Deep Dot Web https://www.deepdotweb.com Surfacing The News From The DeepWeb Sun, 19 Nov 2017 12:34:30 -0200 en-US hourly 1 https://wordpress.org/?v=4.8.3 Bitcoin news roundup, November 19, 2017 https://www.deepdotweb.com/2017/11/19/bitcoin-news-roundup-november-19-2017/ https://www.deepdotweb.com/2017/11/19/bitcoin-news-roundup-november-19-2017/#respond Sun, 19 Nov 2017 12:34:30 +0000 https://www.deepdotweb.com/?p=23587 This week’s summary of various cryptocurrency news and developments: New developments: SegWit adoption set to increase as Blockchain wallet, Bitfinex add support SegWit activated on the Bitcoin network back in August and so far, various companies haven’t yet upgraded their systems to adopt it. Recently, Bitcoin’s biggest wallet provider, Blockchain, announced through a blog post ...

The post Bitcoin news roundup, November 19, 2017 appeared first on Deep Dot Web.

]]>
This week’s summary of various cryptocurrency news and developments:

New developments:

SegWit adoption set to increase as Blockchain wallet, Bitfinex add support

SegWit activated on the Bitcoin network back in August and so far, various companies haven’t yet upgraded their systems to adopt it. Recently, Bitcoin’s biggest wallet provider, Blockchain, announced through a blog post that it will add full Bitcoin Cash (BCH) support, and then work on SegWit. The wallet provider reportedly has over 19 million users, and was criticized for adding BCH support before SegWit.

Bitfinex, one of the largest cryptocurrency exchanges, will also reportedly add support for SegWit within a week, according to a tweet from Chris Ellis, a Bitfinex community Liaison employee. The exchange hasn’t yet announced anything on social media or its blog, and hasn’t rolled out the upgrade earlier because it had “some other upgrades to do first.”

Square’s Cash app added Bitcoin buy/sell options to some users

Square’s Cash app, a popular Venmo competitor that allows people to easily send and receive money, recently gave some users the option to buy and sell Bitcoin – not send and receive -from within the app. The move didn’t come with any official announcement, and most users rejoiced on social media. Speaking to CNBC, the company’s Chief Financial Officer (CFO) stated that the move was a way to meet customer demand for the cryptocurrency, and that as an innovator Square’s role is to allow customers to what they want to.

Parity considers hark fork to unfreeze 513,774 Ether

Last week, DeepDotWeb reported on a bug on Parity Technologies’ multi-sig wallets that led to millions worth of Ether (513,774 ETH, about $171 million at press time) being permanently locked, following the accidental exploitation. An inexperienced developer reportedly triggered the bug and gained control over the Parity Library contract, and then attempted to delete the contract’s code that gave him ownership – whose logic is used in all Parity-based multi-sig wallets – to fix the issue. As a result, over 500 multi-sig wallets are now frozen, inaccessible to even their owners.

In a new update, Parity revealed that it’s working on a “broadly accepted solution that will unblock the funds.” On the update, Parity revealed its team discussed EIP156, an Ethereum Improvement Proposal that’s meant to help users recover funds that got “stuck” in the past. The solution would be implemented through a hard fork, which a lot of people believe could lead to another blockchain split.

Jutta Steiner, the founder of Parity Technologies apologized for the less-than-ideal situation:

  • “We deeply regret the impact this situation is causing among our users and within the community. We do ask that people get in touch with us if they have any uncertainties and to not believe the speculation circulating the media. We are endeavouring to find a solution as soon as possible and we would like to thank everyone for the support we’ve experienced so far.”

BitMEX to sell users’ Bitcoin Cash and credit them with Bitcoin

Hong Kong-based Bitcoin Mercantile Exchange (BitMEX) recently announced that it won’t be giving its customers their Bitcoin Cash balances, but will instead sell their tokens and distribute the proceeds in Bitcoin. According to the exchange, as Bitcoin Cash was created through a “contentious hard fork” it won’t allow users to access their coins. It did, however, notably add Bitcoin Cash futures to its platform, allowing users to bet on the cryptocurrency’s future value.

BitMEX’s selloff is expected to have a large impact on Bitcoin Cash’s value, as the exchange consistently has daily volumes above $1 billion. Although the selloff could depress the cryptocurrency’s price in the short-term, BitMEX emphasized it will be selling off the cryptocurrency as it still has “value and popular demand” months after the fork, proving its value and viability.

World affairs:

Bitcoin surpasses $14,000 in Zimbabwe as tanks roll through the streets

Bitcoin is known to flourish in uncertain times and as a full-blown military coup started sweeping Zimbabwe and the country’s president, Robert Mugabe, was nowhere to be found, the cryptocurrency’s price started surging. Footage of tanks rolling the streets started appearing, and given the nation’s economic problems, Bitcoin started becoming a solution for the people of Zimbabwe – even more than what it was after the country had to adopt the U.S. dollar as its fiat currency due to hyperinflation. The country’s only exchange, Golix, has handled a 170 BTC trading volume in the last 30 days, a huge increase over the rest of the year, and at press time one Bitcoin is trading at $14,400 at the exchange, while the 24-hour high reached $15,750.

