Cyber Extortion In Dark Web
DOI:
https://doi.org/10.63682/jns.v14i28S.6727Keywords:
Cyber Extortion, Dark WebAbstract
The Dark Web has surfaced as a critical mecca for cyber highway robbery, enabling cybercriminals to exploit encryption technologies similar as Tor, I2P, and Freenet to conduct lawless conditioning anonymously. This paper examines the growing trouble of cyber highway robbery, assaying crucial attack styles, perpetrators, and provocations. Cyber highway robbery takes multiple forms, including ransomware, Distributed Denial- of- Service( DDoS) attacks, data breaches, and blackmail, with cybercriminals using underground forums, translated dispatches, and cryptocurrency to shirk discovery. To classify these pitfalls, the study introduces a triplets frame comprising Technological Extortion( e.g., ransomware and DDoS- for- hire), Data Manipulation Extortion( e.g., data exposure and revision), and Cerebral highway robbery( e.g., sextortion and deepfake blackmail). The exploration explores the elaboration of highway robbery ways, from phishing swindles to automated Ransomware- as-a- Service( RaaS) and DDoS- for- Hire operations, with cryptocurrency playing a pivotal part in rescue payments and plutocrat laundering.Despite advancements in network business analysis, AI- driven anomaly discovery, and legal interventions, combating cyber highway robbery remains a challenge due to jurisdictional complications and anonymized felonious networks. This study highlights the need for amulti-faceted approach, including zero- trust security fabrics, transnational legal cooperation, and mindfulness juggernauts. By assaying real- world cases of REvil, DarkSide, and LockBit, this paper underscores the urgency of global intelligence- sharing and forensic advancements to alleviate cyber highway robbery pitfalls.
Downloads
Metrics
References
X. Jie, L. Haoliang, J. Ao A new model for simultaneous detection of phishing and Darknet websites 2021 7th International Conference on Computer and Communications (ICCC), IEEE (2021), pp. 2002-2006 View at publisher CrossRefView in ScopusGoogle Scholar
I.N.V.D. Naveen, K. Manamohana, R. Verma Detection of malicious URLs using machine learning techniques Int. J. Innovative Technol. Explor. Eng., 8 (4S2) (2019), pp. 389-393 View in ScopusGoogle Scholar
Z. Guo, Y. Guan Active probing-based schemes and data analytics for investigating malicious fast-flux web-cloaking based domains 2018 27th International Conference on Computer Communication and Networks (ICCCN), IEEE (2018), pp. 1-9 View PDFView articleGoogle Scholar
A. Dainotti, A. King, K.C. Claffy, F. Papale, A. Pescapé Analysis of a"/0" stealth scan from a botne Proceedings of the 2012 Internet Measurement Conference (2012), pp. 1-14 View at publisher CrossRefGoogle Scholar
M.W. Al-Nabki, E. Fidalgo, E. Alegre, L. Fernández- Robles To rank: identifying the most influential suspicious domains in the tor networkExpert Syst. Appl., 123 (2019), pp. 212-226 View PDFView articleView in ScopusGoogle Scholar
T. Ban, L. Zhu, J. Shimamura, S. Pang, D. Inoue, K. Nakao Detection of botnet activities through the lens of a large- scale Darknet Neural Information Processing: 24th International Conference, ICONIP 2017 (2017) Google Scholar
The Anonymity of the Dark Web: A Survey January 2022 IEEE Access 10(6):1-1 January 2022 10(6):1-1 DOI:10.1109/ACCESS.2022.3161547 License CC BY 4.0
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.