dark web marketplaces Archives - The News Max https://www.thenewsmax.co/tag/dark-web-marketplaces/ My WordPress Blog Tue, 09 Jan 2024 06:04:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 https://www.thenewsmax.co/wp-content/uploads/2022/11/cropped-NMAX-32x32.png dark web marketplaces Archives - The News Max https://www.thenewsmax.co/tag/dark-web-marketplaces/ 32 32 Using 7 Dark Market Onion Strategies Like The Pros https://www.thenewsmax.co/using-7-dark-market-onion-strategies-like-the-pros/ Tue, 09 Jan 2024 06:04:20 +0000 https://www.thenewsmax.co/?p=28216 The internet has revolutionized countless aspects of our lives, opening up new opportunities and connecting people from all corners of the globe. However, behind the brightly lit surface of the web lies an underbelly known as the darknet. This hidden realm is home to an illicit marketplace known as darknet markets onion address markets, where [...]

The post Using 7 Dark Market Onion Strategies Like The Pros appeared first on The News Max.

]]>
The internet has revolutionized countless aspects of our lives, opening up new opportunities and connecting people from all corners of the globe. However, behind the brightly lit surface of the web lies an underbelly known as the darknet. This hidden realm is home to an illicit marketplace known as darknet markets onion address markets, where a myriad of illegal activities, including drugs, weapons, counterfeit goods, and stolen data, take place.

Darknet markets are online platforms that operate on anonymous networks, accessible only through specialized software or configurations. They employ technologies like encryption and the Tor network to keep the identities of users concealed, making it extremely difficult for law enforcement agencies to trace the individuals involved. These markets have gained popularity due to their ability to provide anonymity, ensuring both buyers and sellers can operate with a reduced risk of detection.

The products and services available on darknet markets are vast and varied. One of the most prominent categories is drug trafficking, with a wide range of narcotics readily accessible. Buyers can browse through a vast catalog of substances, purchase them using cryptocurrencies, and have their illegal goods delivered to their doorstep without ever leaving the comfort of their own homes.

Weapons, counterfeit documents, and forged currencies are also in high demand on the darknet market. Arms dealers offer an assortment of firearms and dark markets 2024 ammunition, creating a thriving trade for those seeking illegal weapons. In addition, individuals looking for fake passports, driver’s licenses, or even diplomas can turn to these markets, where vendors offer counterfeit documents that can pass off as authentic to the unsuspecting eye.

One particularly disconcerting aspect of darknet markets is the sale of stolen data, including credit card information, login credentials, and personal identities. Cybercriminals offer their services to buyers, presenting them with a wealth of illegally obtained information that can be utilized for fraudulent activities. This contributes to the growing concern surrounding identity theft and online fraud, as naïve individuals can quickly fall victim to these malicious forces lurking on the darknet market.

As governments around the world grapple with the challenge of combating darknet market markets, law enforcement agencies have launched numerous investigations and crackdowns. Despite these efforts, the anonymity provided by the darknet continues to attract a sizable user base, making it challenging to dismantle these illicit marketplaces completely. Furthermore, the decentralized nature of these platforms often means that, even if one is shut down, best darknet markets several others will inevitably emerge in its place.

The existence of darknet markets raises important ethical, legal, and social questions. While advocates argue that they provide individuals with freedom and privacy in an increasingly surveilled world, critics argue that the dangers they pose far outweigh any potential benefits. It is undeniable that the presence of these markets perpetuates illegal activities, fuels addiction and violence, and poses a significant challenge to law enforcement agencies worldwide.

Whether or not the darknet market markets will ultimately be eradicated remains uncertain. As technology continues to evolve, so too will the methods employed by those seeking to exploit its potential for illicit gains. Nonetheless, the fight against these hidden marketplaces remains crucial, as the consequences of their existence can be far-reaching and detrimental to society as a whole.

The post Using 7 Dark Market Onion Strategies Like The Pros appeared first on The News Max.

]]>
One of the biggest ever dark web police stings leads to 150 arrests https://www.thenewsmax.co/one-of-the-biggest-ever-dark-web-police-stings-leads-to-150-arrests-6/ Sat, 06 Jan 2024 21:04:14 +0000 https://www.thenewsmax.co/?p=26958 Police around the world have arrested 150 suspects in one of the largest-ever dark web sting operations. The suspects arrested included several high-profile targets, involved in buying or selling illegal goods online, Europol said today. Operation Dark HunTOR also recovered millions of pounds in cash and , as well as drugs and guns.  The bust [...]

The post One of the biggest ever dark web police stings leads to 150 arrests appeared first on The News Max.

]]>
Police around the world have arrested 150 suspects in one of the largest-ever dark web sting operations.

1,000,000+ Free Images

The suspects arrested included several high-profile targets, involved in buying or selling illegal goods online, Europol said today.

Operation Dark HunTOR also recovered millions of pounds in cash and , as well as drugs and guns. 

The bust stems from a German-led police sting earlier this year taking down the ‘world’s largest’ darknet marketplace.

darknet market markets are e-commerce sites designed to lie beyond the reach of regular search engines and are popular with criminals, as buyers and sellers are largely untraceable. 

Police around the world have arrested 150 suspects in one of the largest-ever dark web sting operations. The suspects arrested included several high-profile targets, involved in buying or selling illegal goods online, Europol said today (stock image)

Police around the world have arrested 150 suspects in one of the largest-ever dark web sting operations.

The suspects arrested included several high-profile targets, involved in buying or selling illegal goods online, Europol said today (stock image)

Dark HunTOR, ‘was composed of a series of separate but complementary actions in Australia, Bulgaria, France, Germany, Italy, the Netherlands, Switzerland, the United Kingdom, and the United States,’ the Hague-based Europol said.

In the United States alone, police arrested 65 people, while 47 were held in Germany, 24 in Britain, and four each in Italy and the Netherlands, among others.

A number of those arrested ‘were considered high-value targets’ by Europol.

Law agents also confiscated 26.7 million euros (£22.45million) in cash and virtual currencies, dark web darknet market list as well as 45 guns and 516lbs of drugs, including 25,000 ecstasy pills.

Italian police also shut down the ‘DeepSea’ and ‘Berlusconi’ marketplaces, ‘which together boasted over 100,000 announcements of illegal products’, said Europol, which coordinated the operation together with its twin judicial agency Eurojust.

