Friday, March 29, 2024

Dark Web Market “Silk Road” Administrator Sentenced to Six Years Imprisonment

Geoffrey S. Berman, the U.S. Attorney for the Southern District of New York said that for his position as an Administrative staff on the ‘ Silk Road ‘ website GARY DAVIS aka “Liberts” is convicted today to a 78 months imprisonment.

In its operations from 2011 through 2013, Silk Road distributed more than $200 million of illicit medicines and other illegal products and services to more than 115,000 purchasers from thousands of drug dealers and other illegal suppliers, laundering hundreds of million dollars from these illegitimate transactions.

U.S. Attorney, Geoffrey S. Berman Manhattan said, “Gary Davis assisted operating the Silk Road website–the dark market for illegal drugs, hacking and other illegal activities.

A clear signal should be sent by Davis’s detention, extradition from Ireland, trial and jail sentences: the black internet does not shade fast enough to safeguard criminals from the long branch of law.

In the course of the 2015 proceeding, Ross Ulbricht, Silk Road’s creator, was founded by claims of superiority, tribunal filings, tribunal comments, and proof:

Between January 2011 and October 2, 2013, the website of Silk Road held an extensive black market bazaar on the Internet, which was used to frequently purchase and sell illegally purchased products and services from customers on this site.

Silk Road Market Place

For over two and a half years, Silk Road supplied over 115 000 buyers of illegal products and services, including hundreds of kilograms of illicit drug products, fake identification and passports, informatic hacking tools and facilities, counterfeit goods and pirated media and money laundering facilities, by almost 4000 suppliers.

Overall there have been more than 1.5 million “Silk Road” transactions with total valuation over $213 million. Almost 95% of these revenues were for illegal drugs (roughly $183 million).

Ross William Ulbricht, the owner and operator of Silk Road also known to be “Dread Pirate Roberts(DPR) ran the site with the help of a little support staff, including site administrators and forum moderators.

Among other things, the website administrators had been accountable for monitoring Silk Road user activities, answering customer service requests and settling conflicts between customers and sellers.

Forum moderators were accountable for monitoring customer activities in the forum linked to the website, supplying forum participants with instructions on how to operate their businesses on Silk Road website and educated them to report to Ulbricht and website administrators on any major problems discussed on the Forums.

Role as Administrator

GARY DAVIS has carried out as administrator for the Silk Street from around May 2013 through June 2013. DAVIS worked as a location manager on Silk Street from around June 2013 to October 2, 2013. As a website administrator, DAVIS has the task notwithstanding.

To meet the requirements of customers of Silk Street who needed assistance with their buyer or merchant account in the market place.

To research questions that emerged between sellers (e.g., street pharmacists) and purchasers, announcing his findings to Ulbricht.

To implement the norms and procedures for sale on marketplace regulated by Ulbricht. For example, there was a standard against “out of escrow” deals – i.e., venders and purchasers masterminding installments off the site to abstain from paying Silk Street commissions.

At the point when infringement of this standard was found, DAVIS could demote a merchant or allude the seller (e.g. to Ulbricht) for further disciplinary action. Ulbricht paid DAVIS a week after week pays for his work as a site administrator.

Not soon after the first Silk Street had been closed down in early October 2013, it was driven by its indistinguishable successor – the Silk Street 2.0. DAVIS was appointed as head for Silk Street 2.0 from November 2013 to December 2013.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles