A Trip to the Dark Site — Leak Sites Analyzed (2024)

A Trip to the Dark Site — Leak Sites Analyzed (1)

Gone are the days when ransomware operators were happy with encrypting files on-site and more or less discretely charged their victims money for a decryption key. What we commonly find now is encryption with the additional threat of leaking stolen data, generally called Double-Extortion (or, as we like to call it: Cyber Extortion or Cy-X). This is a unique form of cybercrime in that we can observe and analyze some of the criminal action via 'victim shaming' leak sites.

Since January 2020, we have applied ourselves to identifying as many of these sites as possible to record and document the victims who feature on them. Adding our own research, analyzing, and enriching data scraped from the various Cy-X operators and market sites, we can provide direct insights into the victimology from this specific perspective.

We must be clear that what we are analyzing is a limited perspective on the crime. Nevertheless, the data gleaned from an analysis of the leak-threats proves to be extremely instructive.

We'll refer to the listing of a compromised organization on a Cy-X leak site as a 'leak threat'. The numbers you'll see in most of the charts below refer to counts of such individual threats on the onion sites of the Cy-X groups we've been able to identify and track over the last two years.

A boom in leak threats

Despite the vagaries of the environment we're observing, the number of unique leaks serves as reliable proxy for the scale of this crime, and its general trends over time. We observed an almost six-fold increase in leak-threats from the first quarter of 2020 to the third quarter of 2021.

A Trip to the Dark Site — Leak Sites Analyzed (2)
Source: Orange Cyberdefense Security Navigator 2022

Striking where the money is: Leak threats by country

Let's take a look at the countries the victims operate in.

A Trip to the Dark Site — Leak Sites Analyzed (3)
Source: Orange Cyberdefense Security Navigator 2022

In the chart above we show the 2020 and 2021 leak threat counts per country, for the top 10 countries featured in our data set. We also show the estimated Gross Domestic Product (GDP) for the 12 wealthiest countries[1].

The top victim countries have remained relatively constant across our data set. As a general rule of thumb, the ranking of a country in our data set tracks the relative GDP of that country. The bigger the economy of a country, the more victims it is likely to have. Indeed, eight of the top ten Cy-X victim countries are among the top 10 economies in the world.

The conclusion we draw from this, is that the relative number of victims in a country is simply a function of the number of online businesses in that country. This does not prove definitively that Cy-X actors do not deliberately attack targets in specific countries or regions from time to time. It's also not to say that a business in a high-GDP country is more likely to be attacked than a victim in a low-GDP country (since, with more businesses exposed within that country, the probabilities even out).

In our view, the take-away from this data is simply that businesses in almost every country are being compromised and extorted. Logically, the more businesses a country has, the more victims we will see.

Exceptions to the rule

Having said that, we've taken the liberty of including India, Japan, China and Russia in the chart above, as counterexamples of large-GDP countries that rank low on our Cy-X victims list.

India, with a projected 2021 GDP of $ 2.72 trillion, and China with $ 13.4 trillion, appear underrepresented, which might be due to several reasons. India, for example, has a huge population and correspondingly large GDP, but the GDP per capita is lower, and the economy generally appears less modernized and digital, meaning fewer online businesses to target. It could be that criminals doubt that Indian businesses could or would pay their dollar-based ransoms. The language might also play a role – businesses that don't communicate in English are more difficult to locate, understand, navigate, and negotiate with, and their users are harder to exploit using commoditized social engineering tools.

Japan, as another obvious exception to our rule, has a highly modernized economy, but will present criminals with the same language and culture barriers as China and India, thus possibly accounting for the low prevalence in our victim data.

The conclusion here is that Cy-X is moving from English to non-English economies, but slowly for the time being. This is probably the logical result of the growing demand for victims fueled by new actors, but it might also be the consequence of increased political signaling from the USA, which may be making actors more cautious about who they and their affiliates exploit.

Regardless of the reasons, the conclusion here once again needs to be that victims are found in almost every country, and countries who have hitherto appeared relatively unaffected cannot hope that this will remain the case.

One size fits all: No evidence of 'big game hunting'

In the chart below we show the number of victims by business size in our data set mapped to the top 5 actors. We define organization sizes as small (1000 or less employees), medium (1000-10,000) and large (10,000+).

A Trip to the Dark Site — Leak Sites Analyzed (4)
Source: Orange Cyberdefense Security Navigator 2022

As shown, businesses with less than 1,000 employees are compromised and threatened most often, with almost 75% of all leaks originating from them. We've seen this pattern consistently in our leak-threats data over the last two years, by industry, country, and actor.

The most obvious explanation for this pattern is again that criminals are attacking indiscriminately, but that there are more small businesses in the world. Small businesses are also likely to have fewer skills and technical resources with which to defend themselves or recover from attacks.

This suggests again that any and every business can expect to be targeted, and that the primary deciding factor of becoming a leak site victim is the ability of the business to withstand attack and recover from compromise.

It's worth also noting that, since the crime we're investigating here is extortion, and not theft, it is the value of the impacted digital asset to the victim that concerns us, not the value of the data to the criminal.

Any business that has digital assets of value can therefore be a victim. Neither small size nor the perceived 'irrelevance' of data will offer significant protection or 'fly under the radar'.

This is just an excerpt of the analysis. More details like the threat actors identified or the industries targeted most (as well as a ton of other interesting research topics) can be found in the Security Navigator. It's available for download on the Orange Cyberdefense website, so have a look. It's worth it!

