Readit News logoReadit News
bilbopotter · 6 years ago
Hitman-for-hire darknet sites are all scams. This wired article explains how these offerings are all scams.

https://www.wired.co.uk/article/kill-list-dark-web-hitmen

zelly · 6 years ago
The best darknet hit-for-hire idea I've seen is the one that uses a prediction market. You publicly bet $500k that Joe is not going to die in 1 week. Whoever takes the other side of that bet has an interest in making Joe die.

(Assume the prediction market is completely decentralized and untraceable. Assume there is an accurate way to determine the outcomes of the events in a manner compatible with being untraceable and decentralized.)

three_seagrass · 6 years ago
Fun Fact: These types of bets are how life insurance started, with milk maids and cow pox.
jhardy54 · 6 years ago
Assuming the prediction market isn't untraceable, would this be legal?

If Joe dies and someone gets $500,000 richer I'm sure the police would be very interested to investigate the transaction, but would the bet itself actually violate any laws?

pvg · 6 years ago
It's one of the oldest ones around, I think predating 'dark web/net' as a term.

https://en.wikipedia.org/wiki/Assassination_market

xorcist · 6 years ago
There are likely easier ways to trigger the payment.

Hacked websites, bribed operators etc.

tptacek · 6 years ago
Luring your victim to the part of Yellowstone that lies in Idaho seems like a much more legally plausible way to accomplish this.
bezmenov · 6 years ago
It becomes really interesting once the other side of that bet can be crowdfunded.

Someone with half a million to squander already has the means to disperse of others. Whereas an enemy of the people may have 10,000 detractors, who while otherwise wouldn’t have the means, can pool together a seven figure bounty for $100 each.

dementik · 6 years ago
Actually, not _all_ are scams.

In Finland, last year, young man offered his hitman services on dark web and eventually murdered another. Trial started in the beginning of June 2020.

Of course, he was not a professional hitman and outcome very scam'ish.

https://yle.fi/uutiset/3-11386629

duxup · 6 years ago
It seems like an anonymous hitman system just doesn't work.

For the hitman, it's much safer to just take the down payment / etc and not do anything. That's just way more cost effective / lower risk to do that over and over again.

For the person hiring them... no reason to think the hitman won't do the logical thing and not do the hit / walk with the up front cash.... and probably limited no incentive to pay after the deed is done if in fact everyone is anonymous.

Historically speaking hitmen seem to be tied to organizations who the hitman and the employer more or less can trust / provide some level of protection / regular work / other work or at least the promise of it. And generally the the professional hitmen eventually tend to be disposed of by the next hitman after their usefulness to their employer fades...

A system where nobody trusts anyone would seem to only attract scammers and some random idiots.

Hard to imagine it working out any other way.

joan_kode · 6 years ago
Dark web marketplaces are not exactly "a system where nobody trusts anyone". They are pseudonymous, as opposed to completely anonymous, and sellers absolutely build reputation and some degree of trust. Otherwise nothing would work - the problems you point out would prevent any business at all. It's theoretically possible for a hitman to build reputation in such an environment. However, it would have to be comparatively slow and high-stakes, which I suspect is the main problem and tips the scale towards scamming.
the8472 · 6 years ago
Perhaps some multi-step smart contract that creates a prisoner's dilemma where both parties pre-commit some money. On completion of the contract if both sides submit a completion code, you get some of it back (to incentivize you to complete the transaction) and the larger part goes to the hitman (to incentivize him to do finish his job). If either side reneges the money gets burned or redistributed to random wallets.
antepodius · 6 years ago
What about using a prediction market?
pc86 · 6 years ago
Maybe I'm missing something just the linked article doesn't mention anything about hitmen for hire?
SV_BubbleTime · 6 years ago
If you are a real hitman it seems you have a steep marketing issue to operate on dark net. “First hit free” is a bad approach.
rezic · 6 years ago
That was a great read, thanks!
Taek · 6 years ago
One of the biggest takeaways from this for me is that PayPal has awful security when it comes to compromised accounts. The only reason compromised accounts would trade for prices that high is because hackers have a high success rate of stealing funds from them, and a low chance of getting caught.

Credit cards and bank credentials being worth comparatively much less means that hackers don't have easy ways to secure the funds - either there's a high risk that the transaction is reverted, or there's a high risk that the hacker gets caught and goes to jail. You can tell it's not just an effort issue because the value of the accounts barely scale as the amounts in the accounts increase.

awakeasleep · 6 years ago
It's hard to parse your take, I think the phrase 'security' must be overloaded.

Considering there are ~325 million active paypal accounts, wouldn't there be a huge supply if their security, overall, was lax?

And furthermore, isn't the security of a criminal getting money out of the system only equivalent to getting the money through banks?

notatoad · 6 years ago
>wouldn't there be a huge supply if their security, overall, was lax?

i don't think normal demand curve applies to stolen bank accounts. the value of a stolen account would be the average amount of money you can expect to get out of it, regardless of how many stolen accounts are available. An increase in supply wouldn't make that any different.

Taek · 6 years ago
"Paypal has awful security" -> it is easy and low risk to walk away with a bunch of cash if you get access to a Paypal account.

I'll try to re-word the GP, thanks for highlighting your confusion.

dclusin · 6 years ago
For the raw account details alone it probably has more to do with being able to use it as a pathway to transfer ill gotten gains into/out of US/EUR than it does w/ the contents of the account. For the transfers from stolen accounts it looks like its just discounted based on probability that the transfer won't be reversed in time maybe?
cainxinth · 6 years ago
I opened a new checking account just for Paypal that never has more than a $100 in it.
pc86 · 6 years ago
Ok
prodmerc · 6 years ago
Do they? I mean, logging in is one thing, but transferring? I believe the hacked account owner can just get their funds back, and PayPal is very trigger happy at freezing accounts (especially new or idle) that get a large (a few hundred or more) sum at once.

So if you were to gain access to a stranger's account, you'd have to transfer the money to an existing, old and actively used account. Which is likely to be your own or your friend's.

Seems like a huge risk, so the hackers just sell the account to some idiot willing to try it.

TheAdamAndChe · 6 years ago
It scares me that posts like this always write of Tor like it's not compromised.

I browsed Tor regularly between 2011 and 2013. Late 2012 and early 2013 brought the most precipitous drop in deviant material. Before then, you couldn't throw a stone without coming upon CP(I avoided it like the plague but knew it was there), you could buy literally any drug on the Silk Road safely, and you could easily find bomb-making and asymmetric warfare information. Nowadays? Not so much.

oldgregg · 6 years ago
I agree but for different reasons. There is no financial incentive to run a TOR node-- it's expensive and opens you to real legal risks. Therefore most nodes are run by universities and unknown actors-- in any case they are almost all funded by the state. If I was a nation state it would make my job much EASIER if I corralled all of the bad actors into a network that has a handful of defined exit points more or less under my control. The entire notion is absurd. I2P is actually more secure because it routes traffic dynamically rather than trusting a centralized "authority"
GordonS · 6 years ago
> Before then, you couldn't throw a stone without coming upon CP(I avoided it like the plague but knew it was there), you could buy literally any drug on the Silk Road safely, and you could easily find bomb-making and asymmetric warfare information. Nowadays? Not so much.

I'm sure CP existed and exists on the dark web, but I think it's an exaggeration to say "you couldn't throw a stone without coming upon CP". A few years back I spent quite a bit of time on tor (research purposes), and thankfully never once just stumbled upon CP - I'm sure it's there, but you're going to have to go looking for it.

While Silk Road isn't around any more, other drug marketplaces pop up as soon as one dissappears - it's still very, very easy to buy any drug you want. Next day delivery of heroism? Easy. You've 3 big threats with buying drugs on the darkweb though:

1) The site pulling an exit scam, dissappearing with all the escrowed funds 2) Your seller pulling an exit scam, taking money for as long as possible without sending any drugs, then leaving the market 3) The site being compromised by the feds - it's actually quite difficult to run a watertight site on the darkweb, so this does happen

TheAdamAndChe · 6 years ago
I think it's an exaggeration to say "you couldn't throw a stone without coming upon CP".

It was on every single Hidden Wiki at the time.. it _was_ everywhere, and commonly linked to from sites like 4chan.

other drug marketplaces pop up

Sure, but nothing like the Silk Road. In a winner-take-all market like the online marketplace market, you would expect a top dog to emerge.

When did you do your research? The difference I noticed began late 2012.

Raphmedia · 6 years ago
I spent one single night exploring the dark web in 2011, stumbled on that on the first night.

Scrubbed my drives, poured bleach in my eyes and swore off TOR forever. I'd agree that at the time, it was rampant.

However, it was during the same time that the FBI had set up their Operation Torpedo so it's quite possible those were heavily advertised on purpose as a trap.

Either way, it's sickening and another proof that we can't have nice things. Give a dark-web to mankind and the first thing they do is upload disgusting illegal porn to it (I am not talking about kinks but actual criminal activity).

Andrex · 6 years ago
> Next day delivery of heroism? Easy.

Damn, screw my "hero's journey," this sounds way more straightforward. :P

RandomBacon · 6 years ago
Perhaps there is more money to be made via the Dark Web these days, so those people selling things have a vested interest in not making it scary to use it.

If I was a Dark Web Drug Kingpin, I would want to lessen the stigma of using the Dark Web, and that means trying to DDoS unsavory sites, convince other sites not to link to it, and the like.

Deleted Comment

htns · 6 years ago
Because governments are wiretapping the entire internet they can track down any server they can connect to live regardless of the protocol or number of indirections (this could be prevented with Freenet-style distributed hosting), but the actual downfall of the dark web seems to be web technology and outsourcing hosting. Last I checked Tor browser didn't disable javascript even on .onion sites (restricting HTML to a subset and requiring CSP would go a long way), and when sites share hosting they tend to go down all at once.
pc86 · 6 years ago
It's been years since I've used Tor browser but there were warnings everywhere about not enabling JS, and I'm pretty sure it was disabled by default.
SahAssar · 6 years ago
Do you mean that the entire system is compromised or just that individual sites are? Because it sounds like you are painting with a very broad brush here.
TheAdamAndChe · 6 years ago
I consider it likely that the entire system is compromised. I saw with early Tor that if a network is both truly anonymous and advertises itself as truly anonymous, deviant material is accessible everywhere. Tor didn't stop advertising itself as anonymous yet defiant material is a lot rarer, which tells me that it may not be as anonymous nowadays as they say.
LMYahooTFY · 6 years ago
Do you have any proof that tor is compromised?

There's a lot of evidence to the contrary. I don't mean to be rude, but your assertion sounds quite hollow and baseless. I'm certainly interested in any evidence you would have that shows tor is compromised.

dooglius · 6 years ago
How exactly did you "browse Tor"? I don't really know how you could find e.g. the Silk Road unless you were specifically looking for drugs.
TheAdamAndChe · 6 years ago
Hidden wikis. Other Tor sites linked to other sites. There were also a lot of Tor threads in 4chan and reddit at the time.

It's nothing now like it was then.

bawolff · 6 years ago
> Avoid public or unsecured WiFi. If you must log into an account on a network you don’t 100% trust, use a VPN to encrypt all communications. Even bank websites can be forged to be almost undetectable if an attacker has administrative access to the network you’re using.

I think we should stop fear mongering over shady wifi. In a world with HSTS and CT, these types of attacks ars incredibly difficult to pull off.

scrose · 6 years ago
Aren’t you assuming that users are only navigating to HTTPS sites and entering information? That’s unfortunately not the case. That also ignores the fact that having information about general activity can in itself be a privacy concern, whether or not that information is readable.
bawolff · 6 years ago
I am assuming that users go to their bank website by typing it into google and then clicking on their bank as a result.

Google is HSTS. The bank may or may not be (what a sad state of affairs, but i digress) but the link from google will at least be https.

What websites do you have in mind that are not https and that average users enter personal information that could lead to identity theft on?

> having information about general activity can in itself be a privacy concern, whether or not that information is readable.

It definitely can be in some threat models. In the context of average user being the target of drive-by identity theft, i struggle to see a realistic threat model for traffic-analysis of encrypted network traffic.

nionasgnionio · 6 years ago
What is CT in this context?
shawabawa3 · 6 years ago
Certificate transparency - chrome requires all certificates to have a public certificate transparency log which makes it very difficult for attackers to generate bad certificates undetected
rwmurrayVT · 6 years ago
You would be very hard pressed to find a cloned card + PIN anywhere. That's the holy grail and information like that would never find it's way outside of a team. Think about how easy it is to go to an ATM and use it.. Why would you sell that information for $25?

