OPSEC on the Darkweb: The good, the bad and the ugly

Presented at THOTCON 0x7 (2016), May 5, 2016, 1 p.m. (50 minutes).

Recorded Future analysts have analyzed how the dark web (TOR) is being used for the good, the bad, and the ugly. We focus on a few use cases: *Threat actors and their poor OPSEC across open/deep/dark web *Specific market places and poor obfuscation and configuration of services *Uniquely identifying data points for hidden services *How and where hidden sites/services are commonly flagged on the open Web *A discussion of what might be a good use of TOR (social dissent), bad (child exploitation), and ugly (focus on data around terror support networks) We leverage open source collections and analysis tools, custom network scanning tools, and private sources in our research.

Presenters:

  • Nick Espinoza
    NJE and Zach Flom are Threat Intelligence Analysts at Recorded Future. Flom and Espinoza have supported the DoD and IC as analysts.
  • Zach Flom
    NJE and Zach Flom are Threat Intelligence Analysts at Recorded Future. Flom and Espinoza have supported the DoD and IC as analysts.

Similar Presentations: