Home > Cyber News > Dark Web Sales Offer Military Tech & Airport Security Information
CYBER NEWS

Dark Web Sales Offer Military Tech & Airport Security Information

The latest Dark Web sales that have been uncovered by experts reveal that hackers have gained access to very sensitive data. The latest reports reveal that among the sold goods there are secret military technology materials, operating manuals and even the detailed schematics of an airport security system.

Dark Web Sales Offer Lucrative Goods: Military Technology Exposed




Security investigators routinely scan the dark web sales for any signs of private leaked data, exploits and other goods that might be of interest to malicious actors. Recently a series of secret documents in several related cases have caused the community to raise awareness against the ongoing computer intrusions against high-profile targets. The reason for this are the claimed (and actively sold) pieces of data that are being sold right now at several marketplaces.

According to the reports an individual hacker with the required expertise has been able to obtain documents from a captain belonging to the Aircraft Maintenance Squadron Reaper AMU OIC at Creech Air Force Base in Nevada. The documents that are being advertised on the underground market includes maintenance books belonging to Reaper drone unit with the “MQ-9A” identifier. This is an unnamed aircraft that is capable of performing remotely controlled flight operations and is often referred to as “the first hunter-killer” designed for high-altitude surveillance. The hacker also provides access to a full-motion video streams from the drone and several southern border checkpoints.

The other document is listed to contain a set of military materials from a computer belonging to an official from the US. The reports indicate that the obtained data set includes data on training courses, mitigation tactics, survival methods and etc. While the documents themselves may not be classified, they have very high value and are of interest to all other state actors.

This case shows that practically anyone with access to the Dark Web sales through the underlying markets can gain access to such documents, in many cases this can even include classified materials.

The provided information shows that the hacker has exploited a 2-year old vulnerability on a network router device. The problem was identified to be the placement of default FTP (file transfer protocol) server credentials that have been setup. This fact suggests that they have had a physical connection to an internal network connected to the compromised hosts. However at the moment it is not known whether or not the documents were hijacked from a personal device connected to the network or a government-issued host.

Related Story: Going Underground: How the Dark Web and Deep Web Work

Dark Web Sales Offer Airport Security Schematics

The other notorious recent item for sale is collection of airport security schemes of a major International airport. The most troubling fact is that it can be acquired for as as $10. The files were posted on a marketplace that is known for providing access to hacked machines utilizing the common RDP protocol. The experts confirmed the vulnerable machine by using the Shodan search engine which revealed the open service. The acquired information gave access to a computer holding accounts of companies that are associated with airport security. This gives hackers the ability to survey the airport schematics and specific security countermeasures as provided by the company.

Dark Web Sales Provide Interested Parties With Private Data

The reason why dark web sales continue to proliferate is that the contained within information can be of use both to malicious users and state actors. This conflicting state of existence has provoked its use by a wide range of both sellers and buyers. On there individual users can purchase for themselves not only illegal drugs, passports and information, but also find out the channels where more sensitive content can be found. Computer networks are constantly under attacks by experienced hackers and when they strike on government agencies containing secret or classified information, then this automatically turns into a serious interest for other state actors.

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree