Darknet and Zero-Day Exploit Analysis

Bogdan Barchuk *

Independent researcher.
 
Research Article
International Journal of Science and Research Archive, 2023, 08(02), 799-811.
Article DOI: 10.30574/ijsra.2023.8.2.0222
Publication history: 
Received on 08 February 2023; revised on 25 April 2023; accepted on 28 April 2023
 
Abstract: 
On the darknet, people can buy and sell illegal digital goods such as zero-day exploits, which are not yet made public. Cybercriminals value these vulnerabilities since they allow for weaknesses in security systems that pass unnoticed. In this underground community, traders, auctioneers, or leaksters can move exploits that are later used in large-scale cyber-attacks. With the help of botnets and automated tools, it is now easy for attackers to scan and hack many vulnerable systems in just a few minutes. Due to the large number of users who use them and don’t update them properly, WordPress, Joomla, and Drupal are often attacked. Many times, individuals or groups that aim to harm or damage companies use these zero-day tools because the effect is strong and immediate. Because there is less distinction now between hobbyists and criminal groups, the darknet is having a bigger impact on current cybersecurity. In this paper, we discuss the way the darknet works, how zero-day exploits develop throughout their lifespan, and the increasing risk posed by tools that automate attack methods.
 
Keywords: 
Darknet marketplaces; Zero-day exploits; Automated bots; CMS vulnerabilities; Mass \\defacements; Vulnerability chaining
 
Full text article in PDF: