{"id":7840,"date":"2022-04-22T14:21:21","date_gmt":"2022-04-22T12:21:21","guid":{"rendered":"https:\/\/www.aleph-networks.com\/communities-on-the-dark-web-hackers\/"},"modified":"2023-05-03T14:24:16","modified_gmt":"2023-05-03T12:24:16","slug":"communities-on-the-dark-web-hackers","status":"publish","type":"post","link":"https:\/\/www.aleph-networks.eu\/en\/communities-on-the-dark-web-hackers\/","title":{"rendered":"Communities on the Dark Web \u2013 Hackers"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Intro&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;6px||14px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H1&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\"><strong>Communities on the Dark Web \u2013 Hackers<\/strong><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||14px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Initialement con\u00e7u pour garantir l\u2019anonymat et contourner la censure, le dark web permet une libert\u00e9 quasi-totale d\u2019expression et d\u2019action. C\u2019est dans cet environnement anonyme que des hackers \u00e9voluent. Il n\u2019est plus n\u00e9cessaire d\u2019avoir de solides connaissances techniques pour effectuer une cyberattaque. D\u00e9sormais, il est possible d\u2019engager un hacker ou de suivre un guide sur un <a href=\"https:\/\/www.aleph-networks.eu\/ressources-blog-quels-sont-les-differents-types-de-sites-du-dark-web-part-1\/\">forum<\/a>.\u00a0Les hackers \u00e0 forte comp\u00e9tence op\u00e8rent d\u00e9sormais en groupe pour renforcer leurs connaissances, leur anonymat et factorisent leurs ressources.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;La pr\u00e9sence de deux types de hackers&#8221; module_id=&#8221; &#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;2px||13px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;11px||7px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><strong>Two types of hackers<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The dark web contains both black hats and white hats: a white hat is an ethical hacker, while a black hat has malicious intent. But not everything is black and white, and some hackers are grey. They act ethically or not depending on the issue at stake. No matter which colour hat they wear, they are mainly found on blogs that discuss anonymity technology or official hacker conference sites.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/ethical_hacking_training.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;94%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Sites-dune-communaute-White-Hats.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;|33px|1px|7px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;11px||15px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;L\u00e9gende&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Exemples of white hats<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Une v\u00e9ritable \u00e9conomie de la donn\u00e9e&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||13px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||12px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><strong>A veritable data economy<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;53.4px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>In the past 3 years, a real data economy has emerged. One of the main consequences is an explosion in the number of data leaks, along with the use of phishing as a vector for compromise.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>There are now so many email addresses that phishing has become the most profitable way to compromise information systems. Isolated hackers acquire or buy entire databases of email addresses then launch phishing campaigns or conduct CEO fraud via spear phishing.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-1.png&#8221; alt=&#8221; &#8221; title_text=&#8221;Example of a multi-country data sale &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;71%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;l\u00e9gende&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Example of a multi-country data sale <\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;16px||13px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Hacker groups on the dark web seem to be getting stronger and are becoming more consolidated.<\/p>\n<p>They are reaching targets, have websites for their activities, and publicise their actions as a communication tool. Their goal is to force victims to pay a ransom or contact them to prevent any leaks.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-2.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; custom_padding=&#8221;29px|||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;l\u00e9gende&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Suncrypt hacker group site <\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-3px|auto||auto||&#8221; custom_padding=&#8221;12px||10px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Nevertheless, even when their intent is malicious, not all hackers are profit-driven. This is clear from the many self-help forums that present hacking techniques and tutorials. They describe various compromise techniques in the form of guides or ready-to-use viruses.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||13px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-3.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|27px||26px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-4-1.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;91%&#8221; max_width=&#8221;92%&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;100px&#8221; max_height=&#8221;1000px&#8221; custom_padding=&#8221;|3px||3px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-4-2.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|84px||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||8px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;L\u00e9gende&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Guides and tutorials offering various hacking techniques<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;7px||13px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Data is a precious company resource that hackers can easily exploit. This is why the sale of data or high-value-added services has become one of their main activities on the dark web.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Certain hackers conduct the cyberattack themselves to sell the data they obtain, while others simply want to damage a particular entity. The goal is always the same: use one\u2019s knowledge or information to make money or cause harm.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Individual vendors scour forums to sell data they obtained via their own cyberattack or stole from others to make easy money. Hackers also release a sample or images of the data to confirm their veracity. This data is mostly email addresses that can be used to launch phishing campaigns. The stolen data market is driven by black hat activities.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The trade in stolen data is the result of black hat actions.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;6px||9px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-5.png&#8221; alt=&#8221; &#8221; title_text=&#8221;Excerpt from a forum selling data leaks&#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;64%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;l\u00e9gende&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Excerpt from a forum selling data leaks<\/em><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>There are also hackers for hire. They will conduct a cyberattack upon request to compromise a designated entity using a specific method.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We have observed a real surge in the services offered on the dark web, which we will further describe in the chapter on ransomware as a service. It has become possible for anyone to request a hacker\u2019s services. However, it is hard to know whether these platforms are scams or offer real services.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||9px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-6-1.png&#8221; alt=&#8221; &#8221; title_text=&#8221;Examples of cyberattack services for hire&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Image-6-2.png&#8221; alt=&#8221; &#8221; title_text=&#8221;Examples of cyberattack services for hire&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|63px||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;13px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;l\u00e9gende&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Examples of cyberattack services for hire<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We have dealt here mainly with the activities of the black hats, but the white hats are just as present, although less visible at first sight.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.aleph-networks.eu\/en\/blog\/&#8221; button_text=&#8221;Read more articles &#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This anonymous environment is where hackers operate.<\/p>\n","protected":false},"author":1,"featured_media":10184,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[41,42],"tags":[],"class_list":["post-7840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Communities on the Dark Web \u2013 Hackers - Aleph<\/title>\n<meta name=\"description\" content=\"This anonymous environment is where hackers operate, and highly skilled hackers now operate in groups.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Communities on the Dark Web \u2013 Hackers - Aleph\" \/>\n<meta property=\"og:description\" content=\"This anonymous environment is where hackers operate, and highly skilled hackers now operate in groups.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Aleph\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-22T12:21:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-03T12:24:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/ethical_hacking_training.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1910\" \/>\n\t<meta property=\"og:image:height\" content=\"1006\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Aleph\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aleph\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/\"},\"author\":{\"name\":\"Aleph\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9\"},\"headline\":\"Communities on the Dark Web \u2013 Hackers\",\"datePublished\":\"2022-04-22T12:21:21+00:00\",\"dateModified\":\"2023-05-03T12:24:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/\"},\"wordCount\":2035,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/\",\"name\":\"Communities on the Dark Web \u2013 Hackers - Aleph\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg\",\"datePublished\":\"2022-04-22T12:21:21+00:00\",\"dateModified\":\"2023-05-03T12:24:16+00:00\",\"description\":\"This anonymous environment is where hackers operate, and highly skilled hackers now operate in groups.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg\",\"width\":1090,\"height\":1083,\"caption\":\"les_hackers_sur_le_dark_web\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aleph-networks.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Communities on the Dark Web \u2013 Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"name\":\"Aleph\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aleph-networks.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\",\"name\":\"Aleph\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"width\":55,\"height\":55,\"caption\":\"Aleph\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9\",\"name\":\"Aleph\",\"url\":\"https:\/\/www.aleph-networks.eu\/en\/author\/280520aes\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Communities on the Dark Web \u2013 Hackers - Aleph","description":"This anonymous environment is where hackers operate, and highly skilled hackers now operate in groups.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/","og_locale":"en_US","og_type":"article","og_title":"Communities on the Dark Web \u2013 Hackers - Aleph","og_description":"This anonymous environment is where hackers operate, and highly skilled hackers now operate in groups.","og_url":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/","og_site_name":"Aleph","article_published_time":"2022-04-22T12:21:21+00:00","article_modified_time":"2023-05-03T12:24:16+00:00","og_image":[{"width":1910,"height":1006,"url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/ethical_hacking_training.png","type":"image\/png"}],"author":"Aleph","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aleph","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#article","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/"},"author":{"name":"Aleph","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9"},"headline":"Communities on the Dark Web \u2013 Hackers","datePublished":"2022-04-22T12:21:21+00:00","dateModified":"2023-05-03T12:24:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/"},"wordCount":2035,"commentCount":0,"publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg","articleSection":["Blog","Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/","url":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/","name":"Communities on the Dark Web \u2013 Hackers - Aleph","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg","datePublished":"2022-04-22T12:21:21+00:00","dateModified":"2023-05-03T12:24:16+00:00","description":"This anonymous environment is where hackers operate, and highly skilled hackers now operate in groups.","breadcrumb":{"@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#primaryimage","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/04\/Article-Hackers.jpg","width":1090,"height":1083,"caption":"les_hackers_sur_le_dark_web"},{"@type":"BreadcrumbList","@id":"https:\/\/www.aleph-networks.eu\/les-communautes-sur-le-dark-web-hackers-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aleph-networks.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Communities on the Dark Web \u2013 Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.aleph-networks.eu\/#website","url":"https:\/\/www.aleph-networks.eu\/","name":"Aleph","description":"","publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aleph-networks.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aleph-networks.eu\/#organization","name":"Aleph","url":"https:\/\/www.aleph-networks.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","width":55,"height":55,"caption":"Aleph"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9","name":"Aleph","url":"https:\/\/www.aleph-networks.eu\/en\/author\/280520aes\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/7840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/comments?post=7840"}],"version-history":[{"count":0,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/7840\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media\/10184"}],"wp:attachment":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media?parent=7840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/categories?post=7840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/tags?post=7840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}