Once on the European continent, the looted art quickly disappeared into the warehouses of traders and middlemen, where provenance often gets falsified. In 2015, when U.S. special forces killed the Islamic State’s finance minister, Abu Sayyaf, at his estate, they confiscated dozens of hard drives and USB sticks containing hundreds of terabytes of data. Following the Gulf Wars and especially since 2015, the antiquities market was flooded with Mesopotamian art from Iraq and Syria—mosaics and bas-reliefs from Palmyra, Mosul, Homs. But wherever in the world conflicts flare up, networks of looters, smugglers and traders soon prosper.
Cryptocurrency Threat Actors
Russian control through aggregated criminality in the Donbas region, as well as in other Russian enclaves like South Ossetia and Transnistria, inevitably leads to the strengthening of both demand and supply factors that lead to the expansion of illicit markets. This creates a crowded marketplace where both politically and criminally motivated actors compete for resources, in effect strengthening the illicit market. All protracted conflicts where power structures either shift or are contested develop what experts call a “war economy,” where both criminal groups and civilians are dependent on using illicit channels for everyday transactions, and where civilians may be required to rely on armed groups or criminal actors for their survival. Due to the limited capacity of Ukrainian institutions during the war and the opportunities it may create for organized criminal groups, the international community, and Western policy makers in particular, should consider developing viable counter-measures that can help limit the emergence of illicit markets.
The event was moderated by Dr. Cüneyt Gürer, professor of Transnational Security Studies at the GCMC, whose area of expertise covers countering transnational organized crime (CTOC), transnational and comparative security issues/policies, political regimes and security, non-state actors and security and conflict and human displacement. Kyiv has launched a unified gun registry and enforced mandatory registration of so-called “trophy weapons” — those awarded to veterans or captured in combat. According to the new report, the Ukrainian government has been remarkably effective at preventing illegal diversion by military personnel, with only 250 cases in 2022, and 191 in 2021 — a negligible amount for a country receiving billions in Western military aid. While wars always heighten the risk of arms diversion, Ukraine’s government has put in place such strict control mechanisms that gun-running is extremely limited. There is very little evidence that Western weapons being shipped to Ukraine are ending up on the black market, according to a think tank report published on Tuesday.
Industry-Specific Cyber Threat Intelligence Powered By Agentic AI

This Russian-language forum is instrumental in the trade of malware, providing tools and services that fuel a wide array of cyberattacks. The XSS.is platform is widely recognized as a significant nexus for illicit online operations. The deep web includes all content not indexed by search engines, like password-protected sites and private databases.
Enhance Your Threat Intelligence

A new report by the Global Initiative Against Transnational Organized Crime, for which I acted as a researcher, explores this new underworld, which may give us a clue for where the worldwide drug scene is headed next. This failure to cope lies partly with the changing nature of the drug market itself. Just like the United States, Russia has been waging a war on drugs. They stopped me, checked my documents, then asked if I was carrying anything illegal. Authorities seized €7.8 million and arrested operators in Germany, Spain, Sweden, Romania, the Netherlands, and the US Europol leads takedown of Archetyp.
- According to 2014 studies by Martin Aldridge & Décary-Hétu and a January 2015 report from the Global Drug Policy Observatory, many harm reduction trends have been spotted.
- (This trend will be discussed in greater depth in the Monitor’s first annual report in early 2024.)
- While many of the leaked archives of data were created within a few hours of the attacks in mid-January, there are no indications they were directly obtained as a result of the attacks.
- To list on a market, a vendor may have undergone an application process via referral, proof of reputation from another market or given a cash deposit to the market.
- Another development with dark web usage germane to Russia was the rise of mobile phone apps for individual dark net markets juxtapose the traditional dark web browser usership (Tor, I2P, etc. ) (Figure 1).
War Turns Ukraine Into ‘supermarket’ For Illegal Weapons

