Keypoints
- Dark web markets and forums trade stolen credentials, exploit kits, malware (including infostealers), and stolen payment card data that enable unauthorized access and fraud.
- Recorded Future observed large increases in harvested credentials and cookie-based credentials, and a surge in infostealer usage, raising initial-access risk via Valid Accounts (T1078).
- Ransomware groups (e.g., LockBit, ALPHV) operate on dark web platforms and extortion websites that publish leaked victim files and metadata, which defenders can analyze for exposure.
- Exploit kits sold on the dark web lower the skill barrier for attackers by packaging vulnerability exploits for client or server software.
- Telegram has become a primary channel for underground coordination, sales, and leakage, used to trade credentials and post fraudulent artifacts that require monitoring and OCR analysis.
- Recorded Future ingests data from hundreds of dark web sources and delivers prioritized alerts, automated playbooks, and AI Insights to reduce detection and investigation times.
- Payment fraud intelligence maps compromised cards and transaction signals to enable proactive blocking or reissuance, reducing downstream fraud losses.
MITRE Techniques
- [T1078] Valid Accounts – Dark web marketplaces sell valid credentials enabling initial access; quote: ‘someone could purchase a valid credential for just $10, enabling them to log in to a corporate network or personal account…’
- [T1539] Steal Web Session Cookie – Attackers use stolen cookies to hijack sessions; quote: ‘a 166% increase in credentials associated with cookies.’
- [T1203] Exploitation for Client Execution – Exploit kits sold on the dark web are used to exploit software vulnerabilities for execution; quote: ‘pre-packaged tools and frameworks that cybercriminals use to exploit vulnerabilities in software and systems.’
- [T1486] Data Encrypted for Impact – Ransomware groups operate and publish extortion sites to pressure victims and threaten data leaks; quote: ‘ransomware extortion websites … threaten to leak victim files.’
- [T1566] Phishing – Stolen data and credentials are used to craft personalized spearphishing campaigns targeting employees or customers; quote: ‘create personalized spearphishing campaigns.’
- [T1041] Exfiltration – Leaked victim file metadata and posted stolen files on extortion sites represent data exfiltration and public disclosure; quote: ‘Information found in ransomware victim metadata can help identify companies …’
Indicators of Compromise
- [Ransomware groups] named actors observed on dark web platforms – LockBit, ALPHV
- [Dark web markets] marketplaces selling credentials and cards – Russian Market, 2Easy, and many others
- [Malware/families] examples of theft tools flagged in intelligence – RedLine Stealer, generic ‘infostealers’ (and multiple other stealer families)
- [Ransomware extortion sites] aggregated leak sites used for extortion and metadata collection – over 100 extortion websites (example: LockBit leak site), and numerous additional sites
- [Messaging channels] Telegram-based channels used to trade or expose artifacts – exposed credentials on a Telegram channel (client case), OCR-detected fraudulent check image (client case)
- [Victim metadata] leaked file metadata used to trace exposures – example metadata harvested from extortion site posts, and other leaked file references
Recorded Future recommends a focused, technical monitoring and response workflow for dark web–sourced threats. Collect structured data from targeted dark web sources (markets, forums, extortion sites, Telegram channels) and prioritize ingestion of credential dumps, cookie artifacts, leaked file metadata, exploit kit listings, and malware indicators. Normalize these feeds into identity and asset mappings (e.g., correlate harvested credentials and cookies to accounts, map leaked file metadata to business units and third parties) so defenders can quickly determine exposure scope.
Automate triage and enrichment: run IOC enrichment (malware family tags, hashes, YARA strings where available), attribute entries to known threat actors, and cross-reference payment-card signals with transaction telemetry. Use playbooks to escalate high-confidence findings—such as valid-account sales or leaked PII—to immediate containment actions (password resets, MFA resets, card blocks) and forensic collection. Leverage OCR and content analysis on extortion site images and Telegram posts to extract artifacts (credentials, check images) and feed them back into detection and fraud workflows.
Operationalize alerts and AI-assisted context to reduce dwell time: assign risk-based priorities, surface transparent evidence for analyst review, and integrate automated recommendations (investigate account, block card, patch vulnerable software) into incident response. Combine identity intelligence, payment-fraud signals, and extortion-site metadata to drive proactive mitigations—credential invalidation, targeted phishing simulations, vulnerability patching, and third-party notifications—to reduce the likelihood of successful access or fraud from dark web activity.
Read more: https://www.recordedfuture.com/blog/improving-dark-web-investigations-with-threat-intelligence