• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

My Journey into the Dark Web: At Your Service

January 9, 2019 By Emil Hozan

This blog expands on my previously written My Journey into the Dark Web, which can be found here. The previous post covers where to start prior to meandering on the dark web, doing so in a safer manner by utilizing a VM and the Tor browser. Following is the clarification of some buzzwords that can seem ambiguous; surface web vs. deep web vs. dark web. It then covers what the Tor network is and how it works, a sample URL that should help get you started, and then wraps up with a disclaimer (of course).

Initially my intentions were to do some research into seeing what made the dark web what it is – the dogma suggesting unethical business conduct offerings. In pursuit of this, I also took note of what types of services were offered, how much they cost, and compared services from various vendors. Below you will find the aggregated data covering financial services, identity services, hacking services, and more. Listed prices are based on the time of when the research was conducted and in U.S. dollar rates, along with the converted Bitcoin rates. Read on to get more detail.

 

Hacking Services

Covering quite a few vectors, many onion (Tor-specific verbiage used to specify a website hosted on the Tor network) sites touted their services to be a sure thing. A few general offers include hacking a web server, changing school grades, and even offering DDoS services. If you have a personal vendetta against an individual, services include hacking personal computers, cell phones, email, or even social media accounts.

Interested in causing extreme havoc? If so, you may be interested in an all-inclusive ransomware package that is discounted depending on the length of time of rental. The longer you desire to rent, the cheaper it gets. It seems you can get just about whatever hacking you need done – for a price.

 

Identity Services

Are you lacking some resume-bolstering highlights? Do you wish you had completed high school and got your diploma? Perhaps you’d like a college degree, just without the cumbersome debt that’s incurred? Maybe you’re in need of a fake passport or I.D. card? Heck, if you’re upset with how life’s going just ditch it and opt for the “Start a New Life Package” and get what you need in one transaction.

 

Intelligence Gathering

Maybe the aforementioned services are too involved, and you’d rather stick to the back seat. Rest assured, there are some passive services available for you as well. You can take your pick from a variety of intelligence reports, including locating people or conducting background checks, to obtaining a data dump of siphoned sensitive information. If you’ve been recently scammed and are infuriated, why not track down the scammer or have custom spyware created.

 

A La Carte

If you just want direct access to a hacker to do your bidding, choose from either of the tiers below.

Restaurant-like menu depicting hacking services with their prices.

 

Financial Services

Alas, you can’t do much without the funds to acquire said service. Granted you’d need to “invest” a bit of money to potentially get a larger return, buying counterfeit money may be just what you need. Get a stack of cash, access to high-balance credit cards or financial service accounts, pick what best suits your needs from the menu.

  • Financial_Services_01
  • Financial_Services_Cards_02
  • Financial_Services_Counterfeit_03

 

Conclusion

To be thorough, of course I need to wrap this up with clarifying that the above context was said just in good humor. By no means do I suggest nor endorse any reader to seek out services related to illegal activity. Personally, I am a believer in hard work but also smart work.

Share This:

Related

Filed Under: Editorial Articles Tagged With: dark web, hack, hacker, Hacking

Comments

  1. Tony says

    January 28, 2019 at 11:15 am

    I’d like to recreate the slides you have in this blog. Any interest in sharing where you derived the info for them?

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
  • TikTok is Banned, Kind Of
  • How Not to Update Software

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • How Not to Update Software
  • Naming APTs
  • TikTok is Banned, Kind Of
  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use