Deep Web

Trend Micro’s Senior Director for Threat Research, Martin Roesler discusses Deep Web concepts, its challenges to law enforcement, and why it will continue to be used as a platform for anonymity.
Some of the most interesting numbers gathered from Trend Micro's latest research into the Deep Web, including prices of illegal goods and criminal services, and the value of hacked accounts.
An in-depth look into the duality of the Deep Web—how its anonymity allows free communication and the trade of illegal goods and services. See how it impacts the real world today, and how it could evolve over the next few years.
In Operation Onymous, 17 people were arrested and 414 different .onion domains were seized by various law enforcement agencies around the world. Soon after, new marketplaces using I2P and new currencies sprung up. Read more on Deep Web shutdowns.
Why would something as ordinary as a new kind of top-level domain (TLD) name interest anybody today? Is the level of attention it may receive, especially from security industry observers, even warranted? In the case of .bit, we believe it is.
Silk Road 2.0 launched while Ross Ulbricht, the accused operator of the first Silk Road Marketplace, remains in trial in New York. Silk Road 2.0 offers more secure options.
Trend Micro's latest visit to the Brazilian cybercriminal underground reveals its latest trends and available services, from online banking malware to tutorial classes for new cybercriminals.
While considered new and relatively smaller than its foreign counterparts, the German underground is a fully developed, well-managed haven that gives cybercriminals just about everything they need to start their own cybercrime business
A look into the North American underground reveals a more "open" community that encourages cybercriminal activity with easily accessible sites and convenient marketplaces.
This research paper provides a closer look into China’s bustling cybercriminal underground—including new market offerings like leaked data search engines and carding devices.
This research paper offers a glimpse into Japan's unique cybercriminal underground—it's economy, the cybercriminals' activities, and a marketplace characterized by the taboo, the illegal, and the vindictive.
Today, the Russian underground has predictably matured with a growing number of illicit products and services and an improved infrastructure. See how this thriving underground market has evolved.
An interactive page that shows the different international black markets that trade stolen data, what types of data can be bought and sold, and at what price.
This research paper covers the cybercriminal underground market in Brazil, including the unique tools and training services created by Brazilians to attack targets that are based in the country.
Different cybercriminal underground markets offer a distinct list of tools and services. Here's a list of known products and services that are available in the Chinese, Russian, and Brazilian underground.
This Trend Micro research looks into the emergence of the “mobile underground” in China as a result of the market's shift to mobile platforms, including mobile underground products and services.

Connect with us on