
ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.



ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Share Dialog
Share Dialog
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.

Subscribe to Ervin Zubic

Subscribe to Ervin Zubic
Uncover the hidden world of the dark web and cryptocurrency abuses. Explore the 2024 research review for an eye-opening journey into cybercrime.
You can also find this article on my Medium page.
In a groundbreaking study titled “The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web,” Pengcheng Xia’s team delves into the internet’s underbelly. Published in January 2024, this paper offers a meticulous exploration of how cryptocurrencies fuel criminal activities on the dark web.
The study embarks on a multi-dimensional journey to scrutinize cryptocurrency-related misconduct on the dark web. The researchers collected data from 4,923 onion sites, involving over 130,000 pages, and identified 2,564 illicit sites and 1,189 illicit blockchain addresses. Their analysis reveals staggering figures — 90.8 BTC in revenue associated with these illicit activities.
Their comprehensive methodology incorporates dark web crawling for data collection, extraction of blockchain transactions, and systematic categorization of illicit sites and addresses. The study identifies 66 campaigns behind these illicit activities, highlighting a complex web of interconnected operations.
This research is commendable for its systematic approach and the vast dataset it analyses. The strength lies in its ability to unveil the covert networks and the financial magnitude of dark web crimes. However, the study faces inherent limitations, such as the dynamic nature of the dark web, which might render some findings transient. Also, the focus on Bitcoin may overlook abuses conducted via other cryptocurrencies.
Comparatively, this research advances our understanding beyond previous studies by revealing individual illicit activities and the interconnected networks behind them.
Perhaps the most startling revelation is the identification of 66 intricate campaigns orchestrating these illicit activities. This aspect shifts the narrative from isolated incidents to a more organized and systematic operation, suggesting higher sophistication and coordination than previously understood.
The implications of this study are profound. It provides valuable insights for law enforcement and cybersecurity experts in tracking and disrupting these nefarious networks. The detailed mapping of illicit campaigns could aid in developing targeted strategies to counteract these operations. Furthermore, this research opens new avenues for understanding the financial dynamics of the dark web, potentially leading to more practical regulatory frameworks for cryptocurrency transactions.
Future research could expand on this work by exploring other cryptocurrencies and incorporating real-time monitoring systems to keep pace with the rapidly evolving nature of the dark web.
“The Devil Behind the Mirror” is a critical lens into the shadowy corridors of the dark web, uncovering the intricate campaigns leveraging cryptocurrency for illicit purposes. This study deepens our understanding of digital currency abuses and marks a pivotal step towards more effective countermeasures against such underground activities. It’s an essential read for anyone interested in the intersection of cryptocurrency, cybersecurity, and digital ethics.
Related study by KAIST, published in January of 2019: “Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.” This video is a from the 2019 NDSS Symposium.
Video slides for Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Data-Driven Crypto Investigations: Study Reveals 96% Case Connection Rate
Discover how blockchain is transforming industries on the Blockchain Insights Hub. Follow me on Twitter for real-time updates on the intersection of blockchain and cybersecurity. Subscribe now to get my exclusive report on the top blockchain security threats of 2024. Dive deeper into my blockchain insights on Medium.
Uncover the hidden world of the dark web and cryptocurrency abuses. Explore the 2024 research review for an eye-opening journey into cybercrime.
You can also find this article on my Medium page.
In a groundbreaking study titled “The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web,” Pengcheng Xia’s team delves into the internet’s underbelly. Published in January 2024, this paper offers a meticulous exploration of how cryptocurrencies fuel criminal activities on the dark web.
The study embarks on a multi-dimensional journey to scrutinize cryptocurrency-related misconduct on the dark web. The researchers collected data from 4,923 onion sites, involving over 130,000 pages, and identified 2,564 illicit sites and 1,189 illicit blockchain addresses. Their analysis reveals staggering figures — 90.8 BTC in revenue associated with these illicit activities.
Their comprehensive methodology incorporates dark web crawling for data collection, extraction of blockchain transactions, and systematic categorization of illicit sites and addresses. The study identifies 66 campaigns behind these illicit activities, highlighting a complex web of interconnected operations.
This research is commendable for its systematic approach and the vast dataset it analyses. The strength lies in its ability to unveil the covert networks and the financial magnitude of dark web crimes. However, the study faces inherent limitations, such as the dynamic nature of the dark web, which might render some findings transient. Also, the focus on Bitcoin may overlook abuses conducted via other cryptocurrencies.
Comparatively, this research advances our understanding beyond previous studies by revealing individual illicit activities and the interconnected networks behind them.
Perhaps the most startling revelation is the identification of 66 intricate campaigns orchestrating these illicit activities. This aspect shifts the narrative from isolated incidents to a more organized and systematic operation, suggesting higher sophistication and coordination than previously understood.
The implications of this study are profound. It provides valuable insights for law enforcement and cybersecurity experts in tracking and disrupting these nefarious networks. The detailed mapping of illicit campaigns could aid in developing targeted strategies to counteract these operations. Furthermore, this research opens new avenues for understanding the financial dynamics of the dark web, potentially leading to more practical regulatory frameworks for cryptocurrency transactions.
Future research could expand on this work by exploring other cryptocurrencies and incorporating real-time monitoring systems to keep pace with the rapidly evolving nature of the dark web.
“The Devil Behind the Mirror” is a critical lens into the shadowy corridors of the dark web, uncovering the intricate campaigns leveraging cryptocurrency for illicit purposes. This study deepens our understanding of digital currency abuses and marks a pivotal step towards more effective countermeasures against such underground activities. It’s an essential read for anyone interested in the intersection of cryptocurrency, cybersecurity, and digital ethics.
Related study by KAIST, published in January of 2019: “Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.” This video is a from the 2019 NDSS Symposium.
Video slides for Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Data-Driven Crypto Investigations: Study Reveals 96% Case Connection Rate
Discover how blockchain is transforming industries on the Blockchain Insights Hub. Follow me on Twitter for real-time updates on the intersection of blockchain and cybersecurity. Subscribe now to get my exclusive report on the top blockchain security threats of 2024. Dive deeper into my blockchain insights on Medium.
<100 subscribers
<100 subscribers
No activity yet