ProfilingADarkWebCriminal_UseCase
ProfilingADarkWebCriminal_UseCase
I N T R O D U CT I O N
The main reason that criminals use the dark W H I L E T H E D A R K W E B M AY M A S K
web is for the anonymity that it provides. Dark
web networks such as The Onion Router (Tor) A T H R E AT A CTO R’S I D E N T I T Y, I T
mask where traffic is coming from, so that a user A L S O P R O V I D E S A G R E AT D E A L O F
can not be identified based on their IP address.
I N T E L L I G E N C E O N T H E I R A CT I V I T I E S
The most sophisticated criminals work T H AT C A N B E U S E D TO I N F O R M
hard to maintain their operational security CY B E R S E C U R I T Y D E F E N S E S A N D
(OPSEC) on the dark web, taking care not
to share any information that might lead to U LT I M AT E LY P R E V E N T AT TA C KS.
their identification by law enforcement or
In the area of cybersecurity in particular, a
cybersecurity professionals. Of course, it is
cybercriminal’s real name is almost certainly
hard to avoid mistakes over time, and there are
of less value to a defender than a clear
countless examples of criminals being unmasked
understanding of details such as their favored
by slip ups such as the use of email addresses or
tactics, techniques, and procedures, their
usernames that match clear web accounts (see
associations with other cybercriminals, and their
our Suspect Identification1 use case for more
role in the cybercriminal ecosystem. While the
information on how criminals can be identified).
dark web may mask a threat actor’s identity, it
also provides a great deal of intelligence on their
However, even in the case where a criminal’s
activities that can be used to inform cybersecurity
OPSEC is so good that they can’t yet be
defenses and ultimately prevent attacks.
unmasked, there is still a great deal of value that
can be unlocked in gathering intelligence on
To demonstrate how this can be achieved,
their online persona.
we have taken the example of a real dark web
persona that goes by the alias “carnaval” to show
how intelligence and cybersecurity professionals
can build a profile using dark web intelligence.
1
https://slcyber.io/whitepapers-reports/suspect-identification-gathering-evidence-from-the-dark-web/
Searchlight Cyber 1
Profiling a Dark Web Criminal
A CY B E R C R I M I N A L O F I N T E R E S T
To demonstrate how dark web intelligence can
be used to build a profile of a cybercriminal, we
have taken the real life example of “carnaval”,
an actor we regularly observe interacting with
Initial Access Broker posts on dark web forums.
2
https://www.trendmicro.com/en_gb/research/24/d/operation-cronos-aftermath.html
2 Searchlight Cyber
Profiling a Dark Web Criminal
P R O F I L I N G A T H R E AT A CTO R
When assessing a cybercriminal, typically we are trying to understand the following things:
THEIR THEIR
C A PA B I L I T I E S CREDIBILITY
Establishing how skilled they are at Further assessment of the risk an actor
hacking, the resources they have at their poses can be undertaken based on their
disposal, and their previous experience reputation within the cybercriminal
in conducting attacks, can help a security community. For example, a cybercriminal
team determine the level of genuine with long-standing forum accounts, a lot of
threat an actor poses. Remember - like communication with other forum members,
all online forums - there is an element of and generally positive interactions could
bravado on hacking forums. Cybercriminals be assessed to be more of a threat than an
are not above making false claims and actor with no clear social “standing” in the
overstating their ability, so this assessment hacking world. Many forums have ranking
is important for identifying which threat systems that can help security professionals
actors need to be monitored as a priority. to quickly establish an actor’s credibility.
Understanding these key points will enable a security team to assess the level of threat an actor poses to
an organization and - from there - make decisions around the best next steps. Ultimately, that is the aim
of threat intelligence: to make the best possible decisions given the situation and information at hand.
Searchlight Cyber 3
Profiling a Dark Web Criminal
P R O F I L I N G C A R N AVA L
Our dark web intelligence platform has accumulated the following information on the cybercriminal known
by the alias “carnaval”. This initial intelligence gets us some way to building a profile on carnaval, in line
with the criteria outlined on Page 3. For example, even the actor’s presence on the XSS and Exploit forums
is suggestive of a certain amount of credibility within the cybercriminal community. Their Tox account
also helps us to create a link between different dark web sites, increasing the likelihood that it is the same
individual operating in different forums.
