{"id":7636,"date":"2017-10-19T17:40:32","date_gmt":"2017-10-19T17:40:32","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=918"},"modified":"2017-10-19T17:40:32","modified_gmt":"2017-10-19T17:40:32","slug":"past-and-present-of-underground-network-industry","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/past-and-present-of-underground-network-industry\/","title":{"rendered":"Past and Present of Underground Network Industry"},"content":{"rendered":"<p>The underground network industry has a long history and extensive coverage. What happened throughout its history?<\/p>\n<p>This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures.<\/p>\n<h1><strong>Overview<\/strong><\/h1>\n<h2><strong>What is Underground Industry?<\/strong><\/h2>\n<p>Underground industry is a general name for a wide variety of behaviors which, using the Web as the media and aided by viruses, trojans, and other malicious tools, exploit vulnerabilities or other malicious means to control others&#8217; computers, steal or illegitimately use user privileges and identities to obtain monetary benefits.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-919 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755.png\" alt=\"\" width=\"261\" height=\"226\" \/><\/a><\/p>\n<p>In the early phase, the underground industry only involved malicious behaviors of a small gang of people who had a wide range of knowledge.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143756.png\"><img decoding=\"async\" class=\"wp-image-920 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143756.png\" alt=\"\" width=\"322\" height=\"394\" \/><\/a><\/p>\n<p>Now, the underground industry becomes much more sophisticated, as shown in the following figure. My God!!<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144500.png\"><img decoding=\"async\" class=\"size-large wp-image-921 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144500-1024x848.png\" alt=\"\" width=\"640\" height=\"530\" \/><\/a><\/p>\n<h2><strong>How Dark Is the Entire Underground Industry Chain?<\/strong><\/h2>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144540.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-922 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144540.png\" alt=\"\" width=\"768\" height=\"383\" \/><\/a><\/p>\n<h2><strong>Underground Industry Around Us<\/strong><\/h2>\n<p>The underground industry is not simply the web underground industry, but the entire vast and sophisticated chain of interests. Vulnerabilities and interests respectively serve as the media and fuels to keep the massive &#8220;black machine&#8221; to run.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144600.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-924 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144600.png\" alt=\"\" width=\"648\" height=\"445\" \/><\/a><\/p>\n<h3><strong>Misuse of Internet Resources and Services<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144622.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-925 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144622.png\" alt=\"\" width=\"752\" height=\"672\" \/><\/a><\/p>\n<h3><strong>Theft of Other Assets<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144700.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-926 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144700.png\" alt=\"\" width=\"908\" height=\"373\" \/><\/a><\/p>\n<h3><strong>Theft of Virtual Assets<\/strong><\/h3>\n<h3><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144714.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-927 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144714.png\" alt=\"\" width=\"909\" height=\"261\" \/><\/a><strong>Technique and Training<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144729.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-928 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144729.png\" alt=\"\" width=\"877\" height=\"535\" \/><\/a><\/p>\n<h3><strong>Botnet<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144730.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-929 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144730.png\" alt=\"\" width=\"883\" height=\"515\" \/><\/a><\/p>\n<h3><strong>Spam<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144731.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-930 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144731.png\" alt=\"\" width=\"734\" height=\"601\" \/><\/a><\/p>\n<h3><strong>DDoS<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144732.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-931 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144732.png\" alt=\"\" width=\"846\" height=\"655\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(A price list for launching DDoS attacks)<\/p>\n<h3><strong>Hidden Links <\/strong><\/h3>\n<p>Hidden links, as the name indicates, are a type of links added to other websites through improper means, i.e. by obtaining the webshell of the website through the exploitation of a website program vulnerability or a server vulnerability. Most of those websites are of governments and enterprises, which have a higher PageRank and weight, but are carelessly managed. Actually, hidden links are added with texts of the same color as the website background or through a hidden layer. Doing so means to be unnoticeable, but this comes under the suspicion of fooling search engines, making a cheating behavior. Why are hidden links so popular? A great number of hidden links in various forms are used by the Black Hat Search Engine Optimization (SEO) service. Such links are usually sold at an affordable price to webmasters. Industries using black links are mostly hot sectors (such as SF and healthcare industries), which are profiteering.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144733.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-932 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144733.png\" alt=\"\" width=\"759\" height=\"585\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(A price list of hidden links)<\/p>\n<h3><strong>Information Market<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144734.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-933 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144734.png\" alt=\"\" width=\"957\" height=\"568\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(Multiple personal directories are sold on the Internet.)<\/p>\n<p>&nbsp;<\/p>\n<p>Information obtained via the exploitation of certain vulnerabilities is of great value.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144735.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-934 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144735.png\" alt=\"\" width=\"726\" height=\"571\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(Bank information obtained by exploiting vulnerability)<\/p>\n<h3><strong>Attempting Login with Stolen User Data<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144736.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-935 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144736.png\" alt=\"\" width=\"965\" height=\"416\" \/><\/a><\/p>\n<h3><strong>Account Scanner<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144737.