Tuesday, March 4, 2025
HomeComputer SecurityHackers Purchasing Abused SSL/TLS certificates From Dark Web Markets to Victimize...

Hackers Purchasing Abused SSL/TLS certificates From Dark Web Markets to Victimize their Targets

Published on

SIEM as a Service

Follow Us on Google News

SSL/TLS certificates are the backbones of secure communication, it encrypts the sensitive information that sent across the internet, so that, only the intended recipients can get access to it.

The SSL/TLS certificates provides trust with lock icon and also provides authentication, which makes you to ensure the information has been sent to the correct server.

But the certificates are poorly protected, which allows attackers to abuse them and use it for launching a high-profile attacks.

Evidence-based Cybersecurity Research Group published a detailed report on the volumes of SSL/TLS certificates that available for sale on the dark web, including the details on how they are packaged and sold to attackers. The report highlights the emergence of identity-as-a-service on the dark web marketplace.

Threat actors sold the certificates individually as well as packed with other tools that deliver machine-identities-as-a-service to attackers who like to launch a man-in-the-middle attacks, spoof websites, eavesdrop and to steal sensitive data.

Researchers conducted 16 weekly searches across all 60 websites on the Tor network, 17 webpages on I2P. Listings of SSL/TLS certificates found in markets such as Dream Market, Wall Street Market, BlockBooth, Nightmare Market and Galaxy3.

SSL/TLS certificates

The listings shows that the availability of the SSL/TLS certificates is remarkably higher than the number of ransomwares and exploit’s listed.

An ad listing in Wall St. Market shows that the threat actors provide the certificates as well as the services to create the Fraudulent Websites.

SSL/TLS certificates

Another listing in the Dream market went step ahead, mentioning the issuance of SSL certificates and the use of aged domains as key services provided by this vendor. The certificate is sold here for less than €200 including web design services.

SSL/TLS certificates

“SSL/TLS certificates were also mentioned in various tutorials produced by anonymous authors. In addition, we found evidence of the availability of SSL stripping tools in the Dream Market,” reads the report.

EV certificate is designed to be the most trusted one in the market, a vendor named ‘bulkaccounts’ advertise it’s ability to issue EV certificates for U.S. & U.K. companies without any documentation and the cost starts at $1,000. “the vendor promises to provide full documentation for forged companies, including D-U-N-S numbers.”

SSL/TLS certificates

Dark web markets are the ideal place for the criminals to sell various malicious software, login details, financial data at very low cost.

Lest year it was observed that threat actors are offering both code signing certificates and domain name registration accompanying with the SSL certificates.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...