The terms Deep Web, Dark Web and darknet have begun piercing the bubble of popular culture. They’re used continuously in shows like CBS’ “CSI: Cyber” and “Mr. Robot” on the USA Network. While not quite as popular as terms like malware, give them some time and they’ll get there eventually.

The Deep Web is typically referenced as a place where criminals meet and sell various illegal wares first and foremost. It is, however, also a place from which cybercriminals issue attacks.

Onions Have Layers

One very popular platform used on the Deep Web is Tor, originally known as The Onion Router. As its name suggests, it is a layered platform built to facilitate privacy in online activity. Tor is one of the most popular anonymizing platforms on the Internet. Each peer or node that is part of Tor adds a layer of obfuscation to traffic and content, like an onion, protecting them from exposure to unintended eyes.

Once the traffic arrives at a destination, it has to be de-obfuscated to a legible form, thereby exiting the network via an exit node. Exit nodes are the connection from the Tor network to the surface Web, or the publicly accessible Internet. These nodes translate the anonymous, peer-to-peer traffic streamed between Tor nodes on the Deep Web, allowing it to reach websites on the surface Web.

Hiding Attacks in the Layers

My latest report, “What Surfaces From the Deep, Dark Web,” focuses on this aspect of the Deep Web. What exactly are criminals using Tor and its exit nodes for? Are some criminals hiding behind Tor to issue attacks against corporations? The answer to that is yes, they are.

This answer is arrived at through an understanding of the exit nodes themselves, where they are placed and what their proxying capabilities are. An exit node has a legitimate purpose: It masks the IP of the original senders, allowing them to conduct their Web surfing with some degree of anonymity. Unsurprisingly, this is what some criminals use Tor for — to disguise their attacks’ content and origins.

The chart below, based on IBM Managed Security Services (MSS) data, shows a steady increase in malicious attacks from Tor, suggesting that more and more adversaries are hiding behind the program to execute attacks. What’s also interesting are the sudden peaks of traffic. We have evidence that these peaks are tied to malicious botnets that reside within Tor.

Figure 1: Malicious attacks from Tor have been on the rise since the beginning of 2015. Source: IBM Security.

The report also takes a closer look at the most commonly used attacks. There are some interesting patterns emerging, from SQL injection and distributed denial-of-service (DDoS) botnets to malicious vulnerability scanning.

Interested in emerging security threats? Read the latest IBM X-Force Research

more from Advanced Threats

Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program

You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s network, unbeknownst to the security team. The post highlighted why threat hunting should be a baseline activity in any environment. Before you can embark on a threat hunting exercise, however,…

World’s Largest Darknet Market Shut Down, $25 Million in Bitcoin Seized

On April 5, German authorities announced the takedown of the Hydra marketplace, the world’s largest darknet market trading in illicit drugs, cyberattack tools, forged documents and stolen data. The criminal operation, with about 17 million customer accounts, raked in billions in bitcoin before getting shut down. On its website, the Federal Criminal Police Office (BKA) stated it had secured and…