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-936 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144737.png\" alt=\"\" width=\"979\" height=\"636\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(Accounts and passwords obtained by scanners.)<\/p>\n<h3><strong>Phishing Attacks<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144738.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-937 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144738.png\" alt=\"\" width=\"939\" height=\"502\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(A phishing site warning)<\/p>\n<h3><strong>0-day Deals<\/strong><\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144739.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-938 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144739.png\" alt=\"\" width=\"809\" height=\"588\" \/><\/a><\/p>\n<h1><strong>Analysis of Techniques Employed by the Underground Industry<\/strong><\/h1>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144740.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-939 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144740.png\" alt=\"\" width=\"739\" height=\"398\" \/><\/a><\/p>\n<h2><strong>Typical method 1: login with stolen user data + account scanning<\/strong><\/h2>\n<p>Techniques: SQL injection\/upload, authentication bypass, and restriction function missing<\/p>\n<p>Scenario: large- and medium-sized e-commerce websites with the voucher function<\/p>\n<p>Exploitation difficulty: \u2605<\/p>\n<p>Loss caused: \u2605\u2605\u2605\u2605<\/p>\n<p>Exploitation procedure:<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144741.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-940 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144741.png\" alt=\"\" width=\"967\" height=\"313\" \/><\/a><\/p>\n<p>In early years, for a good user experience, most e-commerce websites neither asked users to type the authentication code for the initial login, nor detected or restricted massive login attempts from individual IP addresses.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144742.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-941 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144742.png\" alt=\"\" width=\"949\" height=\"401\" \/><\/a><\/p>\n<p>With fake consignees, hackers can use vouchers or reward points. From a medium-sized e-commerce website with about 500,000 registered users, attackers may steal around 2000 accounts with a voucher, making a profit of approximately CNY 100,000. Such attack events can make direct reputation damage and economic loss to e-commerce websites.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144743.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-942 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144743.png\" alt=\"\" width=\"943\" height=\"421\" \/><\/a><\/p>\n<h2><strong>Typical method 2: order hijacking<\/strong><\/h2>\n<p>Technique: direct object reference<\/p>\n<p>Scenario: change of delivery addresses on e-commerce websites<\/p>\n<p>Exploitation difficulty: \u2605<\/p>\n<p>Loss caused: \u2605\u2605\u2605\u2605<\/p>\n<p>Exploitation procedure:<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144744.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-943 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144744-1024x217.png\" alt=\"\" width=\"640\" height=\"136\" \/><\/a><\/p>\n<p>Allowing to change delivery addresses is kind of ridiculous function \u2026<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144745.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-944 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144745.png\" alt=\"\" width=\"919\" height=\"656\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(Addresses can be modified in Address Management function.)<\/p>\n<h2><strong>Typical method 3: cross-site scripting (XSS) with redirections<\/strong><\/h2>\n<p>Technique: XSS<\/p>\n<p>Scenario: certain e-commerce websites<\/p>\n<p>Exploitation difficulty: \u2605\u2605\u2605\u2605<\/p>\n<p>Loss caused: \u2605\u2605\u2605<\/p>\n<p>Exploitation procedure:<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144746.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-945\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144746-1024x265.png\" alt=\"\" width=\"640\" height=\"166\" \/><\/a><\/p>\n<p>Please think twice before you click short domain names, such as<\/p>\n<p><a href=\"http:\/\/mcs.paipai.com\/RWsiZVpoe\"><strong>http:\/\/mcs.paipai.com\/RWsiZVpoe<\/strong><\/a><\/p>\n<p>Otherwise, a 302 error will occur, directing you to the following link:<\/p>\n<p><a href=\"http:\/\/shop1.paipai.com\/cgi-bin\/shopmsg\/showshopmsg?shopId=2622893717&amp;amp;page=1&amp;amp;iPageSize=1&amp;amp;t=0.8497088223518993&amp;amp;g_tk=2019233269&amp;amp;g_ty=ls&amp;amp;PTAG=40012.5.9\"><strong>http:\/\/shop1.paipai.com\/cgi-bin\/shopmsg\/showshopmsg?shopId=2622893717&amp;amp;page=1&amp;amp;iPageSize=1&amp;amp;t=0.8497088223518993&amp;amp;g_tk=2019233269&amp;amp;g_ty=ls&amp;amp;PTAG=40012.5.9<\/strong><\/a><\/p>\n<p>The preceding link references the QQ nickname of the shop owner and contains the web page code without filtering. The following figure shows the QQ nickname of the shop owner.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144547.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-923 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144547.png\" alt=\"\" width=\"561\" height=\"286\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144547.png 561w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144547-300x153.png 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/a><\/p>\n<p>Clicking the link contained in the nickname displays the source code as follows:<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144748.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-946 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144748.png\" alt=\"\" width=\"996\" height=\"216\" \/><\/a><\/p>\n<p>A redirection of the short domain name displays the most malicious code as follows:<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144749.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-947 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144749.png\" alt=\"\" width=\"825\" height=\"104\" \/><\/a><\/p>\n<p>Via DOM-based cross-site scripting, the attacker embeds an iframe tag in the paipai web page. Due to the JavaScript&#8217;s same-origin policy, the code will manipulate paipai cookies and send them to my.tuzihost.com. After collecting such cookies, the attacker can directly access paipai.com in the context of a victim.<\/p>\n<p>Since some websites rely on JavaScript for cookie operations and web page access analysis, the HttpOnly property cookies is left unconfigured.<\/p>\n<h2><strong>Typical method 4: phishing<\/strong><\/h2>\n<p>Technique: ingenious ideas<\/p>\n<p>Scenario: anywhere<\/p>\n<p>Exploitation difficulty:<\/p>\n<p>Loss caused: \u2605\u2605\u2605<\/p>\n<p>Exploitation procedure:<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144750.