A CT I V E S I N C E IDENTIFIERS
October 2020 Tox Address
A CT I V E O N LANGUAGES
XSS, Exploit, Russian (primary),
AntiChat English (secondary)
A CT I V E S I N C E
The actor carnaval appears to have initially started their activity on the hacking
forum Exploit and then transitioned over to XSS, with no activity seen on Exploit since
September 2023 (Figure 1). Exploit and XSS are infamous hacking forums that have been
active for nearly two decades. Users of these forums tend to see themselves as more
“professional” than cybercriminals in other, non-Russian hacking forums.
40
35
30
COUNT OF RECORDS
25
20
15
10
0
2021 2022 2023 2024
4 Searchlight Cyber
Profiling a Dark Web Criminal
A CT I V E O N
As well as Exploit and XSS, we assess with low confidence that carnaval also has a presence
on another Russian hacking forum, AntiChat. There are only two posts attributed to carnaval
on this site, which makes it difficult to come to a reliable judgment, although there is a shared
identifier that suggests it is the same actor (see “Identifiers” below).
IDENTIFIERS
The same TOX address was used by the actor carnaval across their Exploit, XSS, and AntiChat
accounts, suggesting that it is the same person on all three sites. TOX is a messaging service
offering end-to-end encryption, which makes it a popular communication tool for cybercriminals.
LANGUAGES
More than two-thirds of carnaval’s posts are in Russian, which indicates that this is their first
language. This is consistent with the use of Exploit, XSS, and AntiChat, which are all forums
that primarily use the Russian language.
W E R E G U L A R LY O B S E R V E CY B E R C R I M I N A L S
I N V O LV E D W I T H R A N S O M WA R E G R O U P S
PURCHASING VULNERABILITIES FROM INITIAL
A C C E S S B R O K E R S, TO C O N D U CT T H E I R AT TA C KS.
Searchlight Cyber 5
Profiling a Dark Web Criminal
L E A R N I N G F R O M T H R E AT A CTO R C O N V E R S AT I O N S
Once cybersecurity professionals have established where the actor is active, far more intelligence can
then be produced by reviewing the conversations carnaval has had on the dark web and actions that
they have taken.
C U S TO M E R O F I N I T I A L A C C E S S B R O K E R S
Searching for “carnaval” and the auction terms discussed on Page 2 in our dark web platform returns
dozens of results for Initial Access Broker posts that carnaval has bid on. Figure 2 is a typical example,
where carnaval has paid the “blitz” price - i.e. bought the access outright - in an auction for remote
desktop protocol (RDP) access related to an organization in the US.
By monitoring these posts, a security team can gather intelligence on the types of organizations that
carnaval targets, the types of access the actor typically bids for, and exactly how much the actor is
willing to pay for the access. These trends become particularly clear across multiple posts.
6 Searchlight Cyber
Profiling a Dark Web Criminal
P R O A CT I V E LY A D V E RT I S I N G F O R I N I T I A L A C C E S S
A closer investigation of carnaval’s forum activity shows that the actor does not just reactively
bid for access but also actively advertises the fact that they are looking to buy access into certain
organizations. These posts shed even more light on carnaval - including their victimology, the types of
access they are interested in, and their reputation within the cybercriminal community.
Figure 3 is an example of such a post on the XSS hacking forum, with just some of the subsequent
responses and comments from other forum users to demonstrate the intelligence that can be extracted
by monitoring these posts.
Figure 3: A post from carnaval on the XSS forum in February 2023 titled “I will buy corporate access”, followed by a selection of the responses.
We have redacted the actor’s TOX address.
