Cyber Extortion In Dark Web

Authors

  • Krishna Ashokkumar Sharma
  • Devesh Ravindra Ekhande
  • Harshit Anil Agrawal
  • Nikhil Rajendra Ghinmine
  • Arpan
  • Vivek Dave

DOI:

https://doi.org/10.63682/jns.v14i28S.6727

Keywords:

Cyber Extortion, Dark Web

Abstract

The Dark Web has surfaced as a critical mecca for cyber highway robbery, enabling cybercriminals to exploit encryption technologies similar as Tor, I2P, and Freenet to conduct lawless conditioning anonymously. This paper examines the growing trouble of cyber highway robbery, assaying crucial attack styles, perpetrators, and provocations. Cyber highway robbery takes multiple forms, including ransomware, Distributed Denial- of- Service( DDoS) attacks, data breaches, and blackmail, with cybercriminals using underground forums, translated dispatches, and cryptocurrency to shirk discovery. To classify these pitfalls, the study introduces a triplets frame comprising Technological Extortion( e.g., ransomware and DDoS- for- hire), Data Manipulation Extortion( e.g., data exposure and revision), and Cerebral highway robbery( e.g., sextortion and deepfake blackmail). The exploration explores the elaboration of highway robbery ways, from phishing swindles to automated Ransomware- as-a- Service( RaaS) and DDoS- for- Hire operations, with cryptocurrency playing a pivotal part in rescue payments and plutocrat laundering.Despite advancements in network business analysis, AI- driven anomaly discovery, and legal interventions, combating cyber highway robbery remains a challenge due to jurisdictional complications and anonymized felonious networks. This study highlights the need for amulti-faceted approach, including zero- trust security fabrics, transnational legal cooperation, and mindfulness juggernauts. By assaying real- world cases of REvil, DarkSide, and LockBit, this paper underscores the urgency of global intelligence- sharing and forensic advancements to alleviate cyber highway robbery pitfalls.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

X. Jie, L. Haoliang, J. Ao A new model for simultaneous detection of phishing and Darknet websites 2021 7th International Conference on Computer and Communications (ICCC), IEEE (2021), pp. 2002-2006 View at publisher CrossRefView in ScopusGoogle Scholar

I.N.V.D. Naveen, K. Manamohana, R. Verma Detection of malicious URLs using machine learning techniques Int. J. Innovative Technol. Explor. Eng., 8 (4S2) (2019), pp. 389-393 View in ScopusGoogle Scholar

Z. Guo, Y. Guan Active probing-based schemes and data analytics for investigating malicious fast-flux web-cloaking based domains 2018 27th International Conference on Computer Communication and Networks (ICCCN), IEEE (2018), pp. 1-9 View PDFView articleGoogle Scholar

A. Dainotti, A. King, K.C. Claffy, F. Papale, A. Pescapé Analysis of a"/0" stealth scan from a botne Proceedings of the 2012 Internet Measurement Conference (2012), pp. 1-14 View at publisher CrossRefGoogle Scholar

M.W. Al-Nabki, E. Fidalgo, E. Alegre, L. Fernández- Robles To rank: identifying the most influential suspicious domains in the tor networkExpert Syst. Appl., 123 (2019), pp. 212-226 View PDFView articleView in ScopusGoogle Scholar

T. Ban, L. Zhu, J. Shimamura, S. Pang, D. Inoue, K. Nakao Detection of botnet activities through the lens of a large- scale Darknet Neural Information Processing: 24th International Conference, ICONIP 2017 (2017) Google Scholar

The Anonymity of the Dark Web: A Survey January 2022 IEEE Access 10(6):1-1 January 2022 10(6):1-1 DOI:10.1109/ACCESS.2022.3161547 License CC BY 4.0

Downloads

Published

2025-05-29

How to Cite

1.
Ashokkumar Sharma K, Ravindra Ekhande D, Anil Agrawal H, Ghinmine NR, Arpan A, Dave V. Cyber Extortion In Dark Web. J Neonatal Surg [Internet]. 2025May29 [cited 2025Sep.21];14(28S):933-9. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/6727