Are you afraid of the dark (net)?

1 May 2017 Editor's Choice, Information Security

IT and business media are increasingly full of the threats posed by cybercrime. Based on my own extensive experience the threat is not exaggerated.

Many of the threats are underpinned by something called the Dark Web, or Dark Net. This term refers to an overlay network that exists in parallel to the Internet, which can only be accessed using specific software like a TOR (an application browser used on the dark web) browser, configurations or authorisation.

Dark nets are quite transient, appearing and disappearing at unexpected times. They contain a vibrant and thriving e-commerce sector in which participants trade in illegal goods and services. These markets offer goods like drugs, counterfeit money, stolen IDs, credit card details, and website and corporate access credentials.

Where do these thriving markets in this hidden cyber world get the goods they are selling in such quantities?

The answer is from you, or your network, often through a compromised device. Upon investigation, it is also clear that in almost every incident, the user and the people responsible for managing the computers and networks did not even know they had been compromised. In other words, they do not know to take post-factor remedial action.

An additional factor is that even a person with limited experience can quite easily access the tools and services needed to hack into sensitive data and credentials. In uncertain times, people look for new ways to make a little bit extra. These amateur hackers are compounding the already severe problem posed by criminal syndicates.

More attacks, more loot

As a result, we are seeing an unprecedented rise in the type and number of attacks on inexperienced and ill-prepared ecosystem users in an attempt to steal information or access records.

Here’s a typical scenario: a user innocently clicks on a link to view an ‘interesting’ news article. He or she is taken to a compromised advertising site and a piece of malware is surreptitiously delivered onto the user’s device. When this happens, users need to know instantly that something untoward has happened so they can react before too much damage is done.

The latest malware attacks typically do one or more of the following:

• Check Internet connection and security settings.

• Download and run malicious files or ransomware.

• Report status to the author or attacker.

• Execute instructions on the devices they have penetrated.

• Automatically upload information taken from devices and the networks to which they are connected.

• Change administration privileges and validate security certificates.

The only way to counteract these and similar threats is to commence with an approach and understanding that all networks are dangerous. By adopting this approach, you promote a culture of ‘secure thinking’, cognisance of the dangers which in turn leads to responsible usage by all staff and network administrators. But it is vital to also ensure that you have real-time visibility of anomalous activities on both the Internet and your devices connected to it.

Ask yourself, or better still, find out who can support you on your journey in terms of becoming a more informed member of the human firewall chain and ensure they ask:

• Do you know whether a new piece of software (or malware) has been loaded onto your device? Or any device on your network? Is data being copied to an external source in the background?

• Are new files being run that are collecting data in a central place on or off a trusted part of your environment?

If you do not have immediate visibility into unauthorised changes, you are most probably already at risk or even worse, are already a member of a growing member of the coalition of the compromised.

For more information contact J2 Software, +27 (0)11 794 8301, [email protected], www.j2.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.