HOME

TheInfoList



OR:

Operation Onymous was an international law enforcement operation targeting
darknet market A darknet market is a commercial website on the dark web that operates via darknets such as Tor and I2P. They function primarily as black markets, selling or brokering transactions involving drugs, cyber-arms, weapons, counterfeit currency, ...
s and other hidden services operating on the Tor network.


Background

Operation Onymous was formed as a joint law enforcement operation between the Federal Bureau of Investigation (FBI) and the European Union Intelligence Agency Europol. The international effort also included the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the Interior minister, interior, Home Secretary ...
, Immigration and Customs Enforcement (ICE), and Eurojust. The operation was part of the international strategies that address the problems of
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
,
botnet A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, sp ...
schemes, and illicit markets or darknets. It was also linked with the war on drugs effort with the participation of the U.S. Drug Enforcement Administration (DEA).


Raids

On the 5th and 6th of November 2014, a number of websites, initially claimed to be over 400, were shut down including drug markets such as Silk Road 2.0, Cloud 9 and Hydra. Other sites targeted included
money laundering Money laundering is the process of illegally concealing the origin of money obtained from illicit activities (often known as dirty money) such as drug trafficking, sex work, terrorism, corruption, and embezzlement, and converting the funds i ...
sites and "
contraband Contraband (from Medieval French ''contrebande'' "smuggling") is any item that, relating to its nature, is illegal to be possessed or sold. It comprises goods that by their nature are considered too dangerous or offensive in the eyes of the leg ...
sites". The operation involved the police forces of 17 countries. In total there were 17 arrests. A 26-year-old software developer was arrested in
San Francisco San Francisco, officially the City and County of San Francisco, is a commercial, Financial District, San Francisco, financial, and Culture of San Francisco, cultural center of Northern California. With a population of 827,526 residents as of ...
and accused of running Silk Road 2.0 under the pseudonym 'Defcon'. Defcon was "one of the primary targets". Within hours of the seizure a third incarnation of the site appeared, 'Silk Road 3.0'; Silk Road had previously been seized in October 2013, and then resurrected, weeks later, as 'Silk Road 2.0'. $1 million in
Bitcoin Bitcoin (abbreviation: BTC; Currency symbol, sign: â‚¿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
was seized, along with
€ The euro sign () is the currency sign used for the euro, the official currency of the eurozone. The design was presented to the public by the European Commission on 12 December 1996. It consists of a stylized letter E (or epsilon), crossed by t ...
180,000 in cash, gold, silver and drugs. Of the "illicit services" that were initially claimed to have been shut down, few were online marketplaces like Silk Road. A complaint filed on 7 November 2014 in the
United States District Court for the Southern District of New York The United States District Court for the Southern District of New York (in case citations, S.D.N.Y.) is a federal trial court whose geographic jurisdiction encompasses eight counties of the State of New York. Two of these are in New York Ci ...
, "seeking the forfeiture of any and all assets of the following dark market websites operating on the Tor network", referred to just 27 sites, fourteen of which were claimed to be drug markets; the others allegedly sold counterfeit currency, forged identity documents or stolen credit cards. US and European agencies sought to publicise the claimed success of their six-month-long operation, which "went flawlessly". The UK
National Crime Agency The National Crime Agency (NCA) is a Law enforcement agency#natlea, national law enforcement agency in the United Kingdom. It is the UK's lead agency against organised crime; Human trafficking, human, Arms trafficking, weapon and Illegal drug t ...
sent out a tweet mocking Tor users. The official
Europol Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating c ...
press release A press release (also known as a media release) is an official statement delivered to members of the news media for the purpose of providing new information, creating an official statement, or making an announcement directed for public releas ...
quoted a US
Homeland Security Investigations The United States Immigration and Customs Enforcement (ICE; ) is a Federal law enforcement in the United States, federal law enforcement agency under the United States Department of Homeland Security. ICE's stated mission is to protect the Un ...
official, who stated: "Our efforts have disrupted a website that allows illicit black-market activities to evolve and expand, and provides a safe haven for illegal vices, such as weapons distribution, drug trafficking and murder-for-hire." Other leading drug markets in the
Dark Web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
were unaffected, such as
Agora The agora (; , romanized: ', meaning "market" in Modern Greek) was a central public space in ancient Ancient Greece, Greek polis, city-states. The literal meaning of the word "agora" is "gathering place" or "assembly". The agora was the center ...
,
Evolution Evolution is the change in the heritable Phenotypic trait, characteristics of biological populations over successive generations. It occurs when evolutionary processes such as natural selection and genetic drift act on genetic variation, re ...
and Andromeda. Whereas Silk Road did not in fact distribute weapons, or offer
contract killing Contract killing (also known as murder-for-hire) is a form of murder or assassination in which one party hires another party to kill a targeted person or people. It involves an illegal agreement which includes some form of compensation, moneta ...
s, Evolution did allow trade of weapons as well as drugs. Prior to the closure of Silk Road 2.0, Agora already carried more listings than Silk Road, and Evolution was also expected to overtake it. Agora and Evolution are more professional operations than Silk Road, with more advanced security; the arrest of the alleged Silk Road manager is thought to have been largely due to a series of careless mistakes. The figure of 414 dark net sites, which was widely reported internationally, and appeared in many news headlines, was later adjusted without explanation to "upward of 50" sites. The true figure is thought to be nearer to 27 sites, to which all 414 .onion addresses direct. Australian journalist Nik Cubrilovic claimed to have discovered 276 seized sites, based on a crawl of all onion sites, of which 153 were scam, clone or phishing sites.