India’s Supreme Court pushes the government on Bitcoin regulations

According to reports, the Indian Supreme Court has asked the government to respond to calls to regulate the number one cryptocurrency, as three justices issued a notice to the Finance, Law and Justice, and Information Technologies Ministries, as well as the country’s central bank, demanding an answer to a petition that tried to clarify whether Bitcoin was, or wasn’t, legal in the country. The petition emphasized that Bitcoin exchanges in India have been adding over 2,500 users per day, and that about 500,000 people in the country now hold Bitcoin. The petition states that due to the adoption, Bitcoin usage “may affect the market value of other commodities.”

The lack of regulations in the country led, in the past, India’s top Bitcoin exchanges to establish a self-regulatory body, while authorities have established an inter-disciplinary committee to study and develop frameworks for cryptocurrencies in the country.

Financial:

Bitcoin at $7,699.73, after hitting a new all-time high above $8,000

Bitcoin surged this week, as the number one cryptocurrency once again reached new heights this year, this time above the $8,000 mark, following the Square’s Cash app addition of Bitcoin buy and sell options, reported above. At press time, one Bitcoin is trading at $7,699.73 and the cryptocurrency’s market cap is of $128 billion, while the cryptocurrency ecosystem’s market cap is of $231 billion, meaning Bitcoin’s dominance index is currently at 55.5%.

The post Bitcoin news roundup, November 19, 2017 appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/19/bitcoin-news-roundup-november-19-2017/feed/ 0
Tor Browser Updates Patch IP Leaking TorMoil Bug https://www.deepdotweb.com/2017/11/19/tor-browser-updates-patch-ip-leaking-tormoil-bug/ https://www.deepdotweb.com/2017/11/19/tor-browser-updates-patch-ip-leaking-tormoil-bug/#respond Sun, 19 Nov 2017 04:09:19 +0000 https://www.deepdotweb.com/?p=23577 With the new updates in Tor Browser version 7.0.9 for Linux and Mac operating systems, Tor is now patched up from a new vulnerability that was recently discovered that would cause Tor Browser to leak the IP address of its user. The vulnerability was given the name TorMoil by the person who discovered, Filippo Cavallarin ...

The post Tor Browser Updates Patch IP Leaking TorMoil Bug appeared first on Deep Dot Web.

]]>
With the new updates in Tor Browser version 7.0.9 for Linux and Mac operating systems, Tor is now patched up from a new vulnerability that was recently discovered that would cause Tor Browser to leak the IP address of its user. The vulnerability was given the name TorMoil by the person who discovered, Filippo Cavallarin of wearesegment.com. The bug does not affect any versions of Tor Browser for Microsoft Windows operating systems. Not all versions of Tor Browser for Linux were affected by TorMoil. Users of the special version of Tor Browser for the Tails operating system were also not affected by the TorMoil bug. The use of Tor Browser on the Whonix operating system was also not affected by the TorMoil bug, nor were users of the Qubes operating system with a dedicated Tor virtual machine affected by TorMoil. The Sandboxed Tor Browser, which is still in the alpha stage of development, is also not vulnerable to the TorMoil bug. Of course if a person is using a VPN to connect to the Tor network, then only the IP address of the VPN could be leaked through the TorMoil bug. Cavallarin alerted the Tor Project to the vulnerability at the end of October.

Developers of the Tor Browser from the Tor Project worked together with developers of Firefox at Mozilla to create a patch to stop the TorMoil vulnerability. Related issues remain. “The fix we deployed is just a workaround stopping the leak. As a result of that navigating file:// URLs in the browser might not work as expected anymore. In particular entering file:// URLs in the URL bar and clicking on resulting links is broken. Opening those in a new tab or new window does not work either. A workaround for those issues is dragging the link into the URL bar or on a tab instead. We track this follow-up regression in bug 24136,” the Tor Project stated in a blog post on the release of Tor Browser version 7.0.9.

A day after being alerted by Cavallarin about the vulnerability, an initial fix for the TorMoil bug was created. However, this initial fix was only a partial solution. An additional patch was created which fixed all known holes. In a statement made on the Tor Project’s blog which announced the release of the patched version of Tor Browser, the project stated that, “We are not aware of this vulnerability being exploited in the wild. Thanks to everyone who helped during this process!”A security fix for the alpha version of Tor Browser was released shortly after the stable version of Tor Browser was patched. The new alpha version of the Tor Browser for Linux and Mac operating systems, version 7.5a7, was released on November 4th, a day after the stable version of Tor Browser had been patched and published. These patches fix the security issue caused by TorMoil, and users may still experience problems with file:// URLs.

The Tor Project also recently released an update for the alpha version of Tor, which contains a couple of major bug fixes for Tor, including fixes which improve stability. Another recent release from the Tor Project includes a command line Tor relay monitor called Nyx. Nyx, named after the Greek goddess of the night, enables Tor relay operators to ensure their Tor relay is functioning properly. The Nyx command line tool allows users to access information about bandwidth usage, Tor connections, logs, among other data. Nyx scrubs information about users identities and exit connections. The new Tor relay tool is a completely redesigned version of an application called arm. Some new features Nyx has that the old arm tool did not have include support for Python 3, a bandwidth graph which loads right away, support for IPv6 connections, and connections information can be seen without having to edit torrc.

