Dark Web OpSec Failures

Discussions focus on how law enforcement caught operators of darknet markets like Silk Road through operational security mistakes, such as reusing usernames and emails across sites, poor Tor usage, and physical stings during arrests.

📉 Falling 0.4x Security
3,823
Comments
20
Years Active
5
Top Authors
#6489
Topic ID

Activity Over Time

2007
1
2008
16
2009
38
2010
46
2011
153
2012
167
2013
422
2014
234
2015
246
2016
196
2017
242
2018
182
2019
218
2020
259
2021
367
2022
271
2023
280
2024
251
2025
220
2026
14

Keywords

PHP DEA OSINT PC Winzip.com NK DNS PGP securityfocus.com NSA tor vpn address road fbi drug nk website logged ip

Sample Comments

stef25 Sep 17, 2020 View on HN

Not so sure. Don't remember the exact details but it involved a post on the shroomery website and another one on Stack Overflow and he was using the same handle on various sites. It seemed much easier to unravel than exploiting the Tor network, it was almost surprising it took them that long.

leoedin Feb 1, 2013 View on HN

You're giving the guy a lot more credit than he deserves. Beyond the fact you don't have to use the TOR browser to access TOR, it's fairly easy to change the settings to remember passwords. Maybe he was forgetful? Maybe along with his guilty plea he gave them his credentials? Maybe he used the same username and password for everything?If they'd set up a sting involving a fake seller, it would be in their interest to publicise it. Our drug enforcement process is built around throwing the book

eswat Jul 20, 2019 View on HN

From the news reports I’ve read, including Ulbricht's, it's enough for law enforcement to just find out who you are.They can then set up a sting operation where the target inadvertently leaves their laptop exposed with the keys to the castle available while being arrested.

MichaelGG Oct 2, 2013 View on HN

The criminal complaint says that he used the same username to publicize the site as well as on Bitcoin forums, where he listed his Gmail account and asked for help. From there, there's a whole lot of coincidences.They also got an image of his server, but no details on how they found the server are given. The complaint notes that another user warned him "an external IP is leaking", so the FBI might have found a weakness in his PHP setup. All it'd take is one command on the

novok Oct 21, 2020 View on HN

He probably used tor or a vpn to hide location / ip info and that was the cincher.

gpm Apr 1, 2024 View on HN

They probably have/will, though we are unlikely to find out what they get unless they manage to arrest/charge/try him.Jia Tan probably used a vpn though - we know that they did for accessing IRC (source: https://boehs.org/node/everything-i-know-about-the-xz-backdo...)

ajarmst Aug 4, 2017 View on HN

No, it could be much worse than that. Law enforcement didn't immediately shut Alphabay down---they let it run compromised for several weeks, gathering evidence. If Hutchins made transactions during that period, he was at signficant risk, especially if he was under surveilance at the time---simple traffic analysis would be enough to connect him to activity on the site. It's very hard to hide the content of a conversation from one of its participants.

nwh May 4, 2013 View on HN

I'm curious how long it will be until this person is turned into an FBI informant (think Lulzsec and Sabu). The website has done some obscenely stupid things in the past, like leaving their real (non-Tor) IP address on error pages. Presumably the website is a large target, even just for it's common mention in media.

koenigdavidmj Dec 18, 2013 View on HN

Seems similar to how Jeremy Hammond was caught: they suspected that he was a particular IRC user, and correlated his login/logout times with actual comings and goings from his residence.

p410n3 May 20, 2020 View on HN

This guy got arrested at least:https://www.securityfocus.com/news/126