German police in January closed down the ‘DarkMarket’ online marketplace, used by its alleged operator, an Australian, to facilitate the sale of drugs, stolen credit card data and malware.

Europol said the arrest of the alleged operator, caught near the German-Danish border at the time, and the seizure of the criminal infrastructure provided ‘investigators across the world with a trove of evidence’.

German prosecutors at the time said DarkMarket came to light in the course of a major investigation against the web-hosting service Cyberbunker, located in a former NATO bunker in southwest Germany.

Europol’s European Cybercrime Centre EC3 has since been compiling intelligence packages to identify the key targets, the continent’s policing agency said.

The secret ‘darknet market‘ includes websites that can be assessed only with specific software or authorisations, ensuring anonymity for users.

Dark HunTOR, 'was composed of a series of separate but complementary actions in Australia, Bulgaria, France, Germany, Italy, the Netherlands, Switzerland, the United Kingdom, and the United States,' the Hague-based Europol (their HQ pictured) said

 Dark HunTOR, ‘was composed of a series of separate but complementary actions in Australia, Bulgaria, France, Germany, Italy, the Netherlands, Switzerland, the United Kingdom, and the United States,’ the Hague-based Europol (their HQ pictured) said

They have faced increased pressure from international law enforcement in recent months.

‘The point of operations such as this is to put criminals operating on the dark web on notice (that) the law enforcement community has the means and global partnerships to unmask them and hold them accountable for their illegal activities,’ Europol deputy director of operations Jean-Philippe Lecouffe said.

Rolf van Wegberg, cybercrime investigator dark darknet market 2024 at the TU Delft university said the operation signalled a break in the trend of recent police actions against suspected online criminals.

‘This kind of operations in the past looked at arresting the controllers of these marketplaces, we now see police services targeting the top sellers,’ he told investigative journalists at the Dutch KRO-NCRV public broadcaster.

A press conference about the operation has been set for 10am local time (2pm GMT) in Washington with the Department of Justice. 

The post One of the biggest ever dark web police stings leads to 150 arrests appeared first on The News Max.

]]>
A timeline of the biggest ransomware attacks https://www.thenewsmax.co/a-timeline-of-the-biggest-ransomware-attacks-7/ Sat, 06 Jan 2024 19:04:09 +0000 https://www.thenewsmax.co/?p=26824 id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”> The history of technology is riddled with unintended consequences. As William Gibson wrote in Burning Chrome, “…the street finds its own uses for things.” Though Bitcoin may not have been originally conceived as a medium for ransom payments, it’s quickly become a central tool for online criminals. Ransomware, a category of [...]

The post A timeline of the biggest ransomware attacks appeared first on The News Max.

]]>
id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

The history of technology is riddled with unintended consequences. As William Gibson wrote in Burning Chrome, “…the street finds its own uses for things.” Though Bitcoin may not have been originally conceived as a medium for ransom payments, it’s quickly become a central tool for online criminals.

Ransomware, a category of “,” blocks access to a computer or network until a ransom is paid. Despite the evolving efforts of governments to  and , the attacks keep coming. 

Cryptocurrency ransomware payments totaled roughly $350 million in 2020,  — an annual increase of over 300% from 2019. And because US companies are legally required to report cyberattacks only if customers’  is compromised, that estimate may be far too conservative.

Read more: 

Below, we tally up the damage of some of the highest-profile episodes.

Kaseya (2021)

On July 2, 2021, Kaseya announced its systems had been . Kaseya provides IT solutions for other companies — an ideal target which, in a domino effect, ended up impacting approximately in multiple countries. REvil, a cybercriminal outfit, claimed responsibility for the attack and demanded ransoms ranging from a few thousand dollars to multiple millions, . 

It’s unclear how many individual businesses paid up, but REvil demanded from Kaseya. Kaseya declined to pay, opting to cooperate with the FBI and the US Cybersecurity and Infrastructure Agency. On July 21, 2021, Kaseya a universal decryptor key and distributed it to organizations impacted by the attack.

JBS (2021)

On May 31, 2021, JBS USA, one of the largest meat suppliers in the US,  a hack that caused it to temporarily halt operations at its five largest US-based plants. The ransomware attack also disrupted the company’s Australia and UK operations. JBS paid the hackers an in Bitcoin to prevent further disruption and limit the impact on grocery stores and restaurants. The the hack to REvil, a sophisticated criminal ring well-known in ransomware attacks. 

Colonial Pipeline (2021)

On May 7, 2021, America’s largest “refined products” pipeline after a hacking group called Darkside infiltrated it with ransomware. Colonial Pipeline covers over 5,500 miles and transports more than 100 million gallons of fuel daily. The impact of the attack was significant: In the days that followed, the average price of a gallon of gas in the US increased to more than $3 for  as drivers rushed to the pumps. 

The pipeline operator said it paid the hackers $4.4 million in cryptocurrency. On June 7, 2021, the DOJ announced it had  part of the ransom. US law enforcement officials were able to track the payment and dark market link darknet market take back $2.3 million using a private key for a cryptocurrency wallet.

Brenntag (2021)

On April 28, 2021, German chemical distributor learned it was the target of a cyberattack by Darkside, dark market url which stole 150GB of data that it threatened to leak if ransom demands weren’t met. After negotiating with the criminals, darkmarket Brenntag ended up negotiating the original ransom of $7.5 million down to , which it paid on May 11.

CNA Financial (2021)

On March 23, 2021, CNA Financial, the commercial insurer in the US, it had “sustained a sophisticated cybersecurity attack.” The attack was by a group called Phoenix, which used ransomware known as Phoenix Locker. CNA Financial eventually paid in May to get the data back. While CNA has been tight-lipped on the details of the negotiation and transaction, but says all of its systems have since been fully restored. 

CWT (2020)

On July 31, 2020, US business travel management firm CWT disclosed it had been impacted by a  that infected its systems — and that it had paid the ransom. Using ransomware called Ragnar Locker, the assailants claimed to have stolen sensitive corporate files and knocked 30,000 company computers offline. 

As a service provider to of S&P 500 companies, the data release could have been disastrous for CWT’s business. As such, the company paid the hackers about $4.5 million on July 28, a few days before Reuters the incident. 

