什么是暗网? 

暗网臭名昭著,全世界都知道. 十年前,情况可能并非如此. As cyber attacks accelerate 和 nefarious actors all over the globe seek to more rapidly connect with buyers of illegal goods 和 information, 暗网这个词以一种显著的方式进入了词典.

根据… 来自杜兰大学的描述, the 黑暗的网络 was leveraged by the United 状态s Department of Defense as a means of communicating anonymously. 它保持活动匿名的才能依然存在, but now protects malicious actors instead of innocent citizens of a given country.

暗网是非法毒品卖家, 身份, 信息(密码, 账号, 等.)武器, 和 many other illegal forms of physical materials 和 digital information look to traffic these materials across borders. 在网络安全方面,暗网是一个 Ransomware-as-a-Service 工具包和网络钓鱼方法每天都在交易和利用.

We really can’t put too fine a point on this fact: When it comes to cybersecurity in particular, the 黑暗的网络 is the sourcing ground for attackers to get the tools they need to disrupt your organization 和 business. Accordingly, it’s become paramount for security teams all over the world to respond faster than ever.

如何进入暗网

试图进入暗网, there’s an invisible line that a person acknowledges they’re crossing – or maybe they don’t. Either way, no one is accessing the 黑暗的网络 with a sense of optimism 和 happiness. 这是一个买邪恶的东西做坏事的地方.

There are many ways to access the 黑暗的网络, including one technique known as onion routing. Onion routing uses multi-layered encryption to create anonymous communication over a computer network. 解开这些加密层有点像剥洋葱.

用于访问暗网的网络浏览器被设计为与 Tor网络 to browse both the 黑暗的网络 和 normal websites anonymously, without leaking user information. This ”Tor browser” is the most well-known implementation of onion routing used on the 黑暗的网络.

访问暗网非法吗? 

这就是事情可能变得有点混乱的地方, 因为2023年的暗网几乎是非法活动的代名词. 事实上,那里发生的绝大多数活动都是非法的.

So, 信不信由你, it’s not illegal to access the 黑暗的网络; there are actually reputable br和s 和 companies who have sites accessible via the 黑暗的网络. It can simply be a dangerous proposition to peruse the 黑暗的网络 和 engage with whoever you may meet, 尤其是如果这意味着泄露任何个人数据.

暗网的用途是什么? 

暗网 is used by cybercriminals to buy 和 sell illegal goods 和 services, 协调攻击, 分发恶意软件和网络钓鱼工具包, 并分享其他预构建的漏洞. 具体地说, bad actors could use the 黑暗的网络 to buy 和 sell stolen employee credentials from a business. 退出骗局也是暗网上的主要活动.

An exit scam is put into place when a market administrator or a vendor wants to retire, 而且在这样做的同时,还尽可能多地从买家那里拿钱. 在暗网上出售的其他一些材料的例子可能包括:

  • 个人身份资料(PII): This is any information that a person may have submitted to an online retailer or social networking app. 
  • 财务信息这是访问银行账户的详细信息, 财富管理信息, 投资, 与个人或企业有关的其他私人货币信息. 
  • 政府的秘密: This category includes any information related to a nation's defense or active military/cyber-intelligence campaigns. 
  • 商业秘密: This type of data denotes information as to how a business might maintain a competitive advantage within its industry. 
  • 帮助盗窃的物质材料: An example from this category would be "skimming" devices that steal credit card data from point-of-sale platforms. 

深网和暗网的区别是什么? 

The difference between the deep web 和 the dark web is not necessarily the “findability” of information that exists on either, as both of these types of online information repositories feature data that is not indexed by search engines like Google or Bing. 主要的区别可以通过以下两个方面来描述:

  • 内容合法性: Illegal content of the type we discussed above is the primary material available on the 黑暗的网络. 如果你有合适的浏览器访问暗网站, then chances are a bad actor is going to be able to access nefarious content – 和 potentially purchase it, 他们应该如此渴望吗——中间没有任何障碍.
  • 内容的可访问性: That brings us to the differentiator between the Dark 和 Deep Web: accessibility. Content on the Deep Web typically isn’t of the nefarious sort, but it is usually gated. 这方面的例子包括私有/加密文件, 内容只提供给付费客户或订阅者, 内部网络,比如公司内部网.

这些差异并不一定是明确的, 因为在深网和暗网之间有重叠的方面. As opposed to the Surface Web – also known as the Open Web – where anyone with an internet connection can access public-facing websites all over the world, the Deep 和 黑暗的网络 are attempting to house information that doesn’t necessarily want to be found. Therefore, it’s likely that not all deep- 和 dark-web file repositories represent good intentions.

As stated earlier, neither of these connected content repository networks are illegal to access. 事实上, they must frequently be accessed by cybersecurity organizations conducting threat hunts or defending their networks or those of their clients.

例如, if a threat actor is in possession of stolen data from a large healthcare provider, security personnel acting on behalf of the company are likely to conduct a large portion of that investigation throughout the 黑暗的网络. 威胁情报 从深网和暗网收集的信息可能会对未来有所帮助 威胁狩猎 teams when analyzing telemetry from beyond their own networks, such as the Deep 和 黑暗的网络.

如何保护自己免受黑暗网络的侵害

这些天, it can seem increasingly difficult to protect valuable assets 和 data from the reaches of threat actors. This is particularly true for enterprise organizations working with sensitive data in key sectors like healthcare, 能源, 和金融. 这就是为什么进攻比以往任何时候都更加重要.

获得黑客社区的知名度

网络犯罪分子潜伏在暗网上,有条不紊地协调他们的攻击, 出售非法物品, 分发恶意软件和网络钓鱼工具包, 并分享其他预构建的漏洞. Go behind enemy lines to identify threat actors 和 their intentions at the earliest stages so you can properly prepare your defenses.

获得针对性攻击的早期预警 

With proper monitoring resources, you can gain visibility into threat actors 和 their activities. This includes accessing restricted channels 和 automating intelligence gathering to anticipate attacks targeting your organization, 员工, 和客户.

发现新的黑客工具和勒索软件工具包

监控独家暗网论坛和威胁行为者的私人渠道. 以这种方式, 您将发现用于自动化攻击的新网络犯罪策略和工具, 测试弱点, 欺骗你的员工和客户. It’s important to step into their shoes to underst和 how perpetrators can 和 will attack you.

了解并对付你的对手

使用a很关键 暗网监控解决方案 这可以持续关注你的对手,并与威胁行为者接触. 从这些活动中, 解决方案应该能够收集数据样本, 揭示动机, 并帮助您部署更智能的网络安全工作流程.

在暗网上阅读更多内容

黑暗网络:快速7博客文章

白皮书:暗网201