BitDepthFeatured

White hats on the darknet

5 Mins read

Above: The architecture of Searchlight Cyber’s monitoring system.

BitDepth#1421 for August 28, 2023

Calibra Solutions hosted a webinar on Thursday about the tools it brings to bear on improving cybersecurity, with a particular emphasis on threat intelligence.

Calibra is a 15-year-old regional solutions provider with an impressive client roster of TT businesses and state enterprises led by Managing Director George Whyte.

Based in Trinidad and Tobago Calibra offers its services in the English-speaking Caribbean as well as in the Dutch-speaking islands of Suriname, Aruba, Curacao and Sint Marteen.

The company offers a range of IT consulting and advisory services and delivers business analytics using Qlik analytics and financial application software for banks and corporations through its partner Mimics.

The company’s capacity to monitor and respond to threats on the darkweb is a focus of its business partner Searchlight Cyber.

According to Nick Savage, Head of Infrastructure, Security and Compliance at Searchlight, the company began out of early explorations of Bitcoin and surveys of the digital currency’s use on the darkweb.

The company accesses the anonymous sites on the darkweb using its software platforms, Cerberus, which it uses to investigate activities and DarkIQ, which is tasked with using that intelligence for monitoring and preventive analysis.

To do this, the company accesses the anonymous onion sites of the dark web to extract information about what is being posted or pasted there, extracting and analysing information about data dumps and compromised hardware that’s being sold to host malware.

Searchlight works closely with law enforcement when it finds actionable material, such as leaked information and credentials.

The architecture of the Tor network

“Cerberus is great for performing investigations on what has happened or investigations on actors that you’re interested in or investigations on [specific] things that you’re interested in,” Savage said.

“You can see what [potential bad actors] are currently doing, see what else they’ve done, and interact with all the intelligence that we’ve gathered about those actors that may help to deanonymise them if you want to go through the process of possibly arresting them.”

“We’ve found the service to also be really useful when it comes to performing investigations about what happened in the past. I’ve had the misfortune of being at an enterprise that had a ransomware attack that closed everything down. On Cerberus, we had an early warning sign about this happening a week before.”

“To take the information that we have available and present it in a more proactive manner, we’ve developed DarkIQ which delivers alerts about the information that gives early warning signs of threat actors operating on the dark web that may be targeting you, that may be targeting the type of equipment that you’re using, vulnerabilities that exist in that equipment or that may be targeting particular exploits that you need to be aware of to bring in additional mitigation or protection.”

The company doesn’t only gather current dark web information, it archives data that normally exists only for a short time on onion sites and has records that go back for at least two decades.

That makes it possible to have investigations into information that no longer exists on the darkweb about drug marketplaces, cryptocurrency transactions and ransomware groups, enabling deeper analysis and correlation of activities and bad actors.

“This open source intelligence helps take you from the nebulous environment of the dark web to identifiers that you can use in the real world,” Savage explained.

“For law enforcement [you might] use a server that will give you the evidence that you need to go through to prosecution.”

“Dark IQ is a proactive monitoring platform that allows you to gather all the data you can with Cerberus, but do it in a proactive way. Instead of going off to look for all this information, it is presented to you as actions.”

“If we’ve identified credentials that are associated with your company, corporate IP addresses that are interacting with sources we deem to be high risk, identified mentions of compromises in your company’s endpoints, or people who are attempting to sell access. We will present that to you as an action that you will be able to respond to.”

According to Savage, the ransomware group Conti made US$170 million in the first year of operation. “These are big enterprises from a national security point of view.”

The Clop ransomware group, which has been exploiting a MOVEit vulnerability has been so successful, Savage says that at one point their webpage had a notice, “Please be patient, we will be with you shortly.”

Searchlight Cyber’s Nick Savage. Photo from his LinkedIn page

Nick Savage explains how the dark web works (partially paraphrased from his presentation during the webinar)

The darknet, which runs on the internet backbone, was originally developed as a means of enabling privacy for its users, creating anonymity through theoretical networking constructs.

One of those constructs is onion routing, which is what the Tor browser uses to establish anonymity.

Another construct is garlic routing, which is what Invisible Internet Project (I2P) uses to maintain anonymity, so we have a technical infrastructure that attempts to minimise or effectively eliminate the ability of an end server to know who it is communicating with.

There were also additional things added to Tor, which are called onion sites, websites that exist only within that anonymisation network.

For a v3 onion address for Tor, you would gain access to this with the end identifier of the onion.

You would then contact the directory service. The directory service will enable you to access an introductory point, the introductory point takes you to the viewpoint through which you’d make a connection to the onion server.

Neither the web server nor the end user know the identity or the IP address of the other.

It’s an anonymisation tool. Not only anonymising the user on the internet, but also anonymising the website, anonymising the endpoint, so everybody is kept within the within the darkweb ecosystem.

The onion router network has established the greatest number of nodes, hardware relays through which computing power is contributed.

In order to maintain the Tor network, the total network has around ten thousand of these relays.

The architecture of the I2P network

The tool builds a network of these servers across the internet using encryption so individual relays don’t know the next step for the subsequent hop after that.
On the I2P, servers are volunteered to be a part of the I2P network.

I2P attempts to combine cells of information from different people, put it into one blob of encrypted information before sending it across the network.

The Tor project claims that its users are whistleblowers, journalists, bloggers, IT professionals, law enforcement, business people, “normal” people.

Famous uses include drug marketplaces (Silk Road, Hansa) and child abuse material.

News agencies create darkweb sites to allow whistleblowers to contribute information to them anonymously. If you’re in a country that has a fair amount of restrictions on network access and where and to whom you are connecting, that is a useful thing to have.