University of California at San Francisco (2020)

On June 3, 2020, the University of California at San Francisco that the UCSF School of Medicine’s IT systems had been compromised by a hacking collective called Netwalker on June 1. The medical research institution had been working on a cure for COVID.

Apparently, Netwalker had researched UCFS, hoping to gain insights into its finances. Citing the billions of dollars UCFS reports in annual revenue, Netwalker demanded a $3 million ransom payment. After negotiations, Netwalker the bitcoin equivalent of $1,140,895 to resolve the cyberattack. According to the BBC, Netwalker was also identified as the culprit in at least two other 2020 ransomware attacks targeting universities. 

Travelex (2019)

On New Year’s Eve 2019, London-based foreign currency exchange Travelex was by a ransomware group called Sodinokibi (aka REvil). The attackers made off with 5GB of customer data, including dates of birth, credit card information, and insurance details. Travelex took down its website in 30 countries in an attempt to contain the virus.

In the wake of the ransomware attack, Travelex struggled with customer services. Sodinokibi initially demanded a payment of $6 million (£4.6 million). After negotiations, Travelex paid the cybercriminals  (285 BTC at the time, dark market list roughly £1.6 million) to get its data back.

WannaCry (2017)

In May 2017, a ransomware called infected computers across the globe by exploiting a vulnerability in Windows PCs. The WannaCry vulnerability was revealed during a massive leak of NSA documents and hacking tools engineered by a group called Shadow Brokers in . 

Though the exact number of WannaCry victims remains unknown,  around the world were infected. Victims included Spanish telecommunications company Telefónica and thousands of hospitals in the UK. Computer systems in 150 countries were affected by the attack, with a total estimated loss of around $4 billion globally.

The attackers initially demanded to unlock infected computer systems. The demand was later increased to $600 in bitcoin. However, some researchers claim that no one got their data back, even if they met the demands.

WannaCry attacks to this day. In February 2021, the DOJ  three North Korean computer programmers for their alleged role in the WannaCry outbreak.

Locky (2016)

Discovered in February 2016, Locky is notable due to the incredibly high number of infection attempts it’s made on computer networks. Attacks typically come in the form of an email with an invoice attached from someone claiming to be a company employee. On February 16, 2016 identified more than 50,000 Locky attacks in one day. 

Locky has , but the goal is largely the same: onion dark web market list website Lock computer files to entice owners to pay a ransom in cryptocurrency in exchange for a decryption tool, which would allow users to regain access to their locked files. The majority of Locky victims have been in the US, and , but Canada and France experienced significant infection rates as well. 

TeslaCrypt (2015)

 an earlier program called CryptoLocker, the earliest TeslaCrypt samples were circulated in November 2014 but the ransomware was not widely distributed until March of the following year.

TeslaCrypt initially targeted gamers. After infecting a computer, a pop-up would direct a user to pay a for a decryption key to unlock the infected system. report the requested ransoms ranged from $250 to $1000 in Bitcoin. In May 2016, the developers of TeslaCrypt a master decryption key for affected users to unlock their computers.

CryptoWall (2014)

Widespread reports of computer systems infected from the CryptoWall ransomware emerged in 2014. Infected computers were unable to access files — unless the owner paid for access to a decryption program. impacted systems across the globe. The attackers demanded payment in the form of prepaid cards or bitcoin. CryptoWall caused roughly $18 million in damages, . Multiple versions of CryptoWall were released, with each version making the ransomware more difficult to trace and combat.

CryptoLocker (2013)

The first time much of the world heard the term “ransomware” was during 2013’s outbreak. Discovered early in September 2013, CryptoLocker would cripple more than 250,000 computer systems during the following four months. Victims were instructed to send payments in cryptocurrency or money cards to regain access. The ransomware delivered at least  to its perpetrators. 

A in 2014 succeeded in taking down the Gameover ZeuS botnet, which was a primary distribution method for CryptoLocker. The DOJ indicted Russian hacker Evgeniy Mikhailovich Bogachev, as the botnet’s ringleader. Bogachev is still at large — and the FBI is currently  of up to $3 million for information leading to his arrest and/or conviction. 

AIDS Trojan/PC Cyborg (1989)

Widely considered the template for all subsequent attacks, the AIDS Trojan (aka PC Cyborg) is the  of a ransomware attack. In 1989, more than a decade before the creation of bitcoin, a biologist named Joseph Popp distributed 20,000 floppy disks at the World Health Organization AIDS conference in Stockholm. The floppy disks were labeled “AIDS Information – Introductory Diskettes” and contained a trojan virus that installed itself on MS-DOS systems.

Once the virus was on a computer, it counted the times the computer booted up. Once the computer booted up 90 times, hid all directories and encrypted filenames. An image on the screen from the ‘PC Cyborg Corporation’ directed users to mail $189 to a PO address in Panama. The decryption process was relatively simple, however, and security researchers released a free tool to help victims.

The post A timeline of the biggest ransomware attacks appeared first on The News Max.

]]>
Cybercrooks steal code for Electronic Arts games including FIFA 21  https://www.thenewsmax.co/cybercrooks-steal-code-for-electronic-arts-games-including-fifa-21-3/ Sat, 06 Jan 2024 18:04:07 +0000 https://www.thenewsmax.co/?p=26776 Hackers have stolen the source code for Electronic Arts (EA) games including and tools like the ‘Frostbite’ engine that powers titles such as the ‘Battlefield’ series. The California-based video game company acknowledged the cybercrime on Thursday June 10, Share this article Share EA also said that it was ‘actively working with law enforcement officials and [...]

The post Cybercrooks steal code for Electronic Arts games including FIFA 21  appeared first on The News Max.

]]>

Hackers have stolen the source code for Electronic Arts (EA) games including and tools like the ‘Frostbite’ engine that powers titles such as the ‘Battlefield’ series.

The California-based video game company acknowledged the cybercrime on Thursday June 10,

  • Share this article

    Share

    EA also said that it was ‘actively working with law enforcement officials and other experts as part of [an] ongoing criminal investigation.’

    According to Vice, hackers have been boasting online about the attack via underground internet forums, with one post saying they ‘have full capability of exploiting on all EA services.’

    Furthermore, they reported, the hackers have been advertising the stolen software for sale across various dark web forums.

