Friday, April 25, 2025
HomeDark WebA Largest Dark Web Marketplace "Dream Market" Admin & Drug Dealer Sentenced...

A Largest Dark Web Marketplace “Dream Market” Admin & Drug Dealer Sentenced 20 Years in Prison

Published on

SIEM as a Service

Follow Us on Google News

Dark web marketplace drug dealer Sentenced 20 Years in Prison for distributing controlled substances and conspiracy to launder money.

A French man Gal Vallerius, aka “Oxymonster,” 36 who was serving at times as an administrator and senior moderator on one of the largest dark web criminal marketplaces “Dream Market”

Dream Market (hxxp://jd6yhuwcivehvdt4(dot)onion/) is an online darknet market started in 2013 that operates on a hidden service of the Tor network, allowing online users to browse anonymously and securely.

- Advertisement - Google News

Marketplace sells a variety of content, including drugs, stolen data, and counterfeit consumer goods, all using the Bitcoin cryptocurrency.

Gal Vallerius pleaded guilty before U.S. District Court Judge Robert N. Scola Jr. in the Southern District of Florida on Aug. 28 and he was sentenced to serve 240 months in prison and 99.98947177 bitcoin and 121.94805811 bitcoin cash to pay as a penalty.

According to the Department of Justice agreed upon factual proffer, Vallerius first participated in the conspiracy by becoming a vendor on Dream Market.  As a vendor, he sold Oxycodone and Ritalin under the moniker “Oxymonster.”  Shortly thereafter, Dream Market employed the defendant who acted at times as an administrator and senior moderator.

“In these positions, he played a role supporting the daily illicit transactions between buyers and vendors on Dream Market, such as trafficking in narcotics, and the laundering of illicit proceeds using virtual currencies, Dream Market’s tumblers and the dark web.”

In this case his major responsibility daily illicit transactions between buyers and vendors on Dream Market such as trafficking in narcotics, and the laundering of illicit proceeds using virtual currencies.

He was arrested in France international Airport when he was going to attend worldwide beard competition in Austin, Texas.

Also Read:

Dark Web Market Silk Road Admin Pleads Guilty, Prison Up to 20 Years

Hackers Selling Facebook Account Logins Details On Dark Web For $3

Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data

Hackers are Selling Social Media Logins & Financial Details On Dark Web starting from £2

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...