The result is 40 distinct marketplace ego networks containing user-DWM and U2U transactions, whose typical structure is depicted in Fig. In each network, links are directed and the arrows point at the receiver of Bitcoin. Since users often migrate from one DWM to another12 and become users of multiple DWMs, the 40 ego networks are not isolated but can be combined to form one full network, as shown in Fig. Cases like Nemesis Market and Monopoly Market indicate that law enforcement agencies now prefer to take down DNMs without announcing it publicly — and potentially alerting vendors under investigation. This allows them to compile intelligence and make arrests at optimal moments. In the interim, many in the DNM community will assume the marketplace performed an exit scam and continue their activity on other platforms.
This can be stopped if law enforcement agencies can break any link, particularly dark web marketplaces, in the chain. Hence, it should be the top priority to track these platforms and shut them down as quickly as possible. Some vendors offer services to help people “clean” illegally obtained funds using cryptocurrency and fake transactions. They mix and transfer funds through various privacy wallets and escrow services to hide the original source and make the illicit transactions harder to trace.
Decentralization And Vendor Shops (2022–
Not surprisingly, Bitcoin (BTC) remains the dominant currency in the markets we observed, despite its poor anonymity properties and easy traceability. On the other hand, Monero (XMR) has become a popular choice due to it being significantly more anonymity-focused than Bitcoin 2, 5. In practice, Monero is considered the best choice by the dark web community.
Essential Security Tips For Using Dark-Web Marketplaces
So, what even is this dark web, and why are these marketplaces present there? We review and list tools and products without bias, regardless of potential commissions. Despite Vito’s assurances, daily transaction activity on the site dropped.
Jardine emphasized that darknet markets operate with varying levels of sensitivity to fentanyl-related sales. Some marketplaces explicitly ban the trade of fentanyl, while others claim to prohibit it but fail to enforce the rule. Others may allow the sale of precursor chemicals rather than the final product, further complicating law enforcement efforts.
Use Encryption For All Stored Data

As mentioned earlier, launching a cyberattack doesn’t require any hacking skills. Even people with zero technical knowledge can buy phishing kits, ransomware, or stolen logins. Later, in 2013, Silk Road caught the attention of law enforcement and policymakers like US Senator Charles Schumer, who publicly called for a federal crackdown. That push led to the arrest of Ross Ulbricht, the founder of Silk Road, after a long and intense investigation.
Switching Lab Overview: Key Networking Concepts And Configurations
Numerous vendors also sold hacking tools and hacking services through Hydra. Hacking vendors commonly offered to illegally access online accounts of the buyer’s choosing. In this way, buyers could select their victims and hire professional hackers to gain access to the victims’ communications and take over the victims’ accounts. The best way to protect yourself from the dangers of darknet markets is to simply avoid them altogether. Even browsing these sites can put you at risk of malware infections or attract unwanted attention from law enforcement.
21 Username

Admittedly, those measures do not completely prevent phishing from occurring. Once an attacker completely clones a website and replaces the engine behind this mechanism (i.e. the method of verification), completely unsuspecting users can still be easily deceived. We also note that, interestingly, in certain markets, this security mechanism is missing if users access the market via the I2P network. The first screen users usually see after entering a market will be queuing, which is mainly used to protect the website from DDoS attacks.
Van Wegberg et al. 32 analysed no less than six years of longitudinal data from eight dark web markets. Both works find out that the business models of these markets is maturing. Wang et al. 34 compared Chinese and Occidental dark web markets, covering briefly some aspects of the security mechanisms they employ. During the heights of the COVID-19 pandemic, in 2020, Bracci et al. 6 analysed COVID-19-related products over a period of approximately eleven months.
Cryptojacking, Fake Wallets, And Fraudulent Exchanges
Moreover, the network had already fully recovered by 2019 showing a strong resilience against external shocks. Government-sponsored hacking groups actively exploit the dark web for intelligence operations, financial gain, and sabotage. These groups use dark web platforms to sell stolen secrets, acquire hacking tools, or coordinate with other criminal organizations. Monero has emerged as the preferred currency for privacy-conscious traders. Designed with built-in obfuscation technologies, Monero hides wallet addresses, transaction amounts, and histories.