    A spokesperson for EA has said that the attackers did not access any private player data and that the breach is unlikely to affect their business operations. Pictured: a screenshot from EA's upcoming 'Battlefield 2042' game, powered by the Frostbite engine whose code was stolen

    A spokesperson for EA has said that the attackers did not access any private player data and that the breach is unlikely to affect their business operations.

    Pictured: a screenshot from EA’s upcoming ‘Battlefield 2042’ game, powered by the Frostbite engine whose code was stolen

    ‘Anytime source code gets leaked, it’s not good,’ said cloud security architect Stuart Green of Isreal-based Check Point Software.

    ‘With such precious information in their hands, dark web market links hackers can easily see the inner workings of a game, darknet market list exploit security gaps and darknet magazine even reverse-engineer games for malicious purposes,’ he continued.

    ‘These malicious activities can scale if hackers proceed to sell their theft.’

    ‘Reports are out that the source code in the EA Games data leak is already being advertised on the darknet markets onion address, dark darknet market 2024 which is not surprising as hackers are usually quick to monetise what they steal.’

    ‘Selling such proprietary information, like source code from EA Games, can net someone big money on the darknet market.’

    Among the files stolen was part of the source code for the Frostbite game engine which powers many EA titles, including the 'Battlefield' series. Pictured: Game enthusiasts and industry personnel watch scenes from 'Battlefield One' during the Electronic Arts EA Play event on June 10, 2017 in Los Angeles, California

    Among the files stolen was part of the source code for the Frostbite game engine which powers many EA titles, including the ‘Battlefield’ series.

    Pictured: Game enthusiasts and dark websites industry personnel watch scenes from ‘Battlefield One’ during the Electronic Arts EA Play event on June 10, 2017 in Los Angeles, California

    The news follows a wave of high-profile cyberattacks in recent months. 

    These have included several ransomware attacks on industrial firms and health care facilities — as well as and breaches of government and tor drug market non-profit networks  which experts have attributed to espionage efforts.

    The attack on EA comes as major video game makers are on the brink of participating in the annual , which is running from June 12-15 this year and is being held virtually due to the pandemic.

    The post Cybercrooks steal code for Electronic Arts games including FIFA 21  appeared first on The News Max.

    ]]>
    German investigators shut down big darknet marketplace https://www.thenewsmax.co/german-investigators-shut-down-big-darknet-marketplace-5/ Sat, 06 Jan 2024 15:04:16 +0000 https://www.thenewsmax.co/?p=26681 BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and arrested its suspected operator. The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said. All sorts of drugs, forged money, stolen or [...]

    The post German investigators shut down big darknet marketplace appeared first on The News Max.

    ]]>
    BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and arrested its suspected operator.

    The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said.
    All sorts of drugs, forged money, stolen or forged credit cards, anonymous mobile phone SIM cards and malware were among the things offered for sale there, they added.

    German investigators were assisted in their months-long probe by U.S. authorities and by Australian, British, dark web market urls darknet market link Danish, Swiss, Ukrainian and Moldovan police.

    The marketplace had nearly 500,000 users and more than 2,400 vendors, prosecutors said.

    They added that it processed more than 320,000 transactions, and Bitcoin and dark Market onion Monero cryptocurrency to the value of more than 140 million euros ($170 million) were exchanged.

    The darknet market is a part of the web accessible only with specialized identity-cloaking tools.

    The suspected operator, a 34-year-old Australian man, dark web market list websites was arrested near the German-Danish border.

    Prosecutors said a judge has ordered him held in custody pending possible formal charges, and dark market onion he hasn’t given any information to investigators.

    More than 20 servers in Moldova and Ukraine were seized, German prosecutors said. They hope to find information on those servers about other participants in the marketplace.

    Prosecutors said the move against DarkMarket originated in an investigation of a data processing center installed in a former NATO bunker in southwestern Germany that hosted sites dealing in drugs and other illegal activities.

    It was shut down in 2019.

    That center hosted DarkMarket at one point.


    The post German investigators shut down big darknet marketplace appeared first on The News Max.

    ]]>
    The history of hacking ransoms and cryptocurrency https://www.thenewsmax.co/the-history-of-hacking-ransoms-and-cryptocurrency-5/ Sat, 06 Jan 2024 11:04:08 +0000 https://www.thenewsmax.co/?p=26493 id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”> Earlier this month, hundreds of companies from the US to Sweden were entangled in the , a company that offers network infrastructure to businesses around the world. The Kaseya hack comes on the heels of other headline-grabbing cyberattacks like the  and the . In each instance, criminals had the opportunity to make off with [...]

    The post The history of hacking ransoms and cryptocurrency appeared first on The News Max.

    ]]>
    Dunckerflohmarktid=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

    Earlier this month, hundreds of companies from the US to Sweden were entangled in the , a company that offers network infrastructure to businesses around the world.

    The Kaseya hack comes on the heels of other headline-grabbing cyberattacks like the  and the . In each instance, criminals had the opportunity to make off with millions — and much of the ransoms were paid in Bitcoin.

    “We have to remember the primary reason for creating Bitcoin in the first place was to provide anonymity and secure, trustless and borderless transaction capabilities,” says Keatron Evansprincipal security researcher at .

    As Bitcoin grows more prominent in darknet markets links around the world, cybercrooks have found a vital tool to help them move illegal assets quickly and pseudonymously. And by all accounts, the attacks are only becoming more common. 

    Ransomware on the rise

    Ransomware is a cybercrime that involves ransoming personal and business data back to the owner of that data. 

    First, a criminal hacks into a private network. The hack is accomplished through various tactics, including phishing, social engineering and preying upon users’ weak passwords.

    Once network access is gained, the criminal locks important files within the network using encryption. The owner can’t access the files unless they pay a ransom. Nowadays, cybercriminals tend to request their ransoms in cryptocurrencies.

    The FBI  ransomware attacks accounted for at least $144.35 million in Bitcoin ransoms from 2013 to 2019. 

    These attacks are scalable and can be highly targeted or broad, ensnaring anyone who happens to click a link or install a particular software program. 

    This allows a small team of cybercrooks to ransom data back to organizations of all sizes — and the tools needed to hack into a small business or multinational cooperation are largely the same. 

    Private citizens, businesses, and state and national governments have all fallen victim — and many decided to pay ransoms.

    Today’s business world depends on computer networks to keep track of administrative and financial data. When that data disappears, it can be impossible for the organization to function properly. This provides a large incentive to pay up. 