The rest of it seems fairly accurate based on jstash/unicc/etc.

skim_milk · 6 years ago
Sure, you can get this data, but you also have to test what credit cards work and what don't. You can't just go to an ATM and start working through 50 credit cards you stole until one worked without something noticing. I'm assuming a lot of the cost is sunk to just testing if the credit cards even work and how well their fraud detector/max purchase limit is set up, which is very costly, so labor cost might be very high compared to the raw $25-per-number.

Some time ago I accidentally stumbled upon how some organized crime ring determined which credit cards worked. Someone in my party asked the Uber driver one night what other gigs they do for money. He said he uses this one card to get 40% cash back. Of course I asked more questions being the only one in security at this party:

He starts talking saying he goes around to different, small, local businesses - but never visiting the same place twice - and uses this card to pay for his friends' food, splitting the bill, but keeping the cash back rewards. Sometimes the card is rejected and he has to keep trying until it works finally. The actual credit card has to frequently connect to his phone by pushing a button on the card to sync with his phone to make purchases. Of course what his phone is doing is downloading a backlog of CCN's which then is sent to the credit card to change the magnetic strip dynamically - completely unknown to him he's testing if credit card numbers are working and getting paid for it. Genius scam, but that's what this one specific crime ring has to pay in order to check the availability of stolen credit card numbers.

strogonoff · 6 years ago
An episode of Reply All[0] hints at another potential way of automated stolen credit card testing workflow.

In short, Domino’s across the US regularly receive strange orders for $2 Coke (and nothing else), which then no one ever picks up. The theory is, if a card doesn’t work, an automated script detects that as online order form switches to cash—and if it works, given the popularity of Domino’s this transaction might just slip by the cardholder’s attention.

[0] https://gimletmedia.com/shows/reply-all/z3hgd2

iamwil · 6 years ago
Fraudsters also test credit cards by donating a little bit to various charities. They tend to have far less stringent fraud detection.
ryanlol · 6 years ago
> You can't just go to an ATM and start working through 50 credit cards you stole until one worked without something noticing.

Why not? ATMs work at 3AM.

> but you also have to test what credit cards work and what don't

Not really, if it’s data you skimmed yourself odds are they’ll work more than half the time.

inetknght · 6 years ago
Does he get a bill and have to pay off the card? I assume that would _also_ go to stolen bank accounts.
cbg0 · 6 years ago
> Why would you sell that information for $25?

Because there's almost no risk associated with it. You don't have to get a team together to hit up ATMs and extract money from those cards, which requires trust and increases complexity, you just mount a few skimmers, collect the data, remove the skimmers, and then sell it online and let someone else take the risk.

ryanlol · 6 years ago
If you’re already installing and removing skimmers, quickly stopping at a few ATMs doesn’t seem like much work.
mopsi · 6 years ago
> Think about how easy it is to go to an ATM and use it..

Doesn't seem easy at all. ATMs have cameras and are monitored for abnormal transactions (stolen cards, unusual withdrawal patterns, etc).

ornornor · 6 years ago
Cameras don’t do much unless the suspect has already been arrested and it’s just a matter of building up evidence.

Cameras can’t tell you the name and address of the pixel blob that is committing the crime. Cameras as a security device are overrated. My building had countless footage of people entering the bike room or parking and stealing bicycles. Resident makes a complaint to the police, proudly says “we have cctv footage!”, police shrugs and looks at cctv footage, and nothing happens because what do you do with the video of a thief stealing your bike..?

rwmurrayVT · 6 years ago
If the data is collected from a skimmer + pin pad camera then you are already in the current area of the cardholder. There are a lot of ATMs without cameras or ways to avoid your face appearing fully in a camera.

Unusual patterns and stolen cards are one of the primary reasons that they will rarely ever leave a team. It takes a great deal of work to gather stripe data + PIN. It's much easier to look for a website without PCI compliance. In-person carding is going by the wayside, but is much easier to accomplish if you have good data. You can buy dumps, but no one is turning over a PIN.

cosmodisk · 6 years ago
Why? Isn't that how card skimming used to work? The skimmer pulls card data,while the mechanism designed to capture PIN( video or physical keylogger). Being able to get CC details is quite a different business compared to actually using them to get goods/services.
pc86 · 6 years ago
> Why would you sell that information for $25?

Because now you have $25, and you don't have your face on video using a stolen debit card?

ryanlol · 6 years ago
Which ATM requires you to show your face?
scoutt · 6 years ago
Maybe there is a legal difference between stealing the data, selling the data and using the data (perhaps in terms of prison years?).
vmception · 6 years ago
It is. The majority of the enforcement work is around industry safeguards and customer re-imbursal from insurance pools. And very little of the work is around prosecutions because the liability is shifted and moved around very similar to a corporation, but even more distributed.