Top-10 Dark-Web Marketplaces In 2025: Overviews, Use-Cases, And Risks
In general, our totals exclude revenue from non-crypto-native crime, such as traditional drug trafficking and other crimes in which crypto may be used as a means of payment or laundering. Such transactions are virtually indistinguishable from licit transactions in on-chain data, although law enforcement with off-chain information can still investigate these crimes using Chainalysis solutions. In cases where we’re able to confirm such information, we count the transactions as illicit in our data. For example, since the conviction of FTX’s former CEO of fraud, our 2022 figures have included the $8.7 billion in creditor claims against the exchange.
- In this subsection, we explore information about financial security related to doing transactions while using the market.
- The dark web market changes all the time, but some dark web marketplaces have made a name for themselves as the biggest and busiest spots.
- There are also other case-by-case solutions that work for certain market websites.
- In all panels, the dashed vertical line marks the time of operation Bayonet.
- After the UAPS infrastructure takedown, we observed a swift decline in on-chain activity from UAPS counterparties, indicating that many fraud shops relied on this infrastructure to process customer payments.
Their pseudonymous nature enables criminals to exploit blockchain technology for financial crimes, challenging regulators and law enforcement. Vendors on Hydra also offered services such as “Hacking for Hire,” “Ransomware as a Service” (“RaaS”), and a myriad of money laundering features. Though the drug transactions were limited to Russia and its geographic neighbors, the cyber and money laundering tools were available to anyone in the world willing to pay. Despite Telegram’s anonymity, the dark web is still a hot spot for illegal trading of malware, illicit goods, and stolen data (such as stolen credit card information). Even with the increase in law enforcement pressure, the dark web market still achieved a revenue of $2 billion in 2024. Therefore, as long as this dark part of the internet exists, these marketplaces will flourish and emerge.

Secure In The Dark? An In-depth Analysis Of Dark Web Markets Security
- However, you can trace its roots to the development of technologies like the Tor network or Freenet.
- If for any reason, you decide to visit these hidden corners of the web, ensure you at least study and understand the common traps.
- Authorities seized €7.8 million and arrested operators in Germany, Spain, Sweden, Romania, the Netherlands, and the US Europol leads takedown of Archetyp.
- In addition to dealing in prohibited materials, the indictment also charges Parsarad with offering money laundering services, with Nemesis used to mix the cryptocurrencies used to pay for goods and services.
With Bitcoin, buyers and vendors are advised to use mixers to avoid tracking and enhance their anonymity 18, 36. There are many markets that offer a variety of options (i.e. two or more currencies) to provide flexibility for users and vendors. The market usually has a real-time exchange rate for currency conversion, even though most item prices are shown in US dollars. That means the buyer will pay the corresponding cryptocurrency according to the exchange rate. Additionally, Litecoin (LTC) and Tether (USTD) are also available in some markets, but in a very small percentage.
Cyber-Attacks And Scams
When a marketplace is shut down, vendors can typically migrate to other platforms. But when a vendor is arrested, their activity is disrupted across every DNM they operate on. As a result, law enforcement has adopted an intelligence-led enforcement strategy incorporating DNM takedowns into longer-term investigations rather than treating them as end goals. Since its inception, Abacus Market has gradually increased its market share in the Western DNM ecosystem. In 2022, it ranked as the fourth largest Bitcoin-supporting Western DNM with 10% of market share, rising to 17% in 2023. In 2024, its share surged to over 70%, following ASAP Market’s voluntary closure in July, 2023 and the law enforcement seizure of Incognito Market in March, 2024.