    Although victims of ransomware attacks are encouraged to report the crime to federal authorities, there’s no US law that says you have to report attacks (). Given this, there’s little authoritative data about the number of attacks or ransom payments. 

    However, a recent study from Threatpost  only 20% of victims pay up. Whatever the actual number is, the FBI  against paying ransoms because there’s no guarantee that you’ll get the data back, and paying ransoms creates further incentive for ransomware attacks. 

    Why do hackers like cryptocurrency?

    Cryptocurrency provides a helpful ransom tool for cybercrooks. Rather than being an aberration or misuse, the ability to make anonymous (or pseudonymous) transfers is a  of cryptocurrency. 

    “Bitcoin can be acquired fairly easily. It’s decentralized and readily 

    available in almost any country,” says Koen Maris, darkmarket list a cybersecurity expert and advisory board member at IOTA Foundation.

    Different cryptocurrencies feature different levels of anonymity. Some cryptocurrencies, like Monero and Zcash, specialize in confidentiality and may even provide a higher level of security than Bitcoin for cybercriminals. 

    That’s because Bitcoin isn’t truly anonymous — it’s pseudonymous. Through careful detective work and analysis, it appears possible to trace and recoup Bitcoin used for ransoms, darknet sites as the FBI  after the Colonial Pipeline hack. So Bitcoin isn’t necessarily used by ransomers simply because of security features. Bitcoin transfers are also fast, irreversible and easily verifiable. Once a ransomware victim has agreed to pay, the criminal can watch the transfer go through on the public blockchain. 

    After the ransom is sent, it’s usually gone forever. Then crooks can either exchange the Bitcoin for another currency — crypto or fiat — or transfer the Bitcoin to another wallet for safekeeping. 

    While it’s not clear exactly when or how Bitcoin became associated with ransomware, hackers, cybercrooks, and crypto-enthusiasts are all computer-savvy subcultures with a natural affinity for new tech, and Bitcoin was adopted for illicit activities online soon after its creation. One of Bitcoin’s first popular uses was currency for transactions on the dark market list web. The  was among the early marketplaces that accepted Bitcoin.

    Financial impact

    Ransomware is big business. Cybercriminals made off just under $350 million worth of cryptocurrency in ransomware attacks last year, . That’s an increase of over 300% in the amount of ransom payments from the year before. 

    The COVID-19 pandemic set the stage for a surge in ransomware attacks. With vast tracts of the global workforce moving out of well-fortified corporate IT environments into home offices, cybercriminals had more surface area to attack than ever.

    According to , the organizational changes needed to accommodate remote work opened up more businesses for cybercrime exploits, with Coalition’s policyholders reporting a 35% increase in funds transfer fraud and social engineering claims since the beginning of the pandemic.

    It’s not just the number of attacks that is increasing, but the stakes, darknet market marketplace too. A  from Palo Alto Networks estimates that the average ransom paid in 2020 was over $300,000 — a year-over-year increase of more than 170%.

    When an organization falls prey to cybercrime, the ransom is only one component of the financial cost. There are also remediation expenses — including lost orders, business downtime, consulting fees, and other unplanned expenses. 

    The  report from Sophos found that the total cost of remediating a ransomware attack for a business averaged $1.85 million in 2021, up from $761,000 in 2020. 

    Many companies now buy cyber insurance for financial protection. But as ransomware insurance claims increase, the insurance industry is also dealing with the fallout.

    Globally, the price of cyber insurance has , according to a new report from Howden, an international insurance broker. The increase is likely due to the growing cost these attacks cause for insurance providers. 

    A cyber insurance policy generally covers a business’s liability from a data breach, such as expenses (i.e., ransom payments) and legal fees. Some policies may also help with contacting the businesses customers who were affected by the breach and repairing damaged computer systems. 

    Cyber insurance payouts now account for  of all premiums collected, which is the break-even point for the providers. 

    “We noticed cyber insurers are paying ransom on behalf of their customers. That looks like a bad idea to me, as it will only lead to more ransom attacks,” says Maris. “Having said that, I fully understand the argument: the company either pays or it goes out of business. Only time will tell whether investing in ransom payments rather than in appropriate cybersecurity is a viable survival strategy.”

    Early adopters

    The AIDS Trojan, or PC Cyborg Trojan, is the first known ransomware attack. 

    The attack began in 1989 when an AIDS researcher distributed thousands of copies of a floppy disk containing malware. When people used the floppy disk, it encrypted the computer’s files with a message that demanded a payment sent to a PO Box in Panama. 

    Bitcoin wouldn’t come along until almost two decades later. 

    In 2009, Bitcoin’s mysterious founder, Satoshi Nakamoto, created the blockchain network by mining the first block in the chain — the genesis block. 

    Bitcoin was quickly adopted as the go-to currency for the dark market 2024 web. While it’s unclear exactly when Bitcoin became popular in ransomware attacks, the 2013 CryptoLocker attack definitely put Bitcoin in the spotlight. 

    CryptoLocker infected more than 250,000 computers over a few months. The criminals made off with about $3 million in Bitcoin and pre-paid vouchers. It took an internationally coordinated operation to take the ransomware offline in 2014.

    Since then, Bitcoin has moved closer to the mainstream, and ransomware attacks have become much easier to carry out.

    Early ransomware attackers generally had to develop malware programs themselves. Nowadays, ransomware can be bought as a service, just like other software. 

    Ransomware-as-a-service allows criminals with little technical know-how to “rent” ransomware from a provider, which can be quickly employed against victims. Then if the job succeeds, the ransomware provider gets a cut. 

    Future legislation

    In light of the recent high-profile ransomware attacks, calls for new legislation are growing louder in Washington.

    President Joe Biden issued an  in May “on improving the nation’s cybersecurity.” The order is geared toward strengthening the federal government’s response to cybercrime, and it looks like more legislation is on the way.

    The  was recently introduced by a bipartisan group of senators. The bill aims to ramp up penalties for cyberattacks that impact critical infrastructure, so the Justice Department would have an easier time charging criminals in foreign countries under the new act.

    States are also taking their own stands against cybercrime:  have proposed legislation to outlaw ransomware payments. North Carolina, Pennsylvania, and Texas are all considering new laws that would outlaw taxpayer money from being used in ransom payments. New York’s law goes a step further and could outright ban private businesses from paying cybercrime ransoms. 