The post Tor Browser Updates Patch IP Leaking TorMoil Bug appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/19/tor-browser-updates-patch-ip-leaking-tormoil-bug/feed/ 0
One of Two Dark Web Drug Dealers Arrested Is a Freelance Journalist https://www.deepdotweb.com/2017/11/18/one-two-dark-web-drug-dealers-arrested-freelance-journalist/ https://www.deepdotweb.com/2017/11/18/one-two-dark-web-drug-dealers-arrested-freelance-journalist/#respond Sat, 18 Nov 2017 20:39:22 +0000 https://www.deepdotweb.com/?p=23563 In wake of the arrest of two people in Delhi, who were dealing drugs ordered from the darknet, reports emerging from that case also revealed that one of the culprits is a freelance journalist. Mahesh Goyal was researching the malpractices associated with the same crime he got involved with. He crossed paths with the suppliers ...

The post One of Two Dark Web Drug Dealers Arrested Is a Freelance Journalist appeared first on Deep Dot Web.

]]>
In wake of the arrest of two people in Delhi, who were dealing drugs ordered from the darknet, reports emerging from that case also revealed that one of the culprits is a freelance journalist.

Mahesh Goyal was researching the malpractices associated with the same crime he got involved with. He crossed paths with the suppliers and then went straight into business with them.

Mahesh Goyal was arrested together with an accomplice who works as a Disco Jockey for supplying ecstasy and MDMA for the youth at rave parties.

When Goyal was questioned by the police, he revealed that he met some supplier’s while he was searching the dark web for articles and decided to order his first pack. After this encounter, he later contacted the suppliers again to hook him up with small quantities of ecstasy and MDMA, popularly known as party drugs. Upon receiving the order, Goyal then sold the drugs to organizers of rave parties.

A Facebook profile with Goyal’s name and a photo is been scanned by the police as they suspect him to be one of the most reliable contacts that the dealers used in securing the market in the NCR. In addition, he is believed to be part of a political party in Chennai but unfortunately, his associations could not be verified by the police.

The investigation also revealed that Goyal had actually met some of the suppliers and with this, the police hoped that this disclosure would be of help in reaching the suppliers who normally hid behind different usernames to disguise their identities. This is because the websites only allow entry after the administrators have solid reasons to believe that the customer is not bait.

Since Goyal claimed to have met some of them, there isn’t much of a worry that something might go sour.

Goyal was arrested by the Delhi Police Crime Branch alongside his partner in crime, Kamal Kalara who worked as a Disc Jockey. The two were accused of supplying drugs that were ordered from the dark web to youths at rave parties and nightclubs of which Kamal Kalara happens to be connected with. It was revealed that the whole drug operation was done only by the use of bitcoins.

Kamal Kalara was the first to get arrested in Rohini after the Delhi Police Crime Branch received a tip-off about his doings. It was during interrogation that he named an accomplice, Mahesh Goyal. He was later arrested by the police while in possession of 20 grams of MDMA. Kamal Kalara upon his arrest had on him 100 (42 grams) of ecstasy.

During interrogation, Goyal said he went to a party of which he had his first taste of ecstasy, while still staying in Chennai. He then learned later that, he could obtain such drugs on the dark web marketplaces and decided to give it a try.

He then made a payment of Rs 2.36 lakh, through RTGS to someone who converted the amount into bitcoin. After the payment, the drug was delivered by post with a greeting from the Netherlands and was later supplied to his accomplice, Kamal Kalara.

Speaking after the arrest, Rajesh Deo of DCP Crime Branch, stated that: “The interrogation revealed that on the ‘Deep Net’ there are sites where the drugs are available, further the payments are being received in ‘Bitcoins’. For payments of Indian rupees the equivalent amount of ‘Bitcoin’ is provided to the Deep Net marketplaces through which payments can be made to procure the drugs,” Rajesh Deo added.

Reports from the police suggest that, there could be a possible remand of Goyal and that the police might also visit Chennai, where they suspect that a major drug ring was responsible for the supply of these party drugs.

In addition, the police will also question some youths who used to pay Goyal a visit, disguising themselves as medical representatives. The police believe they could have supplied him with the drugs.

The post One of Two Dark Web Drug Dealers Arrested Is a Freelance Journalist appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/18/one-two-dark-web-drug-dealers-arrested-freelance-journalist/feed/ 0
Twelve Kazakhstan Traffickers Raided by Special Forces https://www.deepdotweb.com/2017/11/18/twelve-kazakhstan-traffickers-raided-special-forces/ https://www.deepdotweb.com/2017/11/18/twelve-kazakhstan-traffickers-raided-special-forces/#respond Sat, 18 Nov 2017 12:39:19 +0000 https://www.deepdotweb.com/?p=23562 In the Kazakhstan cities of Almaty and Astana, the country’s National Security Committee (NSC) carried out a large-scale operation against organized crime syndicates that distributed drugs through the darknet. Not counting previously detained individuals with connections to the drug trafficking organizations, the investigation led to the arrest of 12 drug traffickers. According to the NSC, ...

The post Twelve Kazakhstan Traffickers Raided by Special Forces appeared first on Deep Dot Web.

]]>
In the Kazakhstan cities of Almaty and Astana, the country’s National Security Committee (NSC) carried out a large-scale operation against organized crime syndicates that distributed drugs through the darknet. Not counting previously detained individuals with connections to the drug trafficking organizations, the investigation led to the arrest of 12 drug traffickers. According to the NSC, the investigation is ongoing and now directed towards darknet market drug buyers.

The action was the product of a collaboration between cybersecurity units in law enforcement and National Security Committee’s special forces. Authorities claimed they watched online drug markets for an undisclosed amount of time before taking action. During this preliminary investigation period, the country’s law enforcement and national security forces discovered “separate online stores.” The organized crime groups controlled or operated stores on a darknet market, the NSC said in their official report.

