Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around Deerfield Beach. Computer Services, Tech Support, IT Solutions and more!

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

It’s a bit of a nightmare scenario for a business, born of watching too many crime thrillers: a criminal syndicate hacks into their systems, wreaking havoc and stealing all their data, while also destroying that company’s reputation. Is this scenario a fantasy? To a point, yes—but not so much as you might think.

Let’s discuss the concept of a gig economy for hackers, and how the dark web has been used to help facilitate it.

First and Foremost: Understanding the Gig Economy

Before we dive into our discussion about the dark web, it will help to have an appreciation for what the “gig economy” is.

The “gig economy” is the presence of a large number of people working part-time in temporary positions or as independent contractors, either as their primary source of income or as a means of supplementing what their other job (or jobs) provide. The Internet and its capabilities have greatly benefitted the development of the gig economy—particularly amongst many of the younger generations living in urban areas.

Businesses and the workforce alike have benefitted through the development of the gig economy, businesses by expanding their pool of available resources without committing to a new full-time hire, and workers by giving them the opportunity to supplement their existing income while providing them with a more flexible lifestyle.

This new means of work has brought some serious benefits as well as some drawbacks—but that’s a discussion for another time. For our purposes today, all we need to acknowledge is that people are increasingly seeking out work opportunities—and, for that matter, seeking out people to perform this kind of work—online.

Unfortunately, this includes cybercriminals and those who are seeking out the services they can offer. For these individuals to do so, however, they must turn to the notorious dark web.

Is the Dark Web Really So “Dark?”

Okay, so to make sense of the dark web, we have to take a look at how the Internet is constructed. The different pages and locations that create the Internet as we know it can be classified into three distinct categories:

  1. The Surface Web: This is the part of the Internet that most people are familiar with and associate with the Internet in general. Composed of all websites and pages that have been indexed by a search engine (and can therefore be found through these search engines), the surface web is anything that is openly accessible via the Internet.
  2. The Deep Web: The deep web is the next layer down, and includes all the pages that require a login or some kind of payment before they can be accessed, along with a user’s data on a website or platform. This data is not indexed, meaning that search engines cannot crawl or index it. This is the vast majority of the Internet today.
  3. The Dark Web: Finally, the dark web is the portion of the Internet that is inaccessible to a typical browser, only available via the Tor browser. As such, activity here cannot be traced or tracked, making the experience anonymous—and therefore, ideal for cybercriminal activity (amongst many other uses, of course). Due to its anonymity, the dark web operates on secrecy and cryptocurrency.

It is this final point that makes the dark web the marketplace for cybercriminals that it is today: the fact that anonymous browsing and cryptocurrency can be used to buy and sell someone’s services anonymously.

A Dark Web Gig Example

Let’s say that your company has an enemy—it could be a competitor, a disgruntled ex-employee with a grudge, a dissatisfied client with an axe to grind, anyone who might wish you ill—and that enemy is committed to seeing you hurt. What options does that enemy have?

Well, with the reality of the dark web, that enemy could presumably go to an anonymous hacker forum and request that someone take down your business’ website for a fee. Maybe they offer a thousand dollars or so for it, and a cybercriminal with some time to kill can decide to make themselves some cash.

This isn’t a complete hypothesis, either. Dark web forums have shown more than 80 million messages appearing from eight million users that are seeking out these services, while hackers are using these platforms to market themselves and their abilities.

  • 90 percent of these posts are from those seeking out hacking and cyberattack services
  • 7 percent of these posts are from hackers seeking out jobs
  • 2 percent of these posts are meant to encourage the sale of hacking tools
  • 1 percent of these posts are to encourage people to network with each other

These services can be very specialized, with different voices present on the platform to help people get into websites and others to help people use this access once they get it.

Data Can Fetch a Pretty Penny

Naturally, we can’t discuss the cybercriminal propensity that the dark web can bring without also talking about the value that stolen data has there. Hacked databases can bring the hacker up to $20,000, with every 1,000 entries netting them $50.

How Big of a Risk is This to the Average Business?

For the small to medium-sized business, it can be hard to gauge the threat that the dark web poses to them—particularly from the scenario that we presented above. While the dark web is more accessible than ever before, it is still far less than well-known… and most who know it only know it as a ghost story or as a crime show buzzword.

However, as the dark web slowly becomes more mainstream, it will only become a bigger threat than it already is. Furthermore, it is still the primary marketplace for stolen data, credentials, and other stolen information. You may already have stolen data up for sale, completely unaware of its presence.

To avoid this from happening any further, there are a few steps that need to be taken now and established as habits in every business:


Whether something is based in a business’ internal network or through a web application, a hacker can make use of any vulnerabilities to get into your operations. Ensuring that all of your resources and technology—including your website—are properly reinforced against threats will help to minimize the opportunities that hackers have to get in. This will help protect your business and the data that it holds.