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-948 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144750.png\" alt=\"\" width=\"621\" height=\"227\" \/><\/a><\/p>\n<p>For phishing, what really matters is how to take advantage of human weaknesses, while the choice of attack techniques is irrelevant.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144751.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-949 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144751.png\" alt=\"\" width=\"780\" height=\"449\" \/><\/a><\/p>\n<p>Generally, such attacks have complete functions, such as a backend management system.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144752.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-950 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144752.png\" alt=\"\" width=\"804\" height=\"441\" \/><\/a><\/p>\n<p>Sometimes, attackers fight with each other, somewhat like big fish swallowing little fish.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144753.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-951 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144753.png\" alt=\"\" width=\"989\" height=\"537\" \/><\/a><\/p>\n<h2><strong>Typical method 5: open-source getshell<\/strong><\/h2>\n<p>Technique: unknown<\/p>\n<p>Exploitation scenario: all websites that are developed rapidly based on source code<\/p>\n<p>Exploitation difficulty: \u2605\u2605\u2605\u2605\u2605<\/p>\n<p>Loss caused: \u2605\u2605\u2605\u2605\u2605<\/p>\n<p>Exploitation procedure:<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144754.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-952 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144754.png\" alt=\"\" width=\"923\" height=\"237\" \/><\/a><\/p>\n<p>The price paid for rapid development is devoting more time into vulnerability remediation.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144755.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-953 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144755.png\" alt=\"\" width=\"617\" height=\"590\" \/><\/a><\/p>\n<p style=\"text-align: center;\">(A vulnerability database, showing that lots of vulnerabilities exist\u00a0in rapidly developed systems)<\/p>\n<h1><strong>Protection Measures<\/strong><\/h1>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144756.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-954 aligncenter\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144756.png\" alt=\"\" width=\"746\" height=\"406\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144756.png 746w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018144756-300x163.png 300w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The underground network industry has a long history and extensive coverage. What happened throughout its history? This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures. Overview What is Underground Industry? Underground industry is a general name for a wide variety of behaviors which, using the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35813,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[15],"tags":[362,364,603],"class_list":["post-7636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-reports","tag-darknet","tag-darkweb","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Past and Present of Underground Network Industry - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Past and Present of Underground Network Industry - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"The underground network industry has a long history and extensive coverage. What happened throughout its history? This document presents the definition,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-19T17:40:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Past and Present of Underground Network Industry - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"The underground network industry has a long history and extensive coverage. What happened throughout its history? This document presents the definition,\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Past and Present of Underground Network Industry\",\"datePublished\":\"2017-10-19T17:40:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/\"},\"wordCount\":906,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/20171018143755-1.png\",\"keywords\":[\"Darknet\",\"Darkweb\",\"Ransomware\"],\"articleSection\":[\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/\",\"name\":\"Past and Present of Underground Network Industry - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/20171018143755-1.png\",\"datePublished\":\"2017-10-19T17:40:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/20171018143755-1.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/20171018143755-1.png\",\"width\":261,\"height\":226,\"caption\":\"Magic hat with cyber threats listed inside.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/past-and-present-of-underground-network-industry\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Past and Present of Underground Network Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Past and Present of Underground Network Industry - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Past and Present of Underground Network Industry - NSFOCUS","og_description":"The underground network industry has a long history and extensive coverage. What happened throughout its history? This document presents the definition,","og_url":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/","og_site_name":"NSFOCUS","article_published_time":"2017-10-19T17:40:32+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Past and Present of Underground Network Industry - NSFOCUS","twitter_description":"The underground network industry has a long history and extensive coverage. What happened throughout its history? This document presents the definition,","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Past and Present of Underground Network Industry","datePublished":"2017-10-19T17:40:32+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/"},"wordCount":906,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png","keywords":["Darknet","Darkweb","Ransomware"],"articleSection":["Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/","url":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/","name":"Past and Present of Underground Network Industry - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png","datePublished":"2017-10-19T17:40:32+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/20171018143755-1.png","width":261,"height":226,"caption":"Magic hat with cyber threats listed inside."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/past-and-present-of-underground-network-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Past and Present of Underground Network Industry"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=7636"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35813"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=7636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=7636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=7636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}