The hacker doesn't hack, but sells the information to be weaponized.

The person that weaponizes only does that to get a giant leak of data, that they sell in pieces.

The person that buys a few cards, gets 1 that works, and now we are talking about a few thousand dollars. Almost too small to care for a big investigation.

And so on and so forth.

There is rarely anyone to levy the whole force of the RICO act + CFAA + Wire Fraud + Conspiracy + Using a fake ID + etc etc

jackpeterfletch · 6 years ago
Selling the infomation on the Dark Web is an easier and less risky way to extract value than actually trying to get a product delivered physically.
cbg0 · 6 years ago
I think some readers are misunderstanding this, a cloned card in this context is actually skimmed from an ATM, which allows you to copy the physical card because you have copied the magnetic strip and also have the PIN associated with the card, though this is not the same as having the card number, expiration & CVV2 code from online phishing.
hocuspocus · 6 years ago
> Think about how easy it is to go to an ATM and use it

In most places finding an ATM that still uses the magnetic stripe is certainly not easy.

blotter_paper · 6 years ago
Zoe gods have chips: https://youtu.be/jT-jmq8KBw0

(Some chips aren't actually signing anything, they're just another way of reading the same info that's on the strip. It depends on the company issuing the card. This isn't covered in the video, but it's true.)

As the video shows, there are other vectors of extraction than ATMs.

ryanlol · 6 years ago
Yeah, nobody sells dumps+pin for $25. This just doesn’t happen.
14 · 6 years ago
Because selling a card online where you never have to meet anyone is much safer then taking a stolen card and start using it where you may end up on camera or police called at point of purchase. Much safer to keep your distance and just sell numbers.
ryanlol · 6 years ago
You don’t use dumps with pin at pos, you use them at atms. The ATM won’t call the police on you or care if you’re wearing a motorcycle helmet.
darth_avocado · 6 years ago
I love the lady in the comments section, just being boss and looking for tips to become a criminal
itchyjunk · 6 years ago
If you get on torsearch or similar tor search engines, you see ads for similar stuff. You also see links in forums and such for places selling what you want. These are the types of prices the ad's themselves claim. Is the author taking all those numbers at face value? Or is this some more in-depth research where it was possible to purchase one or more services? If it's former, I don't find these numbers to mean much.

The links can be dead by the time you get to them. You don't know if it's just another honeypot. You don't know if you'll get what you pay for.

bilbopotter · 6 years ago
Exactly the author didn't buy a single thing. Honeypot scams all the way.
pmiller2 · 6 years ago
Do you really expect them to actually make a purchase, and then admit to at least $NUMBER_OF_ROWS_IN_TABLE crimes in print?
hashmal · 6 years ago
How can you build a dark web price index and not mention drugs at all?
Legogris · 6 years ago
> We were only interested in products and services relating to personal data, counterfeit documents, and social media.
prodmerc · 6 years ago
You don't even need the dark web these days haha

I bought an expensive T-shirt a long time ago from a rather legit looking apparel company (nice website, LTD company/bank account).

Learned the right words on Reddit, hit up Instagram and started looking for and messaging people. Got a few replies, went with the one who had the most legit looking photos.

After a few questions on WhatsApp (yeah, really, lol) got directed to the website and bought the right item... via direct debit because their payment processor was "down".

Big risk on my part, I guess, my plan if popo called was to just say "hey I only ordered a t-shirt!"... I did not think it through very well.

Got it pretty fast (Royal Mail tracked and signed) and found a gift pack of "Revels" inside. How nice of them!

It seems rather risky for them, wouldn't it take just one guy to talk? Or maybe the seller was new to the business.

Tbf, setting up a company, bank account and shipping, all while staying anonymous is extremely easy (but not legal) in the UK compared to the rest of EU.

hashmal · 6 years ago
Don't give everyone the secrets! ;)

Joking appart, my question wasn't to learn about drug prices for "practical use". I just think it's an interesting subject: how the web changes underground/illegal markets, what impact it has, etc.

There are lots of counterintuitive things in that field (look at how Portugal handles it), which makes it even more interesting to me. "war on drugs vs war on drug users".