Could the increase in dark web usage, more specifically Tor, simply be state-sponsored cyberwarfare vs. the general population? The ease of use with market-specific apps built for Android operating systems allowed ready access to Russian markets like “RuTor,” “Blacksprut, and “OMG! That the country is profiting from a wide range of crypto transactions to get around strict sanctions placed upon the country following its illegal invasion of Ukraine could also be a factor.
Cyberattack Methods Analyzed And Possibly Reused
In August 2015 it was announced that Interpol now offers a dedicated Dark Web training program featuring technical information on Tor and cybersecurity and simulated darknet market takedowns. The quality of products is attributed to the competition and transparency of darknet markets which involve user feedback and reputation features. The market in firearms appears to attract extra attention from law enforcement, as does the selling of other weapons such as certain types of knives and blades. Some criminal internet forums such as the defunct Tor Carding Forum and the Russian Anonymous Marketplace function as markets with trusted members providing escrow services, and users engaging in off-forum messaging. Items on a typical centralized darknet market are listed from a range of vendors in an eBay-like marketplace format.
What Are Darknets & Dark Markets?
The deployment of these weapons is particularly concerning, given Washington’s difficulties tracking weapons. The usage of cluster munitions by both Moscow and Kyiv and Russia’s usage of chemical weapons, however, are not being overstated. There is also fear that, if Russia continues to use chemical weapons, Ukraine may escalate usage as well.
The fact that Ukraine has a relatively new market scene, re-built after the years of corruption and shadow economy of the USSR, is compounded with the fact that the country is at the crossroads of trafficking between the East and the West. While organized crime is typically considered largely a law-enforcement problem, the corruption of both political and economic structures of a state by powerful illicit networks tied to another state may require a much wider, whole-of-society approach to prevention. Russia’s pre-war strategy of using organized crime networks as a grey zone tactic in a larger irregular warfare campaign aimed to compromise and weaken Ukraine has continued, especially in the regions that have been occupied by Russian forces. While criminal groups chose their operations due to the “supply side” of opportunities, politically motivated groups are largely constrained to the location of the political or geographic entity for which they fight. However, the Ukraine-Russia case also provides some evidence to show that Ukraine may be different, perhaps as a result of the inter-state character of the war and the undisputable one-sided nature of the Russian aggression.
The darknet includes networks like Tor, I2P, and Freenet that provide anonymity for users. The darknet is an encrypted overlay network that requires special software like Tor to access. Darknets and dark markets present a multifaceted challenge to businesses and society as a whole.

However, Ukrainian officials have also struggled to track weapons movements, and oversight failures have had lethal consequences. In January 2024, the US military admitted that it had failed to effectively track over US$1 billion worth of small and light arms. Ukraine has also consistently released information about the state of weaponry in the country and allowed for US end-use monitoring through the State Department or the Department of Defense.
- On July 31, the Italian police in conjunction with Europol shut down the Italian language Babylon darknet market seizing 11,254 Bitcoin wallet addresses and 1 million euros.
- The panelists noted that while there were already strong criminal networks operating in Ukraine before the Russian invasion, the conflict may not have significantly strengthened illicit markets in the areas controlled by the Ukrainian army due to the strengthened performance legitimacy of the wartime government under Zelensky.
- There he labored into night time identifying looted art and preparing to testify as an expert witness at trials, a role few archaeologists dared take on given the threat of retaliations by the criminal groups that profit from the smuggling trade.
- The proliferation of IoT and 5G devices will provide new attack vectors for infostealer gangs.
- However, many of the goods and services offered on these marketplaces are illegal, and purchasing them could result in criminal charges.
It has also expanded monitoring of all lost and stolen arms in Ukraine, which have grown from some 400,000 before Russia’s full-scale invasion to nearly 600,000 today. “We did not find any evidence of Western weapons making it to Western Europe and very limited evidence of any kind of transactions with Western weapons in Ukraine,” said Daniel Brombacher, director of the GI-TOC’s Europe Observatory. Security Council that one-fifth of Western weapons sent to Ukraine were ending up on the black market for resale to terrorists and rebel groups. There was optimism following the talks in Geneva, but no details emerged on how to bridge the huge divide between Moscow and Kyiv over territory and security guarantees. Ms Nesterovsky says it is not clear if the adverts were created specifically by pro-Russian actors or if scammers active on the dark web created them independently, and then pro-Kremlin sources picked them up. "Usually, you would find people who know a marketplace. But we didn't find any reviews or recommendations of this platform. We had a lot of trouble finding anything about this marketplace, any kind of feedback," says Irina Nesterovsky, KELA chief research officer.
The anonymity and encryption provided in dark markets create a haven for cybercriminals and nation-state actors to buy and sell dangerous assets while evading detection. Dark markets, on the other hand, are platforms within darknets where illicit transactions occur. This guide explores the characteristics of darknets and dark markets, their implications for cybersecurity, and how they facilitate cybercrime. Monitoring active marketplaces offers early access to malware kits, credential dumps, and fraud tools.