Blog_Header.jpg

IntSights' Blog

Just like other industries have adopted the "as-a-Service" model, hackers are doing the same by selling easy access to tools, instructions, target lists, and hackers for hire, creating an online platform for cybercriminals. The concept of Hacking-as-a-Service has created a 'pay to play'...

As long as banks have money, there will always be bank robberies. However, the shouts of “Nobody move, nobody gets hurt,” has been replaced by the dull clicks of hacker keystrokes halfway across the globe. Hackers treat banks as their personal ATMs. They slip in and out of hidden cyber tunnels...

The pharmaceutical industry is one of the most targeted industries on the web, especially in black market platforms. This comes as no surprise, as purchasing illegal substances has always been something that people are interested in, and where there is demand, there is a market. The price for...

In our recent Dark Side of Asia research report, we uncovered some of the key goods, services, threat actors and motivations behind the growing underground Asian Internet community. One of the largest forces of this community is China, whose Internet population has grown immensely over the past...

The “Dark Web” is a growing buzzword in the world of cybersecurity and general technology. As it's grown in size and usage, various regions of the world have developed their own dark web communities and “codes of conduct” that can differ quite dramatically. One such region is Asia, whose...

The Dark Web. In the minds of most consumers, it’s the Boogeyman’s cyber-playground. A land of digital anarchy, where guns, drugs and other black market items are traded freely for crypto-currency. There are low-lit individuals concealed in hoodies hovering over a keyboard and striking keys to...

There’s no question that the threat landscape is constantly shifting for financial services companies. Throughout 2017 and the first half of 2018, we’ve seen a continued increase in attacks that directly target financial organizations, which comes as no surprise. However, increased access to...

When it comes to dark web black markets, anonymity is key. To help maintain their anonymity, dark web black market users leverage a variety of tools and technologies that mask their identity and location. It’s important to know how these tools are used so you can perform reconnaissance and...

On May 28, 2018, news reports started to surface about a data breach affecting two CIBC (Canadian Imperial Bank of Commerce) subsidiaries – BMO (Bank of Montreal) and Simplii Financial. The reports stated that a data breach had occurred and that 90,000 customer records had been leaked. Hackers...

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...

Anonymous web browsers (like Tor and I2P) have created what has become known as the Dark Web, enabling users to access and host websites completely anonymously. Naturally, this has given rise to a large community of underground illegal black markets and forums, where users can buy or sell almost...

The Dark Web has evolved over the past few years in many ways, but one of the biggest changes is the amount of information you can find via Dark Web forums and black markets. This increase in Dark Web data developed when hackers started focusing on new targets that weren’t in the landscape...

Whether you’ve visited the Dark Web or not, you’re likely aware that it’s comprised of various anonymous forums and black markets. Many of these Dark Web black markets are used for illegal activities, like buying and selling drugs, weapons, confidential documents and illegal services. While you...

So, it's time to go to the bank again. As you wait in line, you look around and think about the security measures around you: big vaults, security cameras, and even bulletproof glass at the counter. On the surface, everything looks secure, but if a trained thief stood there instead of you, they...