Skip to main content
Topic: Servers Of Colonial Pipeline Hacker Darkside Forced Down (Read 3166 times) previous topic - next topic

Servers Of Colonial Pipeline Hacker Darkside Forced Down

Servers Of Colonial Pipeline Hacker Darkside Forced Down


https://www.barrons.com/news/servers-of-colonial-pipeline-hacker-darkside-forced-down-security-firm-01621002013

https://archive.is/8VIs6


https://arstechnica.com/gadgets/2021/05/pipeline-attacker-darkside-suddenly-goes-dark-heres-what-we-know/

https://archive.is/Hc32m

https://web.archive.org/web/20210514214400/https://arstechnica.com/gadgets/2021/05/pipeline-attacker-darkside-suddenly-goes-dark-heres-what-we-know/

Quote
Quote
Identifying a Tor hidden service would also be a huge score, since it likely would mean that either the group made a major configuration error in setting the service up or law enforcement knows of a serious vulnerability in the way the dark web works. (Intel471 analysts say that some of Darkside’s infrastructure is public-facing—meaning the regular Internet—so malware can connect to it.)

But so far, there’s no evidence to publicly corroborate these extraordinary claims. Typically, when law enforcement from the US and Western European countries seize a website, they post a notice on the site's front page that discloses the seizure.
Quote
Quote
“I could be wrong, but I suspect this is simply an exit scam,” Brett Callow, a threat analyst with security firm Emsisoft told Ars. “Darkside get to sail off into the sunset—or, more likely rebrand—without needing to share the ill-gotten gains with their partners in crime.”