Note — This article was written and contributed by Carl Morris, lead security researcher, and Charl van der Walt, head of security research, of Orange Cyberdefense.


Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.

A Trip to the Dark Site — Leak Sites Analyzed (2024)

FAQs

What is a dark leak? ›

Dark web leak sites are used by threat actors on the dark web to carry out encrypted business operations and to monetize ransomware, malware and other online attacks.

What is a leak site? ›

A Dedicated Leak Site (DLS) is a website where the illicitly retrieved data of companies, that refuse to pay the ransom, are published.

What happens if my phone number is on the dark web? ›

If cybercriminals get a hold of your phone number via the dark web, they can use it to: Send scam messages, make scam calls, or even blackmail you. Try to take control of your mobile device. Steal even more information about you.

How to check if your SSN is on the dark web? ›

Here are some ways you can check to see if your SSN was leaked to the Dark Web:
  1. Check recent data breaches using a free Dark Web scanner. ...
  2. Sign up for SSN monitoring. ...
  3. Look out for data breach notifications. ...
  4. Monitor your mySocialSecurity account. ...
  5. Regularly review your credit reports.

How serious is a leak? ›

Water damage can be far-reaching and affect everything from your home's walls and floors to its electrical wiring and HVAC system. The longer a leak remains unaddressed, the more extensive the damage can become, resulting in pricier repair bills.

Should I worry about a leak? ›

A water leak in a house can be very serious. In some cases, it can cause mould growth and even structural damage to a home! With that in mind, acting quickly is important if you spot signs of a leak. By getting help quickly, you'll hopefully be able to prevent water damage and foundation issues.

Who pays for a leak? ›

The general rule on responsibility for fixing a leak is if it occurs on your side of the meter, on the public footpath or the external stop valve it would be the landlord or property owners responsibility.

What does a bad leak look like? ›

Stained, damaged, or sagging walls, ceilings and flooring

Warping, bubbling, sagging or staining on any of your home walls ceilings and flooring can be caused by hidden leaks from surrounding pipes near those areas. Granted, high amounts of humidity can also cause some of these problems.

What is a leak in slang? ›

informal + impolite. : to pass liquid from the body : to urinate.

What does dark web alert mean? ›

A dark web alert is a way for you to be notified if your personal information appears on a dark web marketplace. It acts as a heads up and allows you to take action to protect your identity.

What is a dark water? ›

Dark water, or black water, events occur occasionally along Florida's coasts and are characterized by patches of water that appear dark or black. The dark color occurs when high concentrations of phytoplankton (microscopic algae) or colored dissolved organic matter in the water absorb the blue light.

Top Articles
Moog Inc. hiring Associate Test Engineer in Gilbert, Arizona, United States | LinkedIn
Governor Hochul Announces the Creation of 500 New Jobs at Moog with a $25 Million Investment in Erie County
Spasa Parish
Rentals for rent in Maastricht
159R Bus Schedule Pdf
Sallisaw Bin Store
Black Adam Showtimes Near Maya Cinemas Delano
Espn Transfer Portal Basketball
Pollen Levels Richmond
11 Best Sites Like The Chive For Funny Pictures and Memes
Things to do in Wichita Falls on weekends 12-15 September
Craigslist Pets Huntsville Alabama
Paulette Goddard | American Actress, Modern Times, Charlie Chaplin
Red Dead Redemption 2 Legendary Fish Locations Guide (“A Fisher of Fish”)
What's the Difference Between Halal and Haram Meat & Food?
R/Skinwalker
Rugged Gentleman Barber Shop Martinsburg Wv
Jennifer Lenzini Leaving Ktiv
Justified - Streams, Episodenguide und News zur Serie
Epay. Medstarhealth.org
Olde Kegg Bar & Grill Portage Menu
Cubilabras
Half Inning In Which The Home Team Bats Crossword
Amazing Lash Bay Colony
Juego Friv Poki
Dirt Devil Ud70181 Parts Diagram
Truist Bank Open Saturday
Water Leaks in Your Car When It Rains? Common Causes & Fixes
What’s Closing at Disney World? A Complete Guide
New from Simply So Good - Cherry Apricot Slab Pie
Drys Pharmacy
Ohio State Football Wiki
Find Words Containing Specific Letters | WordFinder®
Abby's Caribbean Cafe
Joanna Gaines Reveals Who Bought the 'Fixer Upper' Lake House and Her Favorite Features of the Milestone Project
Tri-State Dog Racing Results
Navy Qrs Supervisor Answers
Trade Chart Dave Richard
Lincoln Financial Field Section 110
Free Stuff Craigslist Roanoke Va
Wi Dept Of Regulation & Licensing
Pick N Pull Near Me [Locator Map + Guide + FAQ]
Crystal Westbrooks Nipple
Ice Hockey Dboard
Über 60 Prozent Rabatt auf E-Bikes: Aldi reduziert sämtliche Pedelecs stark im Preis - nur noch für kurze Zeit
Wie blocke ich einen Bot aus Boardman/USA - sellerforum.de
Infinity Pool Showtimes Near Maya Cinemas Bakersfield
Dermpathdiagnostics Com Pay Invoice
How To Use Price Chopper Points At Quiktrip
Maria Butina Bikini
Busted Newspaper Zapata Tx
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 6359

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.