Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Threat Intelligence Glossary

Darknet

The part of the internet that is accessible only through specialized software (Tor, I2P) and offers anonymity. Stolen data, malware, login credentials, and cybercrime-as-a-service offerings are traded on the dark web. Relevant for businesses: Monitoring whether their own data is circulating on the dark web.

The Darknet is not the mystical "dark internet" of pop culture—it is a technical reality that security teams need to be aware of. Ransomware groups operate their leak sites there, stolen credentials are sold on marketplaces, and cybercrime-as-a-service offerings are available to anyone.

Clearnet, Deep Web, Darknet – Differences

These three terms are often confused, but they describe fundamentally different parts of the internet:

Clearnet (Surface Web): Publicly accessible and indexed by Google – Wikipedia, news sites, online stores. Accounts for approximately 5% of the entire internet.

Deep Web: Not indexed by search engines, but used legitimately—banking portals, email accounts, Netflix. No Tor required; standard browsers suffice. Accounts for approximately 90% of the internet.

Darknet (Dark Web): Intentionally hidden, requires special software such as Tor (.onion domains) or I2P. Used for legitimate purposes (freedom of the press, whistleblowers) but also for illegal activities (cybercrime, drug trafficking, data trafficking). Accounts for approx. 5% of the internet.

Tor Network: Technical Basics

Tor (The Onion Router) routes connections through a network of over 7,000 volunteer relay nodes worldwide. Each connection is routed through three nodes, each of which knows only its upstream and downstream nodes. The multi-layered encryption—like the layers of an onion—ensures that no single node knows both the source and destination of a connection:

User → Entry Guard → Middle Relay → Exit Node → Destination

.onion domains are accessible exclusively within the Tor network. They consist of a 56-character cryptographic address followed by .onion. Even Facebook officially operates a Tor mirror at facebookwkhpilnemxj7ascrwwwg6zfznzf5jnqlkbqeybmklnwf5ad.onion.

What is traded on the dark web

Stolen login credentials

  • Combo lists: Millions of email/password combinations from data breaches
  • Corporate VPN access: €500 to €10,000 per company
  • Admin credentials for servers: €1,000 to €50,000
  • Session cookies (stolen browser sessions): €5 to €100

Credit card data

Carding shops sell stolen credit card data with complete additional information (Fullz) for €1 to €20 per card, depending on the credit limit and bank.

Malware and Exploit Kits

  • Ransomware-as-a-Service (RaaS): Established groups such as LockBit and BlackCat
  • Initial Access Brokers: Sell access to compromised companies
  • Zero-day exploits: €50,000 to over €2,000,000, depending on the target

Cybercrime-as-a-Service

  • DDoS attacks: starting at €50 per hour
  • Phishing kits: €100 to €1,000 (ready-made phishing sites)
  • Money Mule Networks: Money laundering as a service

Ransomware leak sites

Ransomware-as-a-Service groups operate their own leak sites where they publish stolen data to put pressure on victims: "Pay up or we’ll publish everything." These sites are continuously indexed by threat intelligence services.

Darknet Monitoring for Businesses

Why Darknet Monitoring?

Early monitoring makes it possible to detect compromised credentials before attackers exploit them, identify signs of ongoing attack preparation, and detect your own data in circulation before an attack occurs.

What is monitored?

  • Email addresses and passwords for your own domains
  • Company names on marketplaces and leak sites
  • IP ranges and domains in botnet sales
  • Mentions of the company in hacker forums

Tools and Services

Commercial Solutions:

ProviderFeatures
Recorded FutureEnterprise-grade, global threat intelligence
Digital Shadows (ReliaQuest)Comprehensive external risk management
Flare.ioSuitable for SMEs, good value for money
Cyble VisionBroad darknet coverage

HIBP Enterprise (HaveIBeenPwned): Domain-wide breach monitoring with alerts when emails from your own domain appear in a breach.

Free Options (Limited):

  • HIBP.com for individual email addresses
  • Breach Directory (CSV-based)
  • IntelligenceX for darknet search

Internal Research (OSINT)

Darknet monitoring is legal in Germany. Accessing and reading darknet content is not a criminal offense—downloading or using stolen data, however, is. The Tor Browser is required for conducting your own research. Without the necessary prior knowledge, however, it is easy to make mistakes—professional services are therefore the better choice for most companies.

Initial Access Brokers – A Specific Threat

What is an Initial Access Broker (IAB)?

Initial Access Brokers are specialized attackers who compromise and sell access to corporate networks rather than carrying out ransomware or other attacks themselves. Their customers include Ransomware-as-a-Service groups, APT actors, and other criminals.

How do IABs obtain access?

  • Phishing: Credentials are stolen
  • Exposed RDP: Brute-force attacks on publicly accessible RDP services
  • VPN vulnerabilities: CVEs affecting Pulse Secure, Citrix, Fortinet, and others
  • Stealer malware: Installed on endpoints, exfiltrates credentials

Prices for corporate access

Company sizePrice range
Small business (50 employees)€500 - €5,000
Mid-sized business (500 employees)€5,000 - €50,000
Enterprise (Fortune 500)€50,000 - €500,000+

Detection indicators

  • Unknown VPN logins from unusual countries
  • New devices in conditional access logs
  • Stealer malware on endpoints: signs of credential exfiltration

After purchase by a ransomware group, an average of 5–7 days (RansomHub, 2024) elapses between the purchase of access and the deployment of ransomware—first comes reconnaissance, then the actual attack.

Darknet Use in Germany

ActivityLegal
Downloading and using TorLegal
Accessing darknet sites (reading)Legal
Downloading/using stolen dataIllegal (§202a StGB)
Purchasing/using exploit kitsIllegal
Child pornography, drugs, weaponsSerious criminal offenses

For Businesses

  • Darknet monitoring by service providers: Legal
  • Checking for your own stolen data on leak sites: Legal
  • Paying ransom: Legal in Germany, but must be reported to BaFin
  • Ransomware payments to sanctioned groups: Illegal – OFAC sanctions also apply to EU companies