Tor 0-day exploit

The number of sites initially claimed to have been infiltrated led to the speculation that a zero-day vulnerability in the Tor network had been exploited. This possibility was downplayed by Andrew Lewman, a representative of the not-for-profit Tor project, suggesting that execution of traditional police work such as tracing
Bitcoin Bitcoin (abbreviation: BTC; Currency symbol, sign: â‚¿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
s was more likely. Lewman suggested that such claims were "overblown" and that the authorities wanted to simply give the impression they had "cracked" Tor to deter others from using it for criminal purposes. A representative of Europol was secretive about the method used, saying: "This is something we want to keep for ourselves. The way we do this, we can’t share with the whole world, because we want to do it again and again and again." It has been speculated that hidden services could have been deanonymized if law enforcement replicated the research by CERT at
Carnegie Mellon University Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania, United States. The institution was established in 1900 by Andrew Carnegie as the Carnegie Technical Schools. In 1912, it became the Carnegie Institu ...
up until the July 30th patch that mitigated the issue. If sufficient relay nodes were
DDOS In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
ed which would force traffic to route over the attacking nodes, an attacker could perform traffic confirmation attacks aided by a
Sybil attack A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is ...
. Logs released by the administrator of Doxbin partially supported this theory. Court documents released in November 2015 generated serious research ethics concerns in the Tor and security research communities about the warrantless exploit (which presumably had been active in 2014 from February to 4 July). The Tor Project patched the vulnerability and the FBI denied having paid Carnegie Mellon $1 million to exploit it. Carnegie Mellon also denied receiving money.


See also

* Anonymizer * Operation DisrupTor


References


External links

*
United States of America – v. – Blake Benthall a/k/a "Defcon," Defendant.
' – sealed complaint
Operator Of "Silk Road 2.0" Website Charged In Manhattan Federal Court
US Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the U.S. government that oversees the domestic enforcement of federal laws and the administration of justice. It is equ ...
press release
Dozens of Online "Dark Markets" Seized Pursuant to Forfeiture Complaint Filed in Manhattan Federal Court in Conjunction with the Arrest of the Operator of Silk Road 2.0
US Department of Justice press release
Tag Archives: Operation Onymous
DeepDotWeb {{Use dmy dates, date=June 2020 2014 in law Cybercrime Dark web Law enforcement operations Tor (anonymity network) Federal Bureau of Investigation operations U.S. Immigration and Customs Enforcement operations