Darknet Markets under Attack

Private ‘Darknet’ markets like Agora, Abraxas, Alphabay and many others are facing a siege after the after the browser used to reach those markets are under attack. In an statement on Reddit ” Middle Earth and Agora are the focus of the most serious attack TOR has
ever seen. The attack however, is via the TOR network itself. We are
working with TOR to help fix this as quickly as possible.”

Darknet markets became one of the most easiest way to find products and services that are not legally available. So it is necessary for the buyer and seller to use the Tor browser to reach these markets so they cannot be tracked back. And Tor is the only way to access these Darknet market sites like Agora and Middle Earth.

Middle Earth and Agora are the major target behind the attack on Tor. Both have been struggling to stay up as they get hit with a flood of connection attempts that have overwhelmed the hidden sites.

This is the first time that a private darknet market is targeted directly. Because these markets sell products like Drugs, hacking tools and services, arms and ammunition to underage porno movies many people plus law agencies don’t have good things to say about this marketplace.  
Tor Developers are saying that, ” they think the problem will be solved in a few more days. So please do not worry, Middle-Earth is alive and well, everything is just in “cryo-freeze” for security reasons.

It may interest you to know that “TheHobbit” (owner of ME) was actually the person that discovered and reported this serious security flaw in TOR to the developers. If he had not found it so early and reported it, there is a good chance that Agora, Middle-Earth and the others would have been fucked for good. When TOR saw what “TheHobbit” had discovered they heightened the status of the situation to “CRITICAL”.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...