to conceal locations. This is attractive to criminals: Buyers and sellers head to Dark Web marketplaces to exchange digital currencies for guns, exploits, drugs, credit card numbers, stolen personal data, and myriad other types of virtual and physical contraband. Oleg Bondarenko, director of international research at FireEye, says the main intention of the Dark Web is illicit.
'The Dark Web - or DarkNet is another term to use - is a smaller portion of the Deep Web where the Tor browser is still required, but the whole purpose of it is to trade illicit goods,' he says, citing weapons, drugs, malware, credit card dumps, and access to organizations as examples of illegal activity.
But criminals aren't the only people who rely on the Dark Web. 'Obviously, [websites] aren't only used for malicious purposes,' Flashpoint's Camacho says. It's also popular among political dissidents, activists, and others who seek anonymity online. Some people may want to appear to be from somewhere else because data is blocked in their countries, for example, or they could be seeking illegal or dangerous information, such as access to abortion or mental health, Terbium Labs' Wilson notes.
(Image: Mimadeo - stock.adobe.com)

What Is the Dark Web?

While it's common for the Dark Web and the Deep Web to be used interchangeably, experts emphasize the two terms mean different things. The Dark Web, which some argue is a subset of the Deep Web, is a smaller slice of the Internet that requires knowledge, tools, and a specialized anonymous network (Tor, for example) to protect users. Most people never use the Dark Web. Not all who do are criminals, either. Many simply want privacy.

Anonymity and location masking are the main appeals of the Dark Web, which is only accessible via networks designed to conceal locations. This is attractive to criminals: Buyers and sellers head to Dark Web marketplaces to exchange digital currencies for guns, exploits, drugs, credit card numbers, stolen personal data, and myriad other types of virtual and physical contraband. Oleg Bondarenko, director of international research at FireEye, says the main intention of the Dark Web is illicit.

"The Dark Web or DarkNet is another term to use is a smaller portion of the Deep Web where the Tor browser is still required, but the whole purpose of it is to trade illicit goods," he says, citing weapons, drugs, malware, credit card dumps, and access to organizations as examples of illegal activity.

But criminals aren't the only people who rely on the Dark Web. "Obviously, [websites] aren't only used for malicious purposes," Flashpoint's Camacho says. It's also popular among political dissidents, activists, and others who seek anonymity online. Some people may want to appear to be from somewhere else because data is blocked in their countries, for example, or they could be seeking illegal or dangerous information, such as access to abortion or mental health, Terbium Labs' Wilson notes.

(Image: Mimadeo stock.adobe.com)

3 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
matty37
50%
50%
matty37,
User Rank: Apprentice
10/29/2019 | 9:08:32 AM
the dark web
But isn't it right? I do think that most people don't have their fears out of nowhere, and this perception about the dark web was created based on something. It might be not as bad as it's portrayed, but it's definitely not a safe place as well. I would like to try it out and see how it looks like, but I'm currently still debating if it's worth it. I heard that you have to use Tor to access it, although I also have SurfsharkVPN; hopefully, that will increase my safety if I decide to take a glimpse
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...