    “I think the concept of what cryptocurrency is and how it works is something that most legislative bodies worldwide struggle with understanding,” says Evans. “It’s difficult to legislate what we don’t really understand.”

    The post The history of hacking ransoms and cryptocurrency appeared first on The News Max.

    ]]>
    Stopping cyberattacks. No human necessary https://www.thenewsmax.co/stopping-cyberattacks-no-human-necessary-7/ Sat, 06 Jan 2024 09:04:10 +0000 https://www.thenewsmax.co/?p=26328 id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”> This is part of our  about how innovators are thinking up new ways to make you — and the world around you — smarter.  “Are you a hacker?” A Las Vegas driver asks me this after I tell him I’m headed to Defcon at Caesars Palace. I wonder if his sweat isn’t [...]

    The post Stopping cyberattacks. No human necessary appeared first on The News Max.

    ]]>
    id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

    This is part of our  about how innovators are thinking up new ways to make you — and the world around you — smarter. 


    “Are you a hacker?”

    A Las Vegas driver asks me this after I tell him I’m headed to Defcon at Caesars Palace. I wonder if his sweat isn’t just from the 110℉ heat blasting the city.

    All week, a cloud of paranoia looms over Las Vegas, as hackers from around the world swarm Sin City for Black Hat and Defcon, two back-to-back cybersecurity conferences taking place in the last week of July. At Caesars Palace, where Defcon is celebrating its 25th anniversary, the UPS store posts a sign telling guests it won’t accept printing requests from USB thumb drives. You can’t be too careful with all those hackers in town.

    aicybersecurity-2

    Aaron Robinson/CNET

    Everywhere I walk I see hackers — in tin-foiled fedoras, wearing . Mike Spicer, a security researcher, carries a 4-foot-high backpack holding a “Wi-Fi cactus.” Think wires, antennas, colored lights and 25 Wi-Fi scanners that, in seven hours, captured 75 gigabytes of data from anyone foolish enough to use public Wi-Fi. I see a woman thank him for holding the door open for her, all while his backpack sniffs for unencrypted passwords and personal information it can grab literally out of thin air.

    You’d think that, with all the potential threats literally walking about town, Vegas’ director of technology and innovation, Mike Sherwood, dark web marketplaces would be stressed out. It’s his job to protect thousands of smart sensors around the city that could jam traffic, blast water through pipes or cause a blackout if anything goes haywire.

    And yet he’s sitting right in front of me at Black Hat, smiling.

    His entire three-person team, in fact, is at Black Hat so they can learn how to stave off future attacks. Machine learning is guarding Las Vegas’ network for them.

    Broadly speaking, artificial intelligence refers to machines carrying out jobs that we would consider smart. Machine learning is a subset of AI in which computers learn and adapt for themselves.

    Now a number of cybersecurity companies are turning to machine learning in an attempt to stay one step ahead of professionals working to steal industrial secrets, disrupt national infrastructures, hold computer networks for ransom and even influence elections. Las Vegas, which relies on machine learning to keep the bad guys out, offers a glimpse into a future when more of us will turn to our AI overlords for protection.

    <div class="videoPlayer " data-component="videoPlayer" data-video-player-options='{"config":{"policies":{"default":11417438},"tracking":{"can_partner_id":"canPartnerID","comscore_id":"3000085","comscore_home":"3000085","comscore_how_to":"3000078","comscore_news":"3000078","comscore_reviews":"3000087","comscore_videos":"3000088","comscore_sense_id":"cnetvideo","comscore_sense_home":"cnethome","comscore_sense_how_to":"cnethowto","comscore_sense_news":"cnetnews","comscore_sense_reviews":"cnetreviews","comscore_sense_videos":"cnetvideo","nielsen_cid":"us-200330","nielsen_vcid":"c07","nielsen_vcid_reviews":"c05","nielsen_vcid_home":"c07","nielsen_vcid_news":"c08","nielsen_vcid_how_to":"c09","nielsen_vcid_videos":"c20"},"uvpConfig":{"mpx_account":"kYEXFC"}},"playlist":[{"id":"2b27e36c-1333-4e66-adc4-f4c40695ac2c","title":"AI gets smart about cybersecurity","description":"Cyberattacks have become more sophisticated and more dangerous. Here\u0027s how Las Vegas stays safe.","slug":"ai-gets-smart-about-cybersecurity","chapters":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"datePublished":"2017-09-01 11:55:12","duration":133,"mpxRefId":"GjE6TCyN8ykvLTNLT5r1cdb1lpuTh3DD","ratingVChip":"TV-14","primaryTopic":{"id":"1c1fbb47-c387-11e2-8208-0291187b029a"},"author":{"id":"","firstName":"","lastName":""},"primaryCollection":{"id":"ad467a20-579c-492e-aeb1-8377b883f1ec","title":"Road Trip website

    Man and machine

    At its most basic, machine learning for security involves feeding massive amounts of data to the AI program, which the software then analyzes to spot patterns and dark web sites darknet market 2024 recognize what is, and isn’t, a threat. If you do this millions of times, the machine becomes smart enough to prevent intrusions and malware on its own.

    Theoretically.

    Machine learning naysayers argue that hackers can write malware to trick AI. Sure the software can learn really fast, but it stumbles when it encounters data its creators didn’t anticipate. Remember how trolls turned ? It makes a good case against relying on AI for cybersecurity, where the stakes are so high.

    Even so, that has protected Las Vegas’ network and thousands of sensors for the last 18 months.

    Since last February, Darktrace has defended the city from cyberattacks, around the clock. That comes in handy when you have only three staffers handling cybersecurity for people, 3,000 employees and thousands of online devices. It was worse when Sherwood joined two years ago.

    “That was the time where we only had one security person on the team,” Sherwood tells me. “That was when I thought, ‘I need help and I can’t afford to hire more people.'”

    He’d already used Darktrace in his previous job as deputy director of public safety and city technology in Irvine, California, and he thought the software could help in Las Vegas. Within two weeks, Darktrace found malware on Las Vegas’ network that was sending out data.

    “We didn’t even know,” Sherwood says. “Traditional scanners weren’t picking it up.”  

    Pattern recognition

    I’m standing in front of a tattoo parlor in , a little more than 4 miles from Caesars Palace. Across the street, I see three shuttered stores next to two bail bonds shops.

