Saturday, April 5, 2025
HomeDark WebA Largest Dark Web Marketplace "Dream Market" Admin & Drug Dealer Sentenced...

A Largest Dark Web Marketplace “Dream Market” Admin & Drug Dealer Sentenced 20 Years in Prison

Published on

SIEM as a Service

Follow Us on Google News

Dark web marketplace drug dealer Sentenced 20 Years in Prison for distributing controlled substances and conspiracy to launder money.

A French man Gal Vallerius, aka “Oxymonster,” 36 who was serving at times as an administrator and senior moderator on one of the largest dark web criminal marketplaces “Dream Market”

Dream Market (hxxp://jd6yhuwcivehvdt4(dot)onion/) is an online darknet market started in 2013 that operates on a hidden service of the Tor network, allowing online users to browse anonymously and securely.

Marketplace sells a variety of content, including drugs, stolen data, and counterfeit consumer goods, all using the Bitcoin cryptocurrency.

Gal Vallerius pleaded guilty before U.S. District Court Judge Robert N. Scola Jr. in the Southern District of Florida on Aug. 28 and he was sentenced to serve 240 months in prison and 99.98947177 bitcoin and 121.94805811 bitcoin cash to pay as a penalty.

According to the Department of Justice agreed upon factual proffer, Vallerius first participated in the conspiracy by becoming a vendor on Dream Market.  As a vendor, he sold Oxycodone and Ritalin under the moniker “Oxymonster.”  Shortly thereafter, Dream Market employed the defendant who acted at times as an administrator and senior moderator.

“In these positions, he played a role supporting the daily illicit transactions between buyers and vendors on Dream Market, such as trafficking in narcotics, and the laundering of illicit proceeds using virtual currencies, Dream Market’s tumblers and the dark web.”

In this case his major responsibility daily illicit transactions between buyers and vendors on Dream Market such as trafficking in narcotics, and the laundering of illicit proceeds using virtual currencies.

He was arrested in France international Airport when he was going to attend worldwide beard competition in Austin, Texas.

Also Read:

Dark Web Market Silk Road Admin Pleads Guilty, Prison Up to 20 Years

Hackers Selling Facebook Account Logins Details On Dark Web For $3

Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data

Hackers are Selling Social Media Logins & Financial Details On Dark Web starting from £2

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free

In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...