BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
BTC $57054.0562
ETH $3243.0497
BNB $394.9600
SOL $108.4177
XRP $0.5865
stETH $3239.3493
ADA $0.6239
AVAX $39.2702
DOGE $0.0977
TRX $0.1428
wstETH $3750.7519
DOT $8.3691
LINK $19.0300
WETH $3348.6813
MATIC $1.0282
UNI $10.8579
WBTC $56903.9273
IMX $3.3452
ICP $13.0217
BCH $292.5040
LTC $74.0124
CAKE $3.1570
ETC $28.0992
LEO $4.3640
FIL $7.6578
KAS $0.1689
RNDR $7.2011
DAI $1.0000
ATOM $11.2097
HBAR $0.1082
INJ $40.1071
VET $0.0489
TON $2.1280
OKB $51.4855
FDUSD $0.9985
LDO $3.4670
STX $2.9465
XMR $135.8398
XLM $0.1230
ARB $1.8948
NEAR $3.9608
TIA $17.0031
WEMIX $2.3756
GRT $0.2795
ENS $22.1963
MKR $2154.9330
APEX $2.3329
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Valuable cybercrime personnel


    Kaspersky Lab experts found out the current state of the global recruitment market on the dark web, and also analyzed the purposes for which attackers can hire employees from the IT sector. Experts studied 155 Russian and English forums on the darknet and selected more than 800 job search and job postings for analysis.

    According to the results of the study, messages from potential candidates turned out to be significantly less than announcements with vacancies: the share of resumes was 17%. This is probably due to the fact that applicants respond more actively to published vacancies than leave information about themselves.

    Developers. Such IT specialists are most often searched for on the dark web (61% of ads). They also topped the list of the most paid. The most demanded specialization in the field of programming is web development. It accounted for 60% of all ads for the search for programmers. In the illegal field, such people are also involved in the creation of phishing pages. They can also be involved in the development of shadow forums, marketplaces and administrative panels to implement the Malware-as-a-Service model (malicious software as a service). They are also actively looking for virus writers. Their tasks include the creation of malware - Trojans, ransomware, stealers, backdoors, botnets, as well as the development and modification of tools for attacks.

    Attack Specialists. Their share is 17% of the total number of proposals. Most of the vacancies are related to hiring to compromise the infrastructures of organizations (network attacks). The goals of hacking can be different: infection with encryption programs, theft of data, or theft of money from accounts. Attackers are also hired to hack web and mobile applications.

    Designers. A tenth of all vacancies are associated with this specialization. On the black market, such specialists participate - together with web developers - in the creation of phishing pages and letters, scam sites. Their task is to make a fake indistinguishable from the original. Also in demand are UI / UX - and graphic designers.

    Administrators. Several dozens of discovered vacancies (6% of the total number) are associated with the selection of these IT specialists. Among them, more than half is the search for system administrators. Less often, DevOps, web and NOC administrators are hired. These people are required to set up and maintain the infrastructure of the attackers, as well as manage the already compromised networks of the victims. The administrator's tasks may include server maintenance, installation of panels, purchase of hosting, creation of proxy servers.

    Reverse engineers. The share of such vacancies is 4%. These professionals had the highest median wages. Among the tasks of reverse engineers is the search and exploitation of unknown vulnerabilities in hardware or software. They can also analyze security solutions and monitor security updates to find ways around them. Probably, the small volume of proposals for reverse engineers is due to the fact that developers can combine this direction with the main field of activity.

    Author DeepWeb
    Amnesty International Canada accuses China of cyberattacks on its systems
    How to reduce the effect of psilocybin mushrooms?

    Comments 0

    Add comment