    I’m convinced the taxi driver dropped me off at the wrong location.

    This is supposed to be Vegas’ $1 million Innovation District project? Where are the in the area? Or the ?

    I look again at the Innovation District map on my phone. I’m in the right place. Despite the rundown stores, trailer homes and empty lots, this corner of downtown Vegas is much smarter than it looks.

    That’s because hidden on the roads and inside all the streetlights, traffic signals and darkmarket pipes are thousands of sensors. They’re tracking the air quality, controlling the lights and water, counting the cars traveling along the roads, and providing Wi-Fi.

    aicybersecurity-3aicybersecurity-3

    Aaron Robinson/CNET

    Officials chose the city’s rundown area to serve as its Innovation District because they wanted to redevelop it, with help from technology, Sherwood says. There’s just one problem: All those connected devices are potential targets for a cyberattack. That’s where Darktrace comes in.

    Sherwood willingly banks on Darktrace to protect the city’s entire network because the software comes at machine learning from a different angle. Most machine learning tools rely on brute force: cramming themselves with thousands of terabytes of data so they can learn through plenty of trial and error. That’s how IBM’s Deep Blue computer learned to defeat Garry Kasparov, the world chess champion, in a best-of-seven match in 1997. In the security world, that data describes malware signatures — essentially algorithms that identify specific viruses or worms, for instance.

    Darktrace, in contrast, doesn’t look at a massive database of malware that’s come before. Instead, it looks for patterns of human behavior. It learns within a week what’s considered normal behavior for users and sets off alarms when things fall out of pattern, like when someone’s computer suddenly starts encrypting loads of files.

    Rise of the machines?

    Still, it’s probably too soon to hand over all security responsibilities to artificial intelligence, says  , a security professor and director of Carnegie Mellon University’s CyLab Security and Privacy Institute. He predicts it’ll take at least 10 years before we can safely use AI to keep bad things out.

    “It’s really easy for AI to miss things,” Brumley tells me over the phone. “It’s not a perfect solution, and you still need people to make important choices.”

    aicybersecurity-1-notxtaicybersecurity-1-notxt

    Aaron Robinson/CNET

    Brumley’s team last year built an AI machine that won beating out other AI entries. A few days later, their contender took on some of the world’s best hackers at Defcon. They came in last.

    Sure, machines can help humans fight the scale and speed of attacks, but it’ll take years before they can actually call the shots, says Brumley.

    That’s because the model for AI right now is still data cramming, which — by today’s standards — is actually kind of dumb.

    But it was still good enough to , making him the de facto poster child for man outsmarted by machine.

    “I always remind people it was a rematch, because I won the first one,” he tells me, chuckling, while sitting in a room at Caesars Palace during Defcon. Today Kasparov, 54, is the which is why he’s been giving talks around the country on why humans need to work with AI in cybersecurity.  

    He tells me machines can now learn too fast for humans to keep up, no matter if it’s chess or cybersecurity. “The vigilance and the precision required to beat the machine — it’s virtually impossible to reach in human competition,” Kasparov says.

    Nobody’s perfect

    About two months before Defcon, I’m at Darktrace’s headquarters in New York, where company executives show me how the system works.

    On a screen, I see connected computers and printers sending data to Darktrace’s network as it monitors for behavior that’s out of the ordinary.  

    kasparov-defcon3kasparov-defcon3

    Garry Kasparov addresses the Defcon crowd at this year’s conference. 


    Avast

    “For example, Sue doesn’t usually access this much internal data,” Nancy Karches, Darktrace’s sales manager, tells me. “This is straying from Sue’s normal pattern.” So Darktrace shuts down an attack most likely waged by another machine.

    “When you have machine-based attacks, the attacks are moving at a machine speed from one to the other,” says Darktrace CEO Nicole Eagan. “It’s hard for humans to keep up with that.”

    But what happens when AI becomes the norm? When everyone’s using AI, says Brumley, hackers will turn all their attention on finding the machines’ flaws — something they’re not doing yet.

    screenshot-at-aug-14-14-58-27screenshot-at-aug-14-14-58-27


    Darktrace

    “We’ve seen again and again, the reason new solutions work better is because attackers aren’t targeting its weaknesses,” he says. “As soon as it became popular, it started working worse and worse.”

    About 60 percent of cybersecurity experts at Black Hat believe hackers will use AI for attacks by 2018, according to a survey from the security company Cylance.

    “Machine learning security is not foolproof,” says Hyrum Anderson, principal data scientist at cybersecurity company Endgame, who and their tools. Anderson expects AI-based malware will rapidly make thousands of attempts to find code that the AI-based security misses.

    to see more Road Trip adventures.


    Bettmann/Contributor

    “The bad guy can do this with trial and error, and it will cost him months,” Anderson says. “The bot can learn to do this, and it will take hours.”

    Anderson says he expects cybercriminals will eventually sell AI malware on darknet market darknet markets onion to wannabe hackers.

    For now, Sherwood feels safe having the city protected by an AI machine, which has shielded Las Vegas’ network for the past year. But he also realizes a day will come when hackers could outsmart the AI. That’s why Sherwood and his Las Vegas security team are at Black Hat: to learn how to use human judgment and creativity while the machine parries attacks as rapidly as they come in.

    Kasparov has been trying to make that point for the last 20 years. He sees machines doing about 80 percent to 90 percent of the work, but he believes they’ll never get to what he calls “that last decimal place.”

    “You will see more and more advanced destruction on one side, and that will force you to become more creative on the positive side,” he tells me.

    “Human creativity is how we make the difference.”

    : Reporters’ dispatches from the field on tech’s role in the global refugee crisis. 

    : CNET hunts for innovation outside the Silicon Valley bubble. 

    The post Stopping cyberattacks. No human necessary appeared first on The News Max.

    ]]>
    Most weapons on the dark web come from US, study finds https://www.thenewsmax.co/most-weapons-on-the-dark-web-come-from-us-study-finds-3/ Sat, 06 Jan 2024 03:04:50 +0000 https://www.thenewsmax.co/?p=26128 id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”> US guns make up as much as 60 percent of the weapons on sale on the dark web, new research has found. Related links Weapons, drugs and stolen identities are readily available on the dark web, a . To investigate where guns, ammunition and guides to their use come from, the UK’s [...]

