{"id":6279,"date":"2025-05-19T22:24:33","date_gmt":"2025-05-19T14:24:33","guid":{"rendered":"https:\/\/cicserver.com\/what-can-the-dark-web-teach-businesses-about-cybersecurity\/"},"modified":"2025-05-19T22:24:33","modified_gmt":"2025-05-19T14:24:33","slug":"what-can-the-dark-web-teach-businesses-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/what-can-the-dark-web-teach-businesses-about-cybersecurity\/","title":{"rendered":"What can the dark web teach businesses about cybersecurity?"},"content":{"rendered":"<p><br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/YbizeHRMkF5QLe6eeYypqc.jpg\" \/><\/p>\n<div id=\"article-body\">\n<p>Dark web marketplaces are the center of activity for cybercriminals looking to trade hacking tools and services, stolen credentials and personal information. Hackers operating as \u2018vendors\u2019 on these sites profit from selling anything from malicious software and phishing kits to compromised passwords and credit card details. \u202f<\/p>\n<p>Unchecked trade as well as technological advancements, such as <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-ai-tools\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-ai-tools\">artificial intelligence<\/a> (AI), are driving wider use of ransomware and malware-as-a-service (MaaS), democratizing these cyber attack methods for even the most unsophisticated cybercriminal to use. Because of this, the need for organizations to strengthen <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\">cybersecurity<\/a> and protect digital identities has never been greater. Organizations must pay close attention to the tools and tactics cybercriminals trade on the dark web to address vulnerabilities putting them at risk of a cyber attack.\u202f\u202f<\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-base\"\/>\n<p>Understanding what is most valuable for bad actors is also important. Last year, half of UK businesses experienced a cyber attack or data breach. Of them, the most common attack type was phishing (84%), with viruses or other malware accounting for only 17% of attacks.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-nosnippet=\"\">\n<span class=\"bg-secondary-500 text-white text-lg font-bold uppercase py-1 px-2 leading-[1.625rem] sm:leading-[6px] sm:text-sm\"><br \/>\nYou may like<br \/>\n<\/span><\/p>\n<\/aside>\n<p>The primary purpose of phishing is to steal credentials or sensitive information, and if businesses gain a better understanding of what cybercriminals are after, they can learn how cyber defenses should be focused. With the threat of cyber attacks unavoidable, now is the time to refer to the hacker\u2019s playbook to beat them at their own game.\u202f<\/p>\n<div id=\"slice-container-person-AaoSkhiKVkXt32z7fqxK6D-ZfDOt0UbEBufUCECTSu0I9d7uwmkHvzt\" class=\"slice-container person-wrapper person-AaoSkhiKVkXt32z7fqxK6D-ZfDOt0UbEBufUCECTSu0I9d7uwmkHvzt slice-container-person\">\n<div class=\"person person--separator\">\n<div class=\"person__heading\">\n<div class=\"person__name-socials\"><span class=\"person__name\">Alex Laurie<\/span><\/p>\n<nav class=\"button-social-group person__social-buttons\" aria-labelledby=\"button-social-group- person__social-buttons\">\n<p>Social Links Navigation<\/p>\n<p><a class=\"button-social\" href=\"https:\/\/www.pingidentity.com\/\" target=\"_blank\" aria-label=\"WEBSITE\"><span class=\"button-social__icon button-social__icon-website\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"icon-website\" viewbox=\"0 0 1000 1000\"><path d=\"M1000 500A501 501 0 0 0 503 0h-6A501 501 0 0 0 0 500c0 275 223 499 498 500h4a501 501 0 0 0 498-500zM529 936V765h133c-31 90-79 154-133 171zM337 765h134v171c-54-17-101-81-134-171zM61 539h176a899 899 0 0 0 22 167H110a439 439 0 0 1-49-166zM471 64v191H331c31-101 82-173 140-191zm199 191H529V64c58 18 109 90 140 191zm270 226H763c-1-59-7-115-18-167h155a438 438 0 0 1 40 167zm-235 0H529V314h156a857 857 0 0 1 19 167zM471 314v167H296a859 859 0 0 1 19-167h156zM237 481H60a438 438 0 0 1 41-167h154a921 921 0 0 0-18 167zm59 58h175v167H320a837 837 0 0 1-24-166zm233 167V539h175a831 831 0 0 1-24 167H529zm234-166h176a436 436 0 0 1-49 166H741a893 893 0 0 0 22-166zm104-285H731c-20-68-47-126-81-169a443 443 0 0 1 217 169zM350 86c-33 43-61 101-81 169H133A443 443 0 0 1 350 86zM148 765h127c20 59 45 110 75 150a442 442 0 0 1-202-150zm502 150c30-39 56-91 75-150h127a442 442 0 0 1-202 150z\"\/><\/svg><\/span><\/a><\/nav>\n<\/div>\n<aside class=\"person__role\"\/><\/div>\n<div class=\"person__bio\">\n<p>SVP for Global Sales Engineering and go-to-market programs at Ping Identity.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2 id=\"the-impact-of-entrepreneurial-hackers-3\">The impact of entrepreneurial hackers\u202f <\/h2>\n<p>In recent years, we have seen the serious damage MaaS attacks can cause. For example, the Snowflake <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-data-recovery-software\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-data-recovery-software\">data<\/a> theft and extortion used infostealer malware as well as purchased credentials in the attack, leaving up to 165 businesses compromised.<\/p>\n<p>The data stolen from such attacks is a valuable commodity on dark web marketplaces, with more highly developed hackers making sensitive information available to anyone using dark web marketplaces. Last year\u2019s attack on NHS provider, Synnovis, is another example of this kind of work as the <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-ransomware-protection\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-ransomware-protection\">ransomware<\/a> gang that carried out the attack (Qilin) published 400GB of private healthcare data online.