Member States in the Russian Commonwealth often use darknet “markets” that more closely resemble forums. Each vendor has their own vendor store or market where they list their products. According to the NSC report, site administrators would notify other users where, in Almaty and Astana, an order of drugs had been hidden. This business model matches nearly every Russian darknet market. The drug trafficking organizations likely operated their own sites or shops through a site similar to Rutor or the former RAMP Marketplace.

Payments to the site administrators, the NSC said, often took the form of money transfers to QIWI-wallets. For those outside Russia and the surrounding area: QIWI wallets, and specifically Visa QIWI wallets, function as prepaid online payment services. QIWI itself is roughly similar to PayPal in the financial sector. However, unlike with the majority of the markets used in the US and the UK, Russian markets and vendors often accept payment for illegal substances with this PayPal-esque financial service.

While the NSC failed to mention the specific market that the organized crime groups had created stores on, the use of QIWI payments and hidden caches of drugs pointed towards one of the Russian forums.

The joint taskforce discovered a connection between members of the crime groups and previously detained criminals. On November 3, the NSC’s special forces reported the arrest of the suspect number 12. Given the gravity of the current situation and status as an ongoing investigation, the number of arrests could change at any given time. However, the next arrests will likely involve drug buyers instead of sellers. “The necessary operational and investigative measures are continuing, including the identification of persons who used the above-mentioned sites for the acquisition of narcotic substances,” the press release read.

The post Twelve Kazakhstan Traffickers Raided by Special Forces appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/18/twelve-kazakhstan-traffickers-raided-special-forces/feed/ 0
Netherlands Police Bust Darknet Trafficking Group https://www.deepdotweb.com/2017/11/18/netherlands-police-bust-darknet-trafficking-group/ https://www.deepdotweb.com/2017/11/18/netherlands-police-bust-darknet-trafficking-group/#respond Sat, 18 Nov 2017 04:39:17 +0000 https://www.deepdotweb.com/?p=23561 In 2015, law enforcement in the Netherlands arrested three suspects in connection with a cannabis growing operation in the province of Friesland. More than two years later, Friesland detectives completed an investigation that led to to the arrest of the same three suspects for operating a massive darknet ecstasy and marijuana trafficking operation. Over 150 ...

The post Netherlands Police Bust Darknet Trafficking Group appeared first on Deep Dot Web.

]]>
In 2015, law enforcement in the Netherlands arrested three suspects in connection with a cannabis growing operation in the province of Friesland. More than two years later, Friesland detectives completed an investigation that led to to the arrest of the same three suspects for operating a massive darknet ecstasy and marijuana trafficking operation. Over 150 police officers raided 10 houses and businesses in Sneek. During the raids, the Netherlands police seized bitcoin, euros, 13 cars, and seven buildings, among other various pieces of evidence.

The trio first aroused suspicion in March 2015 when police had discovered their growhouse in Sneek. During a followup financial investigation, the investigators discovered that the men had amassed more than $400,000 in the form of Bitcoin. Later on, after the investigation had seemingly hit a quiet spell, evidence arose that implicated one of the suspects in the trafficking of various “hard drugs.” Police raided his house, arrested him, and seized more than 65,000 ecstasy pills. An official statement announced that police knew the suspects had received payment for their ecstasy and marijuana in bitcoin.

Screenshot from 2017-11-07 18-53-17.png

This led to yet another investigation into the group and a suspected drug trafficking and money laundering organization. The arrests in late October and early November came from an investigation that began in January 2017.

geldibn.jpg

By October, undercover officers had unveiled much of this secretive drug trafficking organization that had distributed drugs both internationally through the darknet and locally, on occasion. A local transaction led to the ultimate downfall. Undercover officers and one of the drug traffickers arranged a large ecstasy deal on the darknet. The police wanted 15,000 pills. Although the deal was arranged on the darknet, the cops met and paid the vendor in an apartment in the Netherlands. There, they bought 15,000 pills, but instead of arresting the dealer, the police let the dealer go free.

Police spokesman Sylvia Sanders said that they frequently go after darknet vendors and arrest the vendor after completing an investigation into the vendor’s internet activity. “Usually, we immediately pick up the suspect, but in this case we have not consciously chosen that,” Sanders says. “We wanted to get the big boss.”

Screenshot from 2017-11-07 18-48-14.png

And only days later, Netherlands police caught “the big boss.” A total of 150 police officers raided homes and searched a commercial garage in Sneek. Officers arrested the first two suspects—a 31-year-old and a 33-year-old—by the mid-afternoon. The officers caught a 32-year-old suspect later that afternoon. According to a report from Netherlands police, the suspects had kept very few drugs at the locations searched by police. Officers discovered 50 grams of a “white powder.”

Authorities seized 13 vehicles that belonged to the three suspects arrested that day. They also seized 150,000 euros and seven buildings under the name of the 33-year-old’s brother. The suspects have been charged with drug trafficking and money laundering, both on a large scale. The investigation is ongoing and the police expect many more arrests as the case unfolds.

