🔥 Burn Fat Fast. Discover How! 💪

​​​​​​Redistribution of power in the Darknet networks The | Tape📼

​​​​​​Redistribution of power in the Darknet networks

The number of mutual attacks between hackers in the Darknet networks is most likely based on attempts to redistribute IT services and sell databases, suggests Ashot Oganesiyan, administrator of the DLBI database leak analysis service. According to his theory, these attacks are behind the owners of other services who are trying to de-anonymize the identity of competitors.
Such scrapping of competitors has a great psychological impact on the entire community, the main phobia of which is identity disclosure, which threatens to send data to law enforcement agencies for the first time. Exposing the clients themselves will complicate the work of the service, but will not do much harm to the administration. From a possible worst-case scenario, customers will start moving to other sites where privacy is at a higher level. At the same time, the administration of all the remaining sites will complicate the registration procedure for new members, increase the protection of the digital infrastructure and refuse to store user data.
Hacking organizations will behave much more cautiously, the Softline information security expert is sure. Due to such attacks, some hackers have already ceased to engage in their activities, confirms the head of the department of investigation of cyber incidents "JSOC CERT".
At the current time, according to the organization "Privacy Affairs", the cost of goods and / or services in the shadow market varies from $ 15 for bank card details to $ 1,000 for selling a vulnerability in the Android system. Hacks of various sites on the Internet, according to Positive Technologies, can cost from $ 40 for hacking mail to $ 4.5 thousand for a targeted attack on a company. Respectable companies and banks, in turn, will have to monitor security even more closely and increase budgets for this area.