    The post Most weapons on the dark web come from US, study finds appeared first on The News Max.

    ]]>
    id=”article-body” class=”row” section=”article-body” data-component=”trackCWV”>

    US guns make up as much as 60 percent of the weapons on sale on the dark web, new research has found.

    The 3 Best Dark Web Websites, To Make Money...

    Weapons, drugs and stolen identities are readily available on the dark web, a . To investigate where guns, ammunition and guides to their use come from, the UK’s University of Manchester and think tank Rand Europe — or darknet market darknet markets onion 2024 cryptomarkets — and darknet sites found 811 listings relevant to the study, published Wednesday.

    Most weapons were from the USA, where , dark darknet market list and most sales were destined for Europe. A gun bought from the dark web was used in a .

    “The dark web is both an enabler for the trade of illegal weapons already on the black darknet market and a potential source of diversion for weapons legally owned”, said Giacomo Persi Paoli, the report’s lead author. “The ability for criminals and terrorists, as well as vulnerable or fixated individuals, to make virtually anonymous purchases is perhaps the most dangerous aspect.”

    On Thursday, US and European law enforcement agencies the , two of the three largest dark web markets

    The post Most weapons on the dark web come from US, study finds appeared first on The News Max.

    ]]>
    Germany busts international child porn site used by 400,000 https://www.thenewsmax.co/germany-busts-international-child-porn-site-used-by-400000-2/ Sat, 06 Jan 2024 03:04:46 +0000 https://www.thenewsmax.co/?p=26113 BERLIN (AP) – German prosecutors announced Monday they have busted one of the world’s biggest international darknet market platforms for child pornography, dark market onion used by more than 400,000 registered members. Frankfurt prosecutors said in a statement together with the Federal Criminal Police Office that in mid-April three German suspects, said to be the [...]

    The post Germany busts international child porn site used by 400,000 appeared first on The News Max.

    ]]>
    BERLIN (AP) – German prosecutors announced Monday they have busted one of the world’s biggest international darknet market platforms for child pornography, dark market onion used by more than 400,000 registered members.

    Frankfurt prosecutors said in a statement together with the Federal Criminal Police Office that in mid-April three German suspects, said to be the administrators of the “Boystown” platform, were arrested along with a German user.
    One of the three main suspects was arrested in Paraguay.

    They also searched seven buildings in connection with the porn ring in mid-April in Germany.

    Group Of Combat Veterans Terrified While Fishing A River

    The authorities said the platform was “one of the world’s biggest child pornography darknet market platforms” and had been active at least since 2019.

    Pedophiles used it to exchange and watch pornography of children and toddlers, darknet market marketplace most of them boys, from all over the world.

    Prosecutors wrote that they found “images of most severe sexual abuse of toddlers” among the photos and video material.

    “The platform had several forums and chats – the illegal pictures and videos were kept in the forums; in the chats, the members could communicate,” prosecutor Julia Bussweiler said.
    “There were several language channels to facilitate the communication.”

    A German police task force investigated the platform, its administrators and users for months in cooperation with Europol and law enforcement authorities from the Netherlands, Sweden, Australia, the United States and dark web link Canada, the statement said.

    The three main suspects were a 40-year-old man from Paderborn, a 49-year-old man from Munich and a 58-year-old man from northern Germany who had been living in Paraguay for many years, the prosecutors’ statement said.

    They worked as administrators of the site and gave advice to members on how to evade law enforcement when using the platform for darknet market illegal child pornography.

    A fourth suspect, a 64-year-old man from Hamburg, is accused of being one of the most active users of the platform having allegedly uploaded more than 3,500 posts.

    Germany has requested the extradition of the suspect who was arrested in Paraguay.

    No names were given in line with Germany privacy regulations.

    After the raids in mid-April, the online platform was shut down.

    Germany’s top security official thanked the authorities for their success.

    “This investigative success has a clear message: Those who assault the weakest aren’t safe anywhere,” German Interior darknet market lists Minister Horst Seehofer said.

    “That’s what investigators work for day and night, online and offline, globally.”

    “We’ll do everything within our power to protect the kids from these disgusting crimes,” he added.

    ___

    Christoph Noelting in Frankfurt, Germany, contributed to this story.

    The post Germany busts international child porn site used by 400,000 appeared first on The News Max.

    ]]>
    German investigators shut down big darknet marketplace https://www.thenewsmax.co/german-investigators-shut-down-big-darknet-marketplace/ Fri, 05 Jan 2024 23:04:17 +0000 https://www.thenewsmax.co/?p=25958 BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and darknet market magazine arrested its suspected operator. The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said. All sorts of drugs, forged [...]

    The post German investigators shut down big darknet marketplace appeared first on The News Max.

    ]]>
    BERLIN (AP) – German prosecutors said Tuesday that they have taken down what they believe was the biggest illegal marketplace on the darknet market and darknet market magazine arrested its suspected operator.

    The site, known as DarkMarket, was shut down on Monday, prosecutors in the southwestern city of Koblenz said.
    All sorts of drugs, forged money, darknet markets onion address stolen or forged credit cards, anonymous mobile phone SIM cards and malware were among the things offered for sale there, they added.

    German investigators were assisted in their months-long probe by U.S. authorities and by Australian, British, Danish, Swiss, Ukrainian and Moldovan police.

    The marketplace had nearly 500,000 users and more than 2,400 vendors, dark web darknet market prosecutors said.

    They added that it processed more than 320,000 transactions, and Bitcoin and Monero cryptocurrency to the value of more than 140 million euros ($170 million) were exchanged.

    The darknet market links is a part of the web accessible only with specialized identity-cloaking tools.

    The suspected operator, a 34-year-old Australian man, was arrested near the German-Danish border.

    Prosecutors said a judge has ordered him held in custody pending possible formal charges, and he hasn’t given any information to investigators.

    More than 20 servers in Moldova and Ukraine were seized, German prosecutors said. They hope to find information on those servers about other participants in the marketplace.

    Prosecutors said the move against DarkMarket originated in an investigation of a data processing center installed in a former NATO bunker in southwestern Germany that hosted sites dealing in drugs and other illegal activities.

    It was shut down in 2019.

    That center hosted DarkMarket at one point.


    The post German investigators shut down big darknet marketplace appeared first on The News Max.

    ]]>