Is Monitoring the Dark Web the ideal Solution to Slow Down Cybercrime?

Posted by Thomas Shaw on June 8th, 2021

Cybercrime begins and ends with stolen facts.

As outlined by ITProPortal, the cybercrime economy could possibly be bigger than Apple, Google and Facebook combined. The sector has matured into an organized industry that's most likely far more lucrative than the drug trade.

Criminals use revolutionary and state-of-the-art tools to steal facts from significant and modest organizations then either use it themselves or, most common, sell it to other criminals through the Dark Web. Get a lot more details about

Small and mid-sized businesses have grow to be the target of cybercrime and information breaches because they don't possess the interest, time or money to setup defenses to defend against an attack. Quite a few have a large number of accounts that hold Personal Identifying Information, PII, or intelligent property that may perhaps involve patents, analysis and unpublished electronic assets. Other compact businesses work straight with bigger organizations and may serve as a portal of entry substantially like the HVAC company was inside the Target data breach.

A number of the brightest minds have created inventive methods to avoid worthwhile and private facts from being stolen. These information security programs are, for essentially the most part, defensive in nature. They generally put up a wall of protection to help keep malware out along with the facts inside safe and safe.

Sophisticated hackers learn and make use of the organization's weakest hyperlinks to set up an attack

Regrettably, even the ideal defensive programs have holes in their protection. Listed below are the challenges every organization faces in accordance with a Verizon Data Breach Investigation Report in 2013:

76 % of network intrusions explore weak or stolen credentials

73 % of online banking customers reuse their passwords for non-financial websites

80 percent of breaches that involved hackers used stolen credentials

Symantec in 2014 estimated that 45 percent of all attacks is detected by traditional anti-virus which means that 55 percent of attacks go undetected. The outcome is anti-virus software and defensive protection programs can not maintain up. The bad guys could already be inside the organization's walls.

Little and mid-sized businesses can endure drastically from a information breach. Sixty percent go out of business within a year of a information breach as outlined by the National Cyber Security Alliance 2013.

What can an organization do to safeguard itself from a data breach?

For a lot of years I have advocated the implementation of "Best Practices" to shield personal identifying information and facts within the business. You can find simple practices each business need to implement to meet the specifications of federal, state and business guidelines and regulations. I am sad to say very few tiny and mid-sized businesses meet these requirements.

The second step is anything new that most businesses and their techs have not heard of or implemented into their protection programs. It involves monitoring the Dark Web.

The Dark Web holds the secret to slowing down cybercrime

Cybercriminals openly trade stolen information and facts on the Dark Web. It holds a wealth of information and facts that could negatively effect a businesses' current and prospective customers. This can be where criminals go to buy-sell-trade stolen data. It truly is quick for fraudsters to access stolen details they need to infiltrate business and conduct nefarious affairs. A single data breach could put an organization out of business.

Fortunately, you'll find organizations that consistently monitor the Dark Web for stolen information and facts 24-7, 365 days a year. Criminals openly share this data through chat rooms, blogs, websites, bulletin boards, Peer-to-Peer networks as well as other black industry sites. They identify data because it accesses criminal command-and-control servers from several geographies that national IP addresses cannot access. The amount of compromised information and facts gathered is unbelievable. By way of example:

Millions of compromised credentials and BIN card numbers are harvested every month

Around one million compromised IP addresses are harvested each day

This details can linger around the Dark Web for weeks, months or, at times, years before it is actually used. An organization that monitors for stolen data can see almost right away when their stolen information shows up. The subsequent step would be to take proactive action to clean up the stolen details and avert, what could turn out to be, a data breach or business identity theft. The information and facts, basically, becomes useless for the cybercriminal.

What would occur to cybercrime when most tiny and mid-sized businesses take this Dark Web monitoring seriously?

The effect around the criminal side on the Dark Web might be crippling when the majority of businesses implement this program and take advantage of the information. The purpose will be to render stolen info useless as promptly as you possibly can.

There won't be a great deal influence on cybercrime till the majority of compact and mid-sized businesses implement this type of offensive action. Cybercriminals are counting on incredibly handful of businesses take proactive action, but if by some miracle businesses wake up and take action we could see a major effect on cybercrime.

Cleaning up stolen credentials and IP addresses isn't difficult or tough after you understand that the information has been stolen. It really is the businesses that don't know their information and facts has been compromised that will take the biggest hit.

Like it? Share it!

Thomas Shaw

About the Author

Thomas Shaw
Joined: March 17th, 2018
Articles Posted: 11,324

More by this author