The post Netherlands Police Bust Darknet Trafficking Group appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/18/netherlands-police-bust-darknet-trafficking-group/feed/ 0
Teen Bought Fake Euros From the Darknet, Police Reveal https://www.deepdotweb.com/2017/11/17/teen-bought-fake-euros-darknet-police-reveal/ https://www.deepdotweb.com/2017/11/17/teen-bought-fake-euros-darknet-police-reveal/#comments Fri, 17 Nov 2017 20:18:07 +0000 https://www.deepdotweb.com/?p=23553 In early November, German law enforcement concluded an investigation into a multi-month spree of counterfeit euro use spread throughout several towns in Mecklenburg-Vorpommern’s Lake District. After collecting evidence and descriptions from shopkeepers and salespersons, the Criminal Investigation Department in one of the impacted towns identified a 19-year-old suspect in Strasburg. Police raided the teenager’s house ...

The post Teen Bought Fake Euros From the Darknet, Police Reveal appeared first on Deep Dot Web.

]]>
In early November, German law enforcement concluded an investigation into a multi-month spree of counterfeit euro use spread throughout several towns in Mecklenburg-Vorpommern’s Lake District. After collecting evidence and descriptions from shopkeepers and salespersons, the Criminal Investigation Department in one of the impacted towns identified a 19-year-old suspect in Strasburg. Police raided the teenager’s house and found “extensive evidence” that the suspect had purchased large numbers of fake euros from a darknet vendor and then spent the notes at unsuspecting shops in the region.

The widespread use of counterfeit currency is nothing new to German authorities. In late 2016, Germany suffered from a major influx of counterfeit euro notes. The majority of the notes—if authorities told the truth at press conferences and strategy meetings—had arrived in Germany through various darknet market vendors. Several so called “printshops” for producing the counterfeit notes surfaced between 2016 and 2017, but the much larger sources of notes came from international crime syndicates focused on counterfeit currency production. DeepDotWeb covered news on one syndicate that, at one point, controlled 90% of the counterfeit euro trade: the infamous “Napoli Group.” German fraudsters, even before the darknet, relied on Napoli Group notes. As counterfeit euro demand increased, Germany became one syndicate’s most profitable markets.

photo-sven-hoppe-dpa.jpeg

During a press event in early 2017, a spokesperson for the Landeskriminalamt (LKA) announced a projected decline in counterfeit use in Germany by the end of the year. This, according to the LKA, would happen thanks to the growing detection rate of fake notes by shop owners and bank employees. According to a Bloomberg report, the use of counterfeit currency during the first six months of had increased by 8 percent. Despite the increased number of counterfeit notes in circulation, there was some success in the LKA’s campaign against counterfeit currency. It increased the victim’s ability to spot the fakes, and thanks to increased public education and printouts on counterfeit cash, police ultimately found and arrested the 19-year-old fraudster.

The LKA began interviewing shopkeepers—especially when the shopkeeper noticed the note before depositing it at the bank—in order to construct a profile of the suspect. After a “meticulous” investigation, the LKA had discovered that one person had travelled to the majority of the stores affected.

The Neubrandenburg prosecutor issued an arrest warrant for a 19-year-old in Strasburg. German law enforcement then raided the teenager’s property and found evidence pertaining to the counterfeiting crime. In addition to counterfeit euro notes, the police reported finding evidence that connected the suspect to counterfeit use throughout the region. They also discovered that the counterfeit notes had come from a darknet vendor. In a statement, the prosecutor said that the investigation was “just beginning.” The evaluation of the evidence seized, combined with the discovery that the counterfeits had originated from a darknet marketplace, and led the police to believe that the case required further investigation.

The post Teen Bought Fake Euros From the Darknet, Police Reveal appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/17/teen-bought-fake-euros-darknet-police-reveal/feed/ 1
Gibon Ransomware Appears on a Russian Darkweb Forum for $500 https://www.deepdotweb.com/2017/11/17/gibon-ransomware-appears-russian-darkweb-forum-500/ https://www.deepdotweb.com/2017/11/17/gibon-ransomware-appears-russian-darkweb-forum-500/#comments Fri, 17 Nov 2017 12:18:04 +0000 https://www.deepdotweb.com/?p=23552 Matthew Mesa, a proofpoint researcher has discovered a Gibon ransomware being sold on a Darknet marketplace for $500. There are quite a number of forums on the Darknet where different goods and services are advertised and discussed. Matthew Mesa, on his research duty, came across a Russian forum where the Gibon ransomware was being advertised. ...

The post Gibon Ransomware Appears on a Russian Darkweb Forum for $500 appeared first on Deep Dot Web.

]]>
Matthew Mesa, a proofpoint researcher has discovered a Gibon ransomware being sold on a Darknet marketplace for $500. There are quite a number of forums on the Darknet where different goods and services are advertised and discussed. Matthew Mesa, on his research duty, came across a Russian forum where the Gibon ransomware was being advertised. The Russian Darknet forum is known for providing different forms of ransomware, just as a new form of Ceber Ransomware was offered there last year.

The Gibon ransomware has the ability to infect all data on a machine except files in window folders. Though it was recently discovered on the Darknet, investigation says that this dangerous ransomware has been on the Darknet since May 2017.

Once Gibon gets into a machine, it encrypts stored data and makes sure that the “.encrypt” extension to each filename is appended. The ransomware contains a base64 encoded string.

In the advertisement as discovered by Matthew Mesa, it reads: “After completion, a report is sent to how many files and on which disks are encrypted. The program does not increase privileges in the system, so it only works with files for which the user has the appropriate rights.”

According to another section of the advertisement, the ransomware also has the ability to use recursive encryption, leave README.txt files in messages to the users, encryption keys sent to an admin pane, and create decryption and encryption keys.