\u202f<\/p>\n<p>These instances reveal how hackers are becoming more sophisticated in the attacks they carry out but also entrepreneurial in the tools they make available on the dark web. Evolving technologies like <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/pro\/best-ai-chatbot-for-business\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/pro\/best-ai-chatbot-for-business\">AI<\/a> are also accelerating the democratization of cyber attacks, giving novice and less experienced cybercriminals the opportunities they need to carry out a serious breach.<\/p>\n<p>The ease in which threat actors can gain access to readily available MaaS, including adware, keyloggers, spyware, worms and Trojan horses highlights the need for businesses to reevaluate cyber defenses to combat the ever-growing volume and complexity of attacks.\u202f\u202f<\/p>\n<h2 id=\"how-can-businesses-get-ahead-3\">How can businesses get ahead?\u202f <\/h2>\n<p>As attacks and the technology behind them evolve, so too must cyber defenses.\u202f Businesses must act now to get one step ahead of defending <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/the-best-customer-database-software-of-year\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/the-best-customer-database-software-of-year\">customer<\/a> and <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/pro\/best-employee-management-software-of-year\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/pro\/best-employee-management-software-of-year\">employee<\/a> digital identities, sensitive data and personal and financial information. To do this successfully, they must stay informed of the strategies hackers are exploiting and understand exactly what data is most valuable for cybercriminals.<\/p>\n<p>AI has supercharged cyber attacks beyond organizations&#8217; abilities to keep up with them using existing tools and techniques. The World Economic Forum\u2019s Global Cybersecurity Outlook report for 2025 found a 223% increase in deepfake-related tools being traded on the dark web alone.\u202f<\/p>\n<p>Proactive defense measures, such as behavioral analytics and AI-driven threat detection, should be widely implemented to prevent AI-driven cyber attacks from succeeding. Organizations must start using the very technologies cybercriminals use to successfully prevent attacks.\u202f<\/p>\n<p>Importantly, with personally identifiable information (PII), financial information and passwords or login credentials topping the list of the most valuable data cybercriminals sell on the dark web, focusing cybersecurity efforts on protecting this information is critical.<\/p>\n<p>Password-related <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\">security<\/a> is one factor where its importance is often overlooked. Alternative authentication methods, such as multi-factor <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-authenticator-apps\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-authenticator-apps\">authentication<\/a> (MFA), token authentication and biometric identification can easily be implemented to defend against attacks carried out by sophisticated hackers and less skillful cybercriminals using MaaS alike. Decentralizing identity is also an under-utilized defense strategy which can make it more difficult for cybercriminals.\u202f<\/p>\n<h2 id=\"use-the-dark-web-to-your-advantage-3\">Use the dark web to your advantage <\/h2>\n<p><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-small-business-software\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-small-business-software\">Businesses<\/a> must rethink their approach to cyber defenses if they are to get ahead. By staying informed of hacking tools and techniques on dark web marketplaces and focusing resources into defenses protecting the most valuable aspects of data, organizations can better secure digital identities.<\/p>\n<p>Protecting significant vulnerabilities, such as passwords, which are knowingly exploited, is of ever-growing importance as hackers continue to go to great lengths to steal what is most valuable on dark web marketplaces \u2013 data.<\/p>\n<p><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/anonymous-browsing\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/anonymous-browsing\"><em>We&#8217;ve featured the best privacy tool and anonymous browser.<\/em><\/a><\/p>\n<p><em>This article was produced as part of TechRadarPro&#8217;s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\" target=\"_blank\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\"><em>https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro<\/em><\/a><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Dark web marketplaces are the center of activity for cybercriminals looking to trade hacking tools and services, stolen credentials and personal information. Hackers operating as \u2018vendors\u2019 on these sites profit from selling anything from malicious software and phishing kits to compromised passwords and credit card details. \u202f Unchecked trade as well as technological advancements, such [&hellip;]<\/p>","protected":false},"author":3,"featured_media":6280,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6279","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=6279"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/6280"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=6279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=6279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=6279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}