A lot of serious security issues can come around via a cybercriminal taking advantage of you or your employees. As such, you and your team need to keep threats like phishing in mind and be sure to avoid the attacks that your business could (and at some point, will) face.


Finally, your security-focused behaviors can not and should not let up. Hackers will not hesitate to jump on companies that have been seen to have substandard security protections, so it behooves you to keep up with those updates and best practices, too.

There are many, many ways that we can help you with all this. For more assistance, reach out to Direct Technology Group at 954-739-4700 today.

Are Your Remote Workers Dealing with Communication...
Tip of the Week: Keep Your Workstation Clean


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 08 May 2021

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Productivity Efficiency Cloud Google Data Hackers Network Security Microsoft Software Malware Workplace Tips Communication User Tips Hardware Innovation Business Miscellaneous Smartphones Internet Backup Email IT Support Mobile Devices Small Business Hosted Solutions Collaboration communications Users Android Computer Smartphone Mobile Device Business Management Ransomware Cybersecurity Network Windows VoIP Productivity Social Media Upgrade Managed IT Services Outsourced IT Passwords Browser Managed Service Windows 10 IT Services Tech Term Microsoft Office Remote Quick Tips Holiday Save Money Gadgets Automation Disaster Recovery Bandwidth Cloud Computing Phishing Apps Covid-19 Business Continuity Windows 10 Employer-Employee Relationship Saving Money Facebook Data Backup Internet of Things Managed IT Services Office Information Marketing Chrome Data Recovery IT Support Wi-Fi Mobile Device Management Wireless Networking Apple Server Health Gmail Password Office 365 Analytics Router Alert Applications Retail Managed Service Provider Computers Patch Management Business Intelligence WiFi App Hacking Virtualization Office Tips Cybercrime Government VPN Access Control Mobility Remote Computing Settings Data Breach Remote Work Going Green Blockchain Twitter Laptop BYOD Physical Security Application BDR Remote Monitoring Recovery Excel Website Law Enforcement Operating System Compliance iPhone Data Management Battery Voice over Internet Protocol Mobile Office Human Resources Telephone Systems Bring Your Own Device Biometrics Value Entertainment History Conferencing Mouse Big Data Word HIPAA Google Drive Safety Workers Virus Net Neutrality VoIP Paperless Office Information Technology Social Engineering Employee-Employer Relationship Environment Politics Managed IT Service Maintenance Printer Lithium-ion battery Humor Artificial Intelligence Mobile Computing End of Support Spam Current Events Search Batteries Social Network Telephone System Cleaning Hosted Solution Meetings Wireless Charging Dark Web DDoS Robot IT solutions Hard Drives Education Tech Support Tip of the week Payment Cards Customer Relationship Management Shadow IT Risk Management Content Filtering Virtual Assistant Customer Service Windows 7 Data Protection Internet Exlporer How To Streaming Media Hybrid Cloud Fax Server Training The Internet of Things Tech Terms Remote Monitoring and Management SharePoint PowerPoint RAM Cost Management Encryption Two-factor Authentication Sports Remote Workers Business Technology Vulnerability eWaste Processor YouTube Healthcare Company Culture Scam Cortana Telephony Smart Technology User Error Free Resource Data Security G Suite Best Practice Employees Virtual Reality Printer Server Files Images 101 Shortcut Tablet Data storage Managing Stress Medical IT Connectivity Vendor Chromecast Payment Firewall Digital News Uninterrupted Power Supply Copy Monitor Hard Disk Drive PCI DSS Entrepreneur Staff GDPR Access Comparison disposal Online Shopping Downloads Internet exploMicrosoft internet consultant Social Networking Eliminating Downtime instant Messaging Profiles Tablets Edge Antivirus Techology Paste Reputation Video Regulations Compliance Phone System Websites Storage Printers Specifications Trends Google Maps Advertising Bitcoin Software as a Service User Wireless Internet Distribution Vulnerabilities Computer Repair Amazon HaaS Spotify Customer OneNote Innovations Dongle Error Lead Generation A.I. Distributed Denial of Service Private Cloud Help Desk Fleet Management Budget Cryptocurrency IT Service Memory IT budget Plug-In Personal Information Remote Support Flexibility Hiring/Firing Cabling Remote Control Windows Server 2008 R2 Tip of the Week/Security Touchscreen Database Movies Botnet Public Cloud Threats Bluetooth Certification Multi-Factor Authentication Touchpad Mobile IT Management Proactive IT SaaS Legal Staffing Spam Blocking Taskbar Reviews Programming Technology Tips Microsoft Office 365 User Tip Tactics WannaCry Unified Communications Managed IT Scams USB Holidays Time Management File Sharing Windows XP Email Management Relocation National Security Gig Economy Backup and Disaster Recovery Authentication Telecommuting Internet Explorer Security Cameras Virtual Private Network Hard Drive PDF Project Management Chrome OS Analyitcs Network Attached Storage Analysis User Security Video Games Millennials Threat Updates Gifts