After the ransomware has infected a machine, it continuously notifies victims in the encryption process about the ongoing operation. After the encryption is completed, it sends a message to the server: “finish”, a timestamp, Windows version, and the number of files encrypted.”

The Gibon contains a text file which gives the victim some kind of option, by asking them to contact the Gibon developer email. It is clear that the victims will be persuaded to pay a certain amount before their data are recovered. Whether the hackers will really go by their promise to release the data held to ransom or not, nobody knows. Statistics says that 40% of consumers pay ransomware fees.

There have been reports that the hackers refuse to release hacked data even after the ransom has been paid. Experts advise victims to just ignore hackers instead of wasting effort and spending money to get their data restored which normally does not happen.

The vice president of corporate and product marketing at Druva, Dave Packer advised against the payment of ransomware to these hackers: “Normally we recommend not paying when hit with a ransomware attack as this only feeds the flames for cybercriminals to continue the practice. Your payment becomes an incentive for them to continue working on more advanced attacks. Additionally, paying doesn’t necessarily mean you’re going to get your data back.”

The manufacturer of the Gibon ransomware has said that it is impossible to decrypt a file once it has been encrypted. This is seen as false since there has been a release of the descriptor.

Ransomware sale Becomes Big Time Business on Darknet

Researchers at the Carbon Black recently released that ransomware in the various Darknet forums has witnessed a massive growth worth $6,237,248.90 since 2016. It was estimated that the total sale of this ransomware skyrocketed from $250,000 to over $6M in just a year.

Its prices on the Darkweb ranges from $1 to $3,000 depending on how customized it is. It was also released that some ransomware sellers are making over $100,000 a year on the Darknet.

This may account for the reasons for the recent cyber attacks which had no respect for countries and people.

Some ransomware which can sell for as much $400 is also being offered cheaply for just $1. The security strategist at Carbon Black, Rick McElroy said that “They are pulling in these salaries by selling one of the several components of the ransomware supply chain or by selling complete, do-it-yourself, ransomware kits.”

He added that: “The overall ransomware economy is expanding into goods and service, much like the regular markets we participate in during our daily lives.”

The reasons why vendors and hackers are selling other related ransomware are the same reasons for the sale of the Gibon ransomware.

As the sale of these dangerous malwares are booming on the Darknet and are not showing any sign of reduction, computer users should take the necessary steps to ensure that their files are safe.

The post Gibon Ransomware Appears on a Russian Darkweb Forum for $500 appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/17/gibon-ransomware-appears-russian-darkweb-forum-500/feed/ 1
Two Arrested in Delhi for Selling Drugs via the Dark web https://www.deepdotweb.com/2017/11/17/two-arrested-delhi-selling-drugs-via-dark-web/ https://www.deepdotweb.com/2017/11/17/two-arrested-delhi-selling-drugs-via-dark-web/#respond Fri, 17 Nov 2017 04:18:00 +0000 https://www.deepdotweb.com/?p=23551 Two men have been busted by the Delhi Police Crime Branch for allegedly running a drug cartel in Delhi and Noida through the aid of the dark web. According to reports, the two accused, including a Disco Jockey, Kamal Kalara who mostly performs at rave parties and nightclubs in Noida and Delhi, supplied the drugs ...

The post Two Arrested in Delhi for Selling Drugs via the Dark web appeared first on Deep Dot Web.

]]>
Two men have been busted by the Delhi Police Crime Branch for allegedly running a drug cartel in Delhi and Noida through the aid of the dark web.

According to reports, the two accused, including a Disco Jockey, Kamal Kalara who mostly performs at rave parties and nightclubs in Noida and Delhi, supplied the drugs that were ordered from the dark web to the youths. The whole drug operation only used bitcoins as the payment mode.

The Delhi Police Crime Branch stated that Kamal Kalara was arrested in Rohini after they received a tip-off. Upon his arrest, the police found 100 pills of ecstasy with him. Kamal then gave out the name of Mahesh Goyal, an accomplice and a resident of resident of Sector-11, Dwarka during questioning was then arrested later by the police. Just like Kamal, the police also recovered 20 grams of MDMA on Goyal, when he was arrested.

The two first met at a rave party where Kamal supplied Goyal with ecstasy.

“Accused Kamal Kalara is a DJ and usually goes to rave parties and used to play music there. He came in contact with co-accused Mahesh Goyal, another accused through a rave party and started procuring Ecstasy from him and further supplying in rave parties,” stated DCP Crime Branch Rajesh Deo.

These drugs are normally popular in the nightclub scene and at all-night dance parties and come with some serious consequences. The overdose of these drugs have been the cause of numerous deaths as of late around the globe as the use of illicit drugs continues to surge. Health effects of MDMA include nausea, muscle cramping, involuntary teeth clenching, blurred vision, chills, and sweating.

High intake of MDMA can affect the body’s ability to regulate temperature which can lead to a spike in body temperature that can occasionally result in liver, kidney, or heart failure or even death.

“The interrogation revealed that in the ‘Deep Net’ there are sites where the drugs are available, further the payments are being received in ‘Bitcoins’. On payment of Indian rupees the equivalent amount of ‘Bitcoin’ is provided to the darknet marketplaces through which payments can be made to procure the drugs,” Rajesh Deo said.

Mahesh during interrogation revealed that, while he was staying in Chennai, he went to a party of which he had his first taste of ecstasy. He later learned that he could lay hands on such drugs through dark web marketplaces or other platforms on the dark web.

