An experienced hacker discovers what really happened on the dark web where hackers, murderers and drug dealers are on the rise.
Speaking on condition of anonymity, the source explained how hackers use ransomware to steal data or “see the world burn” in exchange for large payments, explaining that any system connected to the web is at risk of attack
“I saw that the hospitals were encrypted and people were faced with a choice: to decrypt the data or risk my life?” said the man, who wore a mask to hide his identity. said.
The dark web is a place where activity cannot be tracked. A recent report revealed that the most popular content is child pornography, followed by guns and drugs.
Although the hacker did not address these illegal activities, he was concerned about the “significant effects”. [التي ستحدثها برامج الفدية] potential effects on things like financial markets or power generation facilities.”
Philip Ingram, a retired colonel from UK military intelligence, said last year: “The dark web is increasingly being used by dangerous and organized criminals for a variety of purposes. They look for vulnerabilities as they prepare kids for things like drug trafficking across county lines. .” For exploiting child sexual abuse groups or recruiting terrorist and extremist groups.
Some platforms like i2p, FreeNet and Tor provide access to the dark web.
Tor – short for The Onion Router – is a large number of encrypted websites that allow users to surf the Internet every day anonymously.
It uses multiple layers of security and encryption to keep users anonymous on the Internet.
One study estimates that there are approximately 2.6 million Tor users per day.
Researchers from the Australian National University report to The Conversation, “The same study found that in a single data acquisition, approximately 80% of traffic was directed to services offering illegal pornography, image of child sexual harassment and/or material exploitation.” . .
The hacker was interviewed by Vice in 2021, but the video has recently resurfaced to remind us of the existence of a dark world of people whose sole purpose is to wreak havoc with the internet.
The man began his hacking career with a black hat, a type of law-abiding cybercriminal who carries out attacks for his own purposes.
Since then, it has turned a new leaf and become a white hat, using its skills for good, tracking online criminals and finding vulnerabilities in systems to fix rather than exploit.
“If I want access to a secure company, I’m not going to break down the door. I will target people who have access, who I know, and who put their personal devices in a building,” he said at the start of the interview. or do something next to delicate things and then I’ll work my way up.
Joseph Pope wrote the first ransomware attack targeting the healthcare industry in 1989. The attack, called the AIDS Trojan Horse, was carried out by Bob, who distributed 20,000 infected tablets to attendees at the WHO AIDS conference.
The discs were called “AIDS Information – Input Tablets”.
When the floppy disk is downloaded to a computer, a large image appears on the screen which adversely affects other software applications reading the program. You will incur compensation and potential damages to PC Cyborg Corporation and your mini computer will not function normally.
The program will count how many times the computer has booted, and when it reaches 90, it will hide the directories and encrypt or lock the filenames on your C drive.
To regain access, users need to send $189 from a post office box in Panama to PC Cyborg Corporation.
Ransomware has become a hacker who does not have to leave his home – everything can be done on the dark web.
The hacker told Vice: “Once upon a time, for a country to destroy a country the size of the United States, you would need millions of dollars worth of investment to do something. Now, all you need is a few thousand dollars, a laptop and some smart hackers to write some code and post something”.
Kevin Mitnick is considered “the world’s most famous hacker” for attacking 40 major companies in 1995, including IBM, Nokia, and Motorola.
He stole computer code, estimated by some to be worth around $330 million, and spent five years in prison.
After his release in 2000, Mitnick said he “changed” and now lives under white hat standards as an ethical security hacker.
The man who spoke to Vice said he does this type of work. “Once I thought of myself as a black hat, and I changed into a white hat. White hats tend to be law-abiding moral hackers who are trying to do something to improve the public good.”
But his past adventures have put him in the middle of the dark web’s evil shenanigans.
Source: Daily Mail
Source: Arabic RT