The Dark Web – Ignore this Security Space at your Peril

Dark Web SND

The World Wide Web is an integral part of most peoples’ day to day lives, enabling business, social activity, entertainment, education, awareness and much more. However, there are bits of the Internet we know about and bits we don’t.

With the proliferation of IP enabled technologies breaking into mainstream security, the Internet and its workings are becoming more important. It is critical that any area that allows hidden Internet traffic is understood so that potential threats can be assessed and appropriate mitigation actions taken.

The top level of the Internet is often referred to as the Surface Web. This is anything that can be indexed by a typical search engine such as Google, Bing or Yahoo. Search Engines rely on pages that contain links in order to find and identify content on the web that people want.

IP reliant security devices such as CCTV, therefore, do not work as part of the Surface Web.  So what comes next?

If the surface web is anything a search engine can find, then the next level is the Deep Web – anything that a search engine cannot find.  There are a number of reasons why search engines can’t find data on the web, the main one being that content is ‘hidden’ behind a website’s search box and does not contain links to the Surface Web. This is common in many government websites and other data repositories such as libraries.  Search engines do not search inside a website.  The majority of content that makes up the Deep Web is in these sorts of sites and is generally not anything illicit or scary.

This is an area where we start to see IP security device output, accessible through a company’s own website but not available to Surface Web searches.  However, this is not the end.

Digging a little deeper – and darker – we find the Dark Web. This is a small portion of the Internet that has been intentionally hidden and is inaccessible through standard web browsers. There are many anonymous networks that can only be accessed via specialised browsers and it is in this area of the web that illicit activities take place. But what how does the Dark Web threaten you, and how would you know?

Security professionals often stumble across data left behind by a bad actor, whether after an attempted hack, a suspicious visit to a website, or the fraudulent purchase of an online product. Unfortunately, because those engaged in illicit activity are not operating on the surface web, mainstream search engines and data aggregators offer little to no additional information to flesh out the profile of a bad actor.

Trying to find out where these illicit actors have come from and what risk they pose to your business requires expertise. This expertise is not just in finding particular sites, but also in getting into them and maintaining ‘membership’ whilst remaining legal.  A further challenge is staying safe so the owners of the illicit site don’t discover who is looking at them and why!

Luckily, there are firms who specialise in identifying threats hiding in the Dark Web and can provide general and targeted threat analysis. This means that threats to businesses and individuals can be properly quantified and cost effective mitigation steps taken.

One such company is GeoRiskAnalysis, which has a cyber security division specialises in mapping the Dark Web to provide the information needed to mitigate the risks emanating from this area.

Vasco Amador from GeoRiskAnalysis discussed the risks from individual and companies operating in the Dark Web with SecurityNewsDesk.

“Key indicators suggest that we are not making enough progress with cyber security and, in fact are possibly going backwards,” he said. “Companies, governments, schools, and critical infrastructures,are experiencing increased data breaches, criminal activity, essential e-services disruption, and property destruction.”

Amador went on to explain more, saying, “The first risk is a breach. The number of breached records rose by 350 per cent in 2013, with approximately half of the US population’s personal information exposed in a 12-month period. The average time it takes an organisation to detect a breach is 32 days, an increase of 55 percent from last year.

“The second risk is crime and financial, informational,and industrial espionage. By one estimate, cybercrime and economic espionage costs an estimated 445 billion US Dollars globally (an increase from last year).

“The third risk is disruption of e-services. A DDoS campaign has been underway for the last year against the US top financial institutions. The DDoS attacks are reaching levels that are disrupting citizen’s ability  to conduct banking, and communications providers can no longer guarantee quality of service or business continuity. The most recent example is the shutting down of the Sony PlayStation and Xbox networks this week.

“The final risk is destruction. In August 2012, Saudi Aramco suffered a targeted attack that used malicious software to destroy data and damaged nearly 75 per cent of the company’s IT infrastructure. Corporate officials declared it a targeted attack intended to affect oil production. A few months later, in March 2013,multiple financial institutions in South Korea suffered damages from malware similar to that used in the incident against Saudi Aramco. Their e-services were disrupted and data was destroyed.”

Amandor concluded that “Cyber breaches, crime, disruption, and destruction have significant implications for global trade and global business continuity. Cyber security constitutes a risk area for all organisations whether they acknowledge it or not.”

You can find out more from GeoRiskAnalysis at www.georiskanalysis.com.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

maritime

Addressing the shortcomings of maritime cyber security

The maritime industry plays a vital role in the global economy, with shipping responsible for as much as 90% of trade worldwide…
Camera

Camera and microphone been hacked?

Microphone and camera hacking is when an attacker gains remote access to a device’s camera and microphone – usually with the…
Holiday Inn

Holiday Inn hit by ‘cyber attack’

The owner of the Holiday Inn chain of hotels has confirmed bookings on its website and apps have been facing disruption after…
ransomware attacks

Cybereason warns against ransomware attacks from Black Basta gang

Cybereason warns against ransomware attacks from Black Basta gang. Cybereason, the XDR company, has issued a global threat alert
organisations

UAE organisations showing concern over cyberattacks

84% of organisations in the UAE are bracing for the fallout from an email-borne attack in the year ahead amid a growing volume of threats.
Cybercrime

Shifts in threat landscape amid cybercrime rise

Neustar Security Services has released its 2021 year-in-review “Cyber Threats & Trends Report: Defending Against A New Cybercrime Economy,”
Vestas

Orange Cyberdefense comments on Vestas cyber attack

The wind turbine manufacturer Vestas has been hit by a cyber attack that impacted its internal IT systems and compromised data.
HUMAN

HUMAN expands enterprise protection from sophisticated bot

HUMAN Security, Inc. (formerly White Ops), a cyber-security company that protects enterprises from bot attacks to keep digital experiences
hacker

Colombia catches hacker wanted in the US for ‘Gozi’ virus

Colombian officials say they have arrested a Romanian hacker who is wanted in the U.S. for distributing a virus
black friday

Black Friday presents a window of opportunity for cyber criminals

Consumers can expect email-based attacks using seasonally themed lures for major shopping events such as Black Friday.
Scroll to Top