Through RTGS, Mahesh then made payment of Rs 2.36 lakh to someone who then converted the amount into bitcoin. The drug was delivered via post as a greeting from the Netherland after the payment was done. It was later then supplied to Kamal Kalara.

Reports from the Delhi Police suggests that, the mastermind behind this contraband drug operation was still at large and that he has created a network scattered across the whole of India.

The Narcotics Control Bureau and Ministry of Electronics and Information Technology have also been called into play by the Delhi crime branch, to check such transactions.

There have been a record high deaths resulting from the ecstasy and MDMA this year and yet still, the urge to obtain as well as use it is still bewildering.

With the aid of dark web, it is now much easier to obtain these drugs even for teenagers and India is no exception.

Just about two months ago, four Indian teenagers who were almost done with their high school education, ordered LSD from the dark web. They were caught after Law enforcement authorities were investigating a suspect in another case.

During questioning, one of the teenagers admitted that he gained knowledge about the dark web and its use through a friend of his older brother.

The Police officer initially refuse to believe that ordering drugs from the dark web is popular in “some circles”.

“When we further probed, those four teenagers were identified. They are from well-to-do families,” an investigator said.

One investigator then revealed that law enforcement identified the suspect as a first-grade computer engineering student studying in Bengaluru who “used to purchase LSD online”. He was responsible for teaching the teenagers how to use Tor and how to browse the dark web.

The post Two Arrested in Delhi for Selling Drugs via the Dark web appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/17/two-arrested-delhi-selling-drugs-via-dark-web/feed/ 0
Minnesota Man Charged With Hiring Hackers to Bring Down Ex-Employer https://www.deepdotweb.com/2017/11/16/minnesota-man-charged-hiring-hackers-bring-ex-employer/ https://www.deepdotweb.com/2017/11/16/minnesota-man-charged-hiring-hackers-bring-ex-employer/#respond Thu, 16 Nov 2017 20:17:20 +0000 https://www.deepdotweb.com/?p=23542 Federal prosecutors in an ongoing Minnesota case involving cybercrime stated that a local business, and Monticello-based technology firm was a victim of cyber-attack which was instigated by a former worker. The former worker who was also a state resident employed hackers-for-hire to sabotage the website of Monticello. According to the FBI, this case is in ...

The post Minnesota Man Charged With Hiring Hackers to Bring Down Ex-Employer appeared first on Deep Dot Web.

]]>
Federal prosecutors in an ongoing Minnesota case involving cybercrime stated that a local business, and Monticello-based technology firm was a victim of cyber-attack which was instigated by a former worker.

The former worker who was also a state resident employed hackers-for-hire to sabotage the website of Monticello.

According to the FBI, this case is in relation to the growing form of cybercrime as professional hackers are contracted to ramp up attacks on individuals, businesses and other personal digital devices connected to the web.

Prosecutors of this case stated that 46-year-old John Kelsey Gammell paid hackers to bring down Washburn Computer Group, a Monticello business where he previously worked, by inflicting “distributed denial of service” (DDoS) attacks on them.

The DDoS attacks swamped a network with data, denied legitimate users access, and also knocking web services offline.

Gammell is also accused of making monthly payments between July 2015 and September 2016 of an amount of $19.99 to $199.99 to destroy web networks connected to the Minnesota Judicial Branch, Hennepin County, and several banks.

Point-of-sale system repair company Washburn, told prosecutors that Gammell’s attacks cost it about $15,000.

“As a society that is increasingly reliant on network-connected devices, these types of cyber-attacks pose a serious threat to individuals, businesses, and even our nation’s critical infrastructure,” Gregory Brooker, Acting U.S. Attorney in Minneapolis said, talking generally about the new form of crime.

Over $11 million was lost by victims of DDoS attacks last year, according to the FBI’s Internet Crime Complaint Center and speaking on this issue, said FBI Supervisory special agent Michael Krause, who leads the FBI’s cyber squad in Minneapolis, stated that:

“We have a growing trend where the sophistication of the dark web and the sophistication of certain professional hackers to provide resources is allowing individuals — and not just experienced individuals — to conduct hacks and conduct DDoS.”

According to a criminal complaint in 2015, Gammell anxiously wrote to the company talking about his success in achieving a “DDoS mitigation” program to bring down an unnamed network for at least two days.

“We will do much business,” Gammell allegedly wrote. “Thank you for your outstanding product.”

According to an FBI agent’s sworn affidavit, Gammell contacted seven sites offering DDoS-for-hire services and paid monthly fees to three of them to carry out web attacks from July 2015 to September 2016.

When Gammell appeared in a Minneapolis courtroom last week, he confirmed that he ignored a plea offer that would have solved all his charges and concluded his prison sentence at a mandatory 15 to 17 years.

Rachel Paulose, Gammell’s attorney, argued her client didn’t personally cause the damage to Washburn. She continued by asking a federal magistrate to throw out evidence the FBI obtained from an unnamed researcher stating that, data could have also been obtained by hacking.

“The government has failed to charge a single one of those ‘cyber hitmen’ services, named and evidently well known to the government,” Paulose stated.

“Instead the government’s neglect has allowed the professional cyber hitmen for hire to skip off merrily into the night.”

The Washburn attacks were “essentially a prank on a dormant site not doing business,” she added.

Assistant U.S. Attorney Timothy Rank then replied saying “Even if Mr. Gammell thinks it’s a prank, it’s a criminal prank.”

