Web Intelligence

From Dark Web Sites To Telegram Groups: Where Do Cybercriminals Operate?

From Dark Web Sites To Telegram Groups: Where Do Cybercriminals Operate?

Cybercriminals increasingly favor IM platforms like Telegram over traditional dark web forums and markets. Over time, threat actors have recognized the advantages of these apps, using them to communicate, share information, and distribute malicious content. 

Much like dark web sites, dark web Telegram channels facilitate a range of criminal activities, largely due to their real-time communication capabilities and privacy features. Cybercriminals leverage instant messaging apps for illegal trade of drugs, malware, and stolen data, money laundering, and discussions about hacking methods. 

Additionally, extremist groups have adopted these communication apps to promote their ideologies, disseminate propaganda, and drive others to act on behalf of their cause.

Why do cybercriminals use instant messaging?

There are several reasons cybercriminals are drawn to instant messaging platforms. Let’s take a look at the top five factors.

  1. End-to-end encryption – End-to-end encryption on IM apps helps cybercriminals stay anonymous. This level of privacy is similar to what they are accustomed to on the dark web’s sites.
  2. Unindexed content – IM group messages are not indexed by standard search engines, making it difficult for law enforcement to track and identify criminal groups.
  3. Ease of use – The user-friendly mobile interfaces make IM apps appealing for a variety of use cases, including cybercrime. As a result, mobile-based platforms are becoming increasingly appealing for facilitating the illegal cyber economy.
  4. Versatile communication options – Beyond private one-on-one messaging, IM apps allow users to form groups, channels, and servers, creating both closed and public communities. This flexibility offers greater control and the ability to manage communication networks in an effective manner.
  5. Low  barrier to entry – Setting up and maintaining a community on an IM app like Telegram is simpler and cheaper  than building and maintaining a website or domain on the dark web.

It is worth noting that we have seen a drastic increase in the usage of IM apps over traditional dark web sites and marketplaces, especially Telegram black markets.
Due to the advantages and the ease of use of those apps, even to a level where some known forums now operate only on Telegram and ditched the dark web completely.

Of course, there are still those who continue to use both platforms and share their IM account details on dark web forums, either in their profiles or as part of their signatures to “catch” every user they can as potential clients or consumers. 

For example, take a look at the following screenshot, taken from a hacking forum. The poster includes contact information for the chat applications Session and Tox. 

A threat actor who is involved with the illegal Admin panel scanner publishing his IM private account details as contact info for clients
A threat actor who is involved with the illegal Admin panel scanner publishing his IM private account details as contact info for clients.

Since Telegram is one of the most popular chat applications among cybercriminals, we’ll take a closer look at examples we found by using our Cyber API that show how threat actors use both dark web sites and Telegram for their illegal operations.

Example #1: Drug trafficking

In the following example, a vendor listed the illegal drugs he is offering for sale on one of the  well-known dark web markets, which specializes in drug trafficking. The cybercriminal lists his drug offering, along with his illegal Telegram account and other IM apps which potential buyers may contact him via those, for negotiation purposes.

A cybercriminal is publishing his personal IM accounts for negotiation purposes in a post he’s listing the drugs he’s offering for sale
A cybercriminal is publishing his personal IM account for negotiation purposes in a post listing the drugs he’s offering for sale.

We can use his Telegram username to search for other posts he has written on different Telegram groups and channels. Using the information we gathered from the threat actor’s activity on the dark web and Telegram we can create a threat actor profile for our records.

Example #2: Cybercriminal groups activities

There are many cybercriminal groups who are responsible for conducting cyberattacks from DDoS and ransomware, to frequently leak the data they steal. As this practice has become more common in recent years, the reliance on IM applications and dark web Telegram channels among these groups has dramatically increased. 

These platforms enable cybercriminals to communicate privately with victims and facilitate negotiations. Groups and channels are used to announce future attacks, recruit new members, and distribute or sell compromised databases that have already been obtained.

 In the following example, we can see a screenshot we took from a dark web Tor site using Lunar, in which the known ransomware group called K1llsec calls their followers to contact them by IM applications such as Telegram and Tox.

