Our 24x7 comprehensive monitoring of the Digital Underground can help you transform your information security and anti-fraud operations from reactive to proactive.

The Digital Underground is the dark side of the Internet and home for hackers, cybercriminals, and fraudsters. The Digital Underground is where they come together to collaborate, exchange information, and buy and sell a wide range of illicit goods, services and compromised data.

Part of the Digital Underground is publicly accessible, though much of the activity takes place on the “Dark Web” or the “Deep Web” which are anonymous and inaccessible to most users. The Digital Underground is vast and rapidly growing.

orange arrow

What is in the digital underground?

Stolen Data: Financial Accounts, e-commerce accounts, health records, personal records, travel reward accounts, intellectual property, trade secrets.

Hacker tools and collaboration: Malware, exploit kits, zero-day vulnerabilities, POS Skiming devices, phishing kits, tutorials, “how to” guides.

Crime as-a-service: DDS Service, Botnets, custom hacking jobs.

Mule Services: Ilicit fraud transfers, money laundering, shipping of phusical goods.

orange arrow

What makes up the digital underground?

Box img
Marketplaces

Online shops that facilitate the trafficking of illicit goods, services and compromised data.

Box img
Peer-to-peer messaging

Desktop and mobile messaging platforms that facilitate encrypted communication between individuals and groups.

Box img
Communities

Online forums and chat rooms that facilitate collaboration, training, and information sharing.

Box img
Malware infrastructure

Technical infrastructure operating malware campaigns and botnets.

orange arrow

What makes up the digital underground?

Marketplaces Image
Marketplaces

Online shops that facilitate the trafficking of illicit goods, services and compromised data.

Peer-to-peer messaging  Image
Peer-to-peer messaging

Desktop and mobile messaging platforms that facilitate encrypted communication between individuals and groups.

Communities Image
Communities

Online forums and chat rooms that facilitate collaboration, training, and information sharing.

Malware infrastructure Image
Malware infrastructure

Technical infrastructure operating malware campaigns and botnets.