According to Minnesota IT Services, the administrators of the state’s computer systems stated that the state network field an average of over 3 million attempted cyber-attacks daily. The officials stated that the state hasn’t been hit with any major attack equal to the 2012 South Carolina breach that exposed personal data for 3.7 million residents, costing the state $20 million.

In an attack in June 2016, the Minnesota Judicial Branch’s website was unavailable for 10 days, prompting local officials because so many government services have at least some connection to the web.

“A lot of people think it’s just a nuisance,” stated Minnesota’s chief information security officer, Chris Buse.

“But it’s not. If you look at what government does basic critical services if those services don’t continue, people can literally die,” he added.

Although hackers are able to seize over hundreds of millions of unsecured devices worldwide to flood networks in a single DDoS attack, security professionals are trying to stay ahead of the threat.

“In our environment, it’s pretty clear now that every organization needs some sophisticated and expensive tools to mitigate these DDoS attacks,” Buse stated.

The post Minnesota Man Charged With Hiring Hackers to Bring Down Ex-Employer appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/16/minnesota-man-charged-hiring-hackers-bring-ex-employer/feed/ 0
Questions about ammunition purchases on Darknet rekindles in Germany as three men face jail sentence https://www.deepdotweb.com/2017/11/16/questions-ammunition-purchases-darknet-rekindles-germany-three-men-face-jail-sentence/ https://www.deepdotweb.com/2017/11/16/questions-ammunition-purchases-darknet-rekindles-germany-three-men-face-jail-sentence/#comments Thu, 16 Nov 2017 12:17:18 +0000 https://www.deepdotweb.com/?p=23541 The purchase of ammunition on the Darknet became a hot cake in Germany some years back. People wondered and asked questions to know how and why most of the Darknet related cases were about weapon trade. From the Munich shooting to the other known cases in Germany, Darknet was the center of the weapon acquisition. ...

The post Questions about ammunition purchases on Darknet rekindles in Germany as three men face jail sentence appeared first on Deep Dot Web.

]]>
The purchase of ammunition on the Darknet became a hot cake in Germany some years back. People wondered and asked questions to know how and why most of the Darknet related cases were about weapon trade. From the Munich shooting to the other known cases in Germany, Darknet was the center of the weapon acquisition.

This question went out of the light for some time now, but another dramatic arrest of three men who purchased weapons on the Darknet rekindled this old question.

The Inside Story Of The Three Arrested Men

A special unit of the German police went undercover on the Darknet to expose weapon dealers on the anonymous platform. According a report, a unit of the police cop pretended to be firearm dealers on the Darknet controlling deals and trade. The aim was to get people who would place an order for the weapons. Fortunately for the police, three individuals whose names were not revealed placed an order, not knowing that they were dealing with the police.

The police realized that the suspects were searching for a firearm on the Darknet. The police, therefore, contacted them and offered a sale to them. According to an information, the suspects agreed with the police to meet somewhere for the trade. These kinds of meetings usually happen in hotels and catering establishments. The police arrested the suspects when they arrived at the place scheduled for the meeting.

The little information about the arrested suspects is their ages which go by 28, 42 and 60 years from Arnhem, Berg en Dal and Hilversum respectively.

The conversation on the weapon dealings happened on the Valhalla Marketplace and they continued through email messages from January 3, 2017, to February 6, 2017. The conversation began with the 42-year-old suspect before the others came into the scene. He ordered S&W 2213, a silencer and 250 patterns for 2100 Euros.

He said he ordered the guns because he is a fan of James Bond, and he has a shooting corner with sandbag filler where he trains.

He was arrested in Duiven upon an appointment with the disguised firearm dealer.

The 60-year-old man from the Hilversummer agreed on a price for the firearm and a meeting point for their trade. They agreed to meet at a hotel in Vienen. This followed after he had placed his order to the police disguised as the firearm dealer. He got to the end of the road the moment he put away the Darknet mask for real face to face deal.

When he was asked about how he got to know about the firearms trade on the Darknet, he said that his curiosity on the weapons trade on Darknet was inspired by a book he read written by Saskia Noort.

The 28-year-old man from Berg en Dal was in the third criminal case. He was arrested at a hotel in Tiel on May 17, 2016.

He ordered a Glock 19 and agreed on 1,300 Euros price.

The Court Issues Related To The Case

During the trials of the trio, the Rotterdam court brought up other cases of suspects who ordered drugs from the Darknet.

The Public prosecutor gave a sound of warning to the rest of the people who think the anonymity of the Darknet is enough for them to engage in weapon trade on the Darknet.

“The buyers were anonymous, but the use of the darkweb is not a guarantee to stay anonymous,” said the prosecutor.

Their sentence pronouncement is expected to take place on the 16th of November and the court might impose a 12 months jail sentence to each without work. This is not the only case where the police have been able to arrest the men who control trade on the Darknet. There have been many of them.

The firearm trade on the Darknet that always involves Germans and Germany is very serious and appalled. A Stuttgart man recently suffered from the same fate, and the rest of the dealers are to learn lessons from it.

Crime has been rampant in most of the countries because there is a source where they easily get weapons and other illicit kinds of stuff for their operation. The police going undercover on the Darknet are in response to the recent shooting and robbery cases that happens not only in Germany but throughout the world.

The post Questions about ammunition purchases on Darknet rekindles in Germany as three men face jail sentence appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/11/16/questions-ammunition-purchases-darknet-rekindles-germany-three-men-face-jail-sentence/feed/ 2