TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

What Does the Dark Web Look Like? Pulling Back the Curtain | Huntress

2025-12-03 · Read original ↗

ATT&CK techniques detected

6 predictions
T1090.003Multi-hop Proxy
73%
“the fact that you are even connecting to the tor network from your internet service provider ( isp ). - never use personal information : don ’ t log into any personal accounts — email, social media, or bank accounts — while using tor because it immediately de - anonymizes you. - …”
T1588.002Tool
61%
“s right — threat actors have their very own court system, along with codes of conduct to follow to minimize the chances of landing there themselves. what happens in “ hacker ’ s court ”? the same thing that happens in any other court : plaintiffs and defendants get together to te…”
T1657Financial Theft
54%
“their payments be made in cryptocurrencies. why? because it ’ s anonymous. our principal security researcher, john hammond, nicely sums up why cryptocurrencies are a hacker ’ s best friend : " no other technology offers a bad actor the perfect crime : anonymous threats without bo…”
T1090.002External Proxy
50%
“web browser to access. usually, these sites use a. onion domain and are only accessed through the anonymous tor browser. the dark web isn ' t all crime and chaos — detectives and journalists sometimes access the dark web to do research while maintaining their anonymity. you can p…”
T1090.002External Proxy
45%
“the fact that you are even connecting to the tor network from your internet service provider ( isp ). - never use personal information : don ’ t log into any personal accounts — email, social media, or bank accounts — while using tor because it immediately de - anonymizes you. - …”
T1090.003Multi-hop Proxy
43%
“booted up our virtual machine ( vm ) to add an extra layer of security while browsing. then, we fired up our anonymous tor browser. finally, we disabled javascript — a quick but important safeguard against websites that run malicious code. with these precautions in place, we were…”

Summary

Learn what the dark web looks like with an exploration of the far reaches of the internet, how you can get there, and what you might find… from a safe distance.