A screenshot of the post made by K1llsec ransomware group.
A screenshot of the post made by K1llsec ransomware group.

As we wrote in previous Dark Web Pulse posts, many other cyber-criminal groups, such as RansomHouse, Arvin Club, Lapsus , BlackShoadow, GhostSec, Moses Staff, and more, use Telegram.

Like we wrote in previous Dark Web Pulse posts, there are many other cyber criminal groups who use Telegram, such as RansomHouse, Arvin Club, Lapsus , BlackShoadow, GhostSec, Moses Staff and more.

Example #3: Hacking forum activities on IM

Administrators of hacking forums also manage groups and channels on chat apps. On this channel, the admins publish updates related to the forum and other new and interesting topics that are being discussed, published or items that are sold on the forum.  This allows them to extend their influence, engage with a wider audience, and facilitate real-time communication within the cybercriminal community.

For example, a known Telegram channel in the hacking community operated by the name BF Repo V3 Files that constantly stores and shares backup files from data breaches, if talking about leaked passwords, combos (including email addresses), KYC, ID screenshots, or even full documents belonging to a country or a company.

The screenshot below was taken from that channel, containing sensitive data from various sources, from private companies’ employees and banks. This data may be very useful for attackers who wish to target those companies by using phishing techniques, identity theft, or even physical harm. 

A screenshot from the Telegram channel contains data from various sources
A screenshot from the Telegram channel contains data from various sources.

Monitoring dark web Telegram channels

Over time, chat apps have introduced numerous new features, making these platforms more user-friendly and accessible. As these apps become a major tool for cybercriminals, monitoring them alongside dark web sites has become crucial as part of seeing threats before they harm your organization.

Monitoring Telegram using a dark web monitoring platform is a strategic approach to keep track of potential threats, sensitive data leaks, or malicious activities targeting an organization.
Dedicated and comprehensive solutions such as Lunar, uses specialized algorithms and scraping approaches to scan and monitor public and semi-public channels or groups on Telegram.

Using Lunar, it’s possible and even crucial to monitor Telegram chats and set alerts. Here are some of the recommended alerts to set:

  1. Keywords based: terms related to your organization, industry, products, sensitive data (such as employee information, names, or financial data) and known threats or groups that target your organization or sector.
  2. Hashtags and usernames: specific usernames or hashtags that may be related to brand impersonation or specific threats.
  3. Possible IOC: malicious IP addresses, domains and specific recognized patterns related to known associated threats. 

When you come across an alert, it’s important to assess the credibility and potential impact and  react immediately, depending on the alert. There are various use cases, let’s review some of them:

  • When you detect sensitive data exposure, reset the compromised credentials and notify affected individuals or departments.
  • When dealing with cases of serious significant data breaches, use the assistance of IR teams and notify relevant cybersecurity agencies or law enforcement.
  • Implement security measures such as EDR and SIEM for internal monitoring, and if you see related fraud domains or any other IOC while monitoring Telegram, add this indicator to the internal tools for blocking purposes. 

We collaborate with top-tier MSSPs (Managed Security Service Providers), MDRs (Managed Detection and Response), DRP (Dark Risk Protection), WEBINT, crypto protection, CTI (Cyber Threat Intelligence), and IT (Identity Theft Monitoring) teams to deliver the most relevant data from deep and dark web sites, as well as chat applications, in near-real time.

Spread the News

Not subscribed to our Dark Web Pulse updates?

By submitting you agree to Webz.io's Privacy Policy and further marketing communications.

Feed Your Machines the Data They Need

Feed Your Machines the Data They Need

GET STARTED
Join our webinar to learn how transparent risk scores can speed up your incident response

Expose Hidden Risks to Your Domain

Uncover dark web threats with Lunar, the next gen dark web intel platform

Subscribe to our newsletter for more news and updates!

Ready to Explore Web Data at Scale?

Speak with a data expert to learn more about Webz.io’s solutions
Create your API account and get instant access to millions of web sources