The Evolution of Cybercrime on the Dark Web: Trends, Techniques, and Countermeasures
DOI:
https://doi.org/10.31305/trjtm2024.v04.n02.003Keywords:
Dark Web, Cybercrime, Anonymous Browsing, CryptocurrenciesAbstract
The Dark Web has developed into a complex marketplace for illegal commerce, hacking services, and other types of criminality, and it has become an essential platform for cybercriminals. By comparing and contrasting the Dark Web with the Surface and Deep Web, this study delves into its structure and functions and charts the evolution of criminality on this shadowy portion of the internet. A lot has changed in the world of Dark Web criminality since important turning points like Silk Road and anonymous surfing tools like TOR first appeared. Ransomware, identity theft, and data breaches are just a few of the illegal behaviors included in the report, along with the methods and strategies used by cybercriminals, such as encryption, anonymity tools, and cryptocurrency. Also covered are data theft's historical development, the rise of Ransomware-as-a-Service (RaaS), and the new dangers presented by cybercrime's use of artificial intelligence and machine learning. Using case studies of prominent instances as evidence, the research goes on to evaluate the monetary, social, and legal effects of cybercrime driven by the Dark Web on international security.
References
Aldridge, J., & Décary-Hétu, D. (2016). Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets. International Journal of Drug Policy, 35, 7-15. https://doi.org/10.1016/j.drugpo.2016.01.010
Bergman, M. K. (2001). The deep web: Surfacing hidden value. Journal of Electronic Publishing, 7(1). https://doi.org/10.3998/3336451.0007.104
Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of Economic Perspectives, 29(2), 213-238. https://doi.org/10.1257/jep.29.2.213
Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. Proceedings of the 22nd international conference on World Wide Web, 213-224. https://doi.org/10.1145/2488388.2488408
FBI. (2021). International cooperation and dark web investigations. Federal Bureau of Investigation. https://www.fbi.gov/investigate/violent-crime/cyber
Gehl, R. W. (2018). Weaving the dark web: Legitimacy on Freenet, Tor, and I2P. MIT Press.
Greenberg, A. (2014). This machine kills secrets: How WikiLeakers, cypherpunks, and hacktivists aim to free the world's information. Plume.
Greenberg, A. (2017). Sandworm: A new era of cyberwar and the hunt for the Kremlin's most dangerous hackers. Doubleday.
Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Data breaches, phishing, or carding: How stolen data is being used by cybercriminals. Security Journal, 29(2), 368-382. https://doi.org/10.1057/sj.2013.29
Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Data breaches, phishing, or carding: How stolen data is being used by cybercriminals. Security Journal, 29(2), 368-382. https://doi.org/10.1057/sj.2013.29
Hutchings, A., & Holt, T. J. (2017). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614. https://doi.org/10.1093/bjc/azv130
IBM & Ponemon Institute. (2021). Cost of a Data Breach Report 2021. IBM Security. https://www.ibm.com/security/data-breach
Kharraz, A., Robertson, W. K., Balzarotti, D., & Kirda, E. (2015). Cutting the Gordian knot: A look under the hood of ransomware attacks. Proceedings of the 12th USENIX Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 3, 117-129. https://doi.org/10.1109/EuroSP.2016.35
Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1), 7-38. https://doi.org/10.1080/00396338.2016.1142085
Symantec. (2019). Internet Security Threat Report. Symantec Corporation.
Downloads
Published
Issue
Section
Deprecated: json_decode(): Passing null to parameter #1 ($json) of type string is deprecated in /home/u495429466/domains/technoreview.co.in/public_html/plugins/generic/citations/CitationsPlugin.php on line 68