Savage reports that most of the requests to particular sites were to sites that either contained illegal material or were associated with illegal activities.
There are more than 500,000 Tor onion websites on the darkweb.

How TT is faring by regional internet standards?

How TT is faring by regional internet standards?

Regionally, connecting a small population in a geographically homogeneous island should be relatively simple, but few islands fit that profile.
Read More
You should probably have an EPK

You should probably have an EPK

Social Media: Users shoehorn their content into the templates provided and everybody, from company presidents to interns, looks exactly the same.
Read More
Hands-on with the Samsung S25 Ultra

Hands-on with the Samsung S25 Ultra

Samsung has quietly ushered its largely unloved digital assistant Bixby off the premium space offered with a right swipe on the home screen
Read More
The last Carnival column

The last Carnival column

Managing Carnival using the same structure that was first devised 68 years ago under the CDC seems particularly misguided.
Read More
Will UPI change how we shop?

Will UPI change how we shop?

Underlying any significant change to digital payments will be the implementation of a national e-ID system.
Read More
Is e-money a solution in search of a problem?

Is e-money a solution in search of a problem?

According to the CBTT in its responses to questions, will cost its users "either very little or zero to use.”
Read More
The inevitable upgrade

The inevitable upgrade

Even forked open source software committed to maintaining usability on older systems was beginning to show insurmountable cracks.
Read More
A local AI to meet the cyberbullying challenge

A local AI to meet the cyberbullying challenge

The cyberbullying resource is available to teachers who request it. RSC offers both a mobile app and a desktop version.
Read More
Samsung launches Galaxy S25 smartphones

Samsung launches Galaxy S25 smartphones

The Now Bar taps personal information such as appointments to create an onscreen Daily Life Summary.
Read More
The backup challenge

The backup challenge

Deletion marks data as erased, but doesn't actually remove it
Read More
Moving the government to digital transformation

Moving the government to digital transformation

Is there a digital transformation group in every ministry dedicated to identifying opportunities for transformation and capable of moving actionable projects to completion?
Read More
Concepts of a transformation plan

Concepts of a transformation plan

The MDT is trumpeting a national strategy that reads more like a manifesto than a real-world action plan.
Read More
The Caribbean broadband development dilemma

The Caribbean broadband development dilemma

A Gigabit Caribbean Society implements 5G mobile broadband networks and fiber to the home download connections of at least 100 Mbps.
Read More
Gifts for the tech obsessed

Gifts for the tech obsessed

If you travel regularly, replacing multiple chargers with one unit that can do double or triple duty makes sense, even more so if it has a foldable wall plug.
Read More
What keeps regional cybersecurity experts awake at night

What keeps regional cybersecurity experts awake at night

Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
Read More
Where hackers begin

Where hackers begin

Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Read More
Blue skies for microblogging?

Blue skies for microblogging?

Bluesky hit its current high of 23 million users faster than expected, but it’s way behind X.
Read More
The apps that thrive in Apple’s ecosystem

The apps that thrive in Apple’s ecosystem

By Apple's own yardstick an app that shares usable data across three devices is acceptable one that synchronises with four is a winner.
Read More
America’s open mic moment

America’s open mic moment

What made online pundits so effective in the US election?
Read More
The press and the president-elect

The press and the president-elect

Beyond the president-elect's often-expressed intent to retaliate against journalists he believes are unfairly attacking him is the agenda of Project 2025.
Read More
How TT is faring by regional internet standards? How TT is faring by regional...
You should probably have an EPK You should probably have an EPK
Hands-on with the Samsung S25 Ultra Hands-on with the Samsung S25 Ultra
The last Carnival column The last Carnival column
Will UPI change how we shop? Will UPI change how we shop?
Is e-money a solution in search of a problem? Is e-money a solution in search...
The inevitable upgrade The inevitable upgrade
A local AI to meet the cyberbullying challenge A local AI to meet the...
Samsung launches Galaxy S25 smartphones Samsung launches Galaxy S25 smartphones
The backup challenge The backup challenge
Moving the government to digital transformation Moving the government to digital transformation
Concepts of a transformation plan Concepts of a transformation plan
The Caribbean broadband development dilemma The Caribbean broadband development dilemma
Gifts for the tech obsessed Gifts for the tech obsessed
What keeps regional cybersecurity experts awake at night What keeps regional cybersecurity experts awake...
Where hackers begin Where hackers begin
Blue skies for microblogging? Blue skies for microblogging?
The apps that thrive in Apple’s ecosystem The apps that thrive in Apple’s...
America’s open mic moment America’s open mic moment
The press and the president-elect The press and the president-elect

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

How TT is faring by regional internet standards?

4 Mins read
Regionally, connecting a small population in a geographically homogeneous island should be relatively simple, but few islands fit that profile.
FeaturedTechnology Reporting

Where cybersecurity threats begin: Phishing

5 Mins read
Do not submit PII to anyone, anywhere, unless you have initiated the contact and are absolutely clear that you are speaking with/logged into/emailing/form-filling in an environment you are certain is secure.
FeaturedOpinion

Behavioral Analytics: The Key to Combatting Scalable Payment Fraud

6 Mins read
Suspicious behavior can also be detected through inconsistent interactions with the website’s user interface.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
1 year ago

[…] Trinidad and Tobago – Calibra Solutions hosted a webinar on Thursday about the tools it brings to bear on improving cybersecurity, with a particular emphasis on threat intelligence… more […]

×
BitDepthFeatured

The silence of the breaches

1
0
Share your perspective in the comments!x
()
x