• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: Deep Web

Stolen Data from Chinese Hotel Chain and Other Illicit Products Sold in Deep Web Forum

  • Posted on:September 7, 2018 at 5:58 am
  • Posted in:Deep Web
  • Author:
    Trend Micro Forward-Looking Threat Research Team
0

We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on a deep web forum we were monitoring. Further analysis revealed that the stolen data was not only the PII of Chinese customers, but also included the hotel chain’s customers from Western and East Asian countries. The sample data we saw was unencrypted (in plaintext), some of which were in CSV, SQL, and TXT dumps.

We believe this stolen data is related to the data breach (reported on August 29) that exposed up to 130 million PII. The news that reported the data breach matched with an advertisement we saw in the dark web selling the stolen data for eight bitcoins (equivalent to more than US$58,000 as of September 5, 2018).

Read More
Tags: cybercriminal undergroundDeep Web

The Boys are Back in Town: Deep Web Marketplaces Back Online

  • Posted on:November 8, 2013 at 12:21 pm
  • Posted in:Bad Sites
  • Author:
    Vincenzo Ciancaglini (Senior Threat Researcher)
0

While Ross Ulbricht, the accused operator of the first Silk Road Marketplace, remains in trial in New York, a new version of the deep web site, named Silk Road 2.0, has been launched yesterday. The launch was announced through the Twitter account of Dread Pirate Roberts, the pseudonym Ulbricht allegedly used while operating the site. Figure…

Read More
Tags: Deep Webdeepwebsilk roadTor

Deep Web and Cybercrime – It Is Not Just the Silk Road

  • Posted on:October 3, 2013 at 7:10 am
  • Posted in:Bad Sites
  • Author:
    Robert McArdle (Senior Threat Researcher)
0

The infamous Silk Road marketplace is probably the most well-known place online for anyone wanting to purchase all sorts of illegal goods – ranging from illicit drugs, to firearms and all the way up to hitmen-for-hire. Yesterday, after two and half years in operation, the site was shut down by the FBI and its owner…

Read More
Tags: arrestsDeep WebdeepwebFBIsilk roadTor

Law Enforcement and the Deep Web: Willing, but Underfunded

  • Posted on:July 28, 2016 at 4:55 am
  • Posted in:Deep Web
  • Author:
    Martin Roesler (Director, Threat Research)
0

As everyone knows by now, recently there have been some attacks in Germany that have people worried about their security. One question that comes up is – how were the attackers able to obtain their weapons?

In the recent Munich shooting, the attacker obtained his gun (a Glock 17 pistol) from an underground market. I was recently interviewed by the Handelblatt newspaper about underground markets.

Read More
Tags: Deep Webinvestigationlaw enforcement

Old-School Law Enforcement vs The Deep Web

  • Posted on:September 9, 2015 at 5:20 pm
  • Posted in:Malware
  • Author:
    Martin Roesler (Director, Threat Research)
0

The Deep Web is back in the news. Agora, one of the biggest darknet marketplaces, announced two weeks ago that it will go offline to bolster its defenses against law enforcement agencies who want to take them down. Meanwhile, a Deep Web user was indicted on federal charges of drug trafficking and money laundering. These…

Read More
Tags: Deep Weblaw enforcementTorTor network
Page 1 of 9712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.