Searchlight Cyber 7
Profiling a Dark Web Criminal
8 Searchlight Cyber
Profiling a Dark Web Criminal
not interested
All of this detail from one hacking forum thread can enable an organization to build a profile that helps
them determine if carnaval is a cybercriminal that they should be monitoring - for example, if they
match the description of the Moroccan car manufacturing company posted at the end of the thread.
Just as importantly - in a world where resources are scarce and security teams have to make choices
on prioritizing threats - it can also help organizations to rule out carnaval as a significant risk to them.
For example, organizations in critical infrastructure or outside of western Europe and the US could de-
prioritize carnaval as a threat.
Searchlight Cyber 9
Profiling a Dark Web Criminal
S U M M A RY
The small sample of dark web intelligence we have provided here demonstrates how a cybersecurity
team can begin to build a profile of a cybercriminal they are concerned about. We now know of carnaval:
THEIR THEIR
C A PA B I L I T I E S CREDIBILITY
carnaval’s interaction with Initial Access carnaval clearly has an established
Broker posts suggest that they are reputation among the cybercriminal
experienced in exploiting RDP access. communities on the XSS and Exploit hacking
This, combined with open source forums (even if this is partly down to a bad
intelligence that they are associated track record of not paying for the access they
with the ransomware group LockBit, have acquired) suggesting that the actor is
indicates a potential point of ingress that an active threat.
organizations should be monitoring.
10 Searchlight Cyber
Profiling a Dark Web Criminal
U S I N G S E A R C H L I G H T CY B E R TO P R O F I L E
DARK WEB CRIMINALS
Our dark web investigation platform gives CASE MANAGEMENT
analysts access to the most comprehensive Searchlight Cyber’s case management system
dark web dataset on the market. It continuously allows analysts to collate intelligence and
captures data from the dark web and makes it useful information on a particular persona
easy to interrogate it in all the ways the dark or group in files within the platform. Once a
web isn’t, allowing cybersecurity professionals case has been created, it can be augmented
and law enforcement to gather intelligence and with automated alerts that trigger whenever
take actions against cybercriminal activity. new intelligence comes to light. This allows
cybersecurity professionals to continue with
DARK WEB SEARCH their day-to-day activity, safe in the knowledge
Search through more than 15 years of dark web that they will be aware if there is any update on
data for intelligence on forums, marketplaces, a person of interest.
hidden sites, communications, threat actors,
illegal goods and more. Searchlight Cyber uses S T E A LT H B R O W S E R
proprietary software to index more sites than Safely access dark web sites through a secure
any other solution on the market. Our data virtual browser hosted within the Searchlight
collection is continuously updated as new sites, Cyber platform. The Stealth Browser allows
posts, and profiles appear and this information analysts and investigators to view content on
is kept forever, even if the original item is the dark web networks Tor or I2P with one click,
deleted from the dark web. providing them with quick access to gather
intelligence at the source. At the same time,
DARK WEB PROFILES it protects the user’s machine from malware,
Searchlight Cyber automatically builds profiles allowing them to visit the dark web without
for dark web actors, allowing analysts to find putting themselves or their infrastructure at risk.
associated profiles on other dark web sites,
assess links to other groups, and monitor RANSOMWARE SEARCH AND INSIGHTS
dark web conversations. Data points such as The profiles of the administrators and members
identifying criteria are automatically parsed by of ransomware groups are automatically collated
the platform, providing invaluable context on in the Searchlight Cyber platform. Track and
actors and allowing cybersecurity professionals investigate the dark web activity of the most active
and law enforcement to pivot on key artifacts. ransomware groups through our continuously
updated dashboard. Ransomware Search and
Insights automatically collates intelligence on more
than 60 ransomware groups’ communications,
members, and victims, arming security teams with
the latest insights.
Searchlight Cyber 11
U K H E A D Q U A RT E R S U S H E A D Q U A RT E R S
Suite 63, Pure Offices, 200 Massachusetts
1 Port Way, Port Solent, Avenue Northwest,
V I S I T W W W.S LCY B E R.I O TO F I N D Portsmouth PO6 4TY Washington, DC 20001
O U T M O R E O R B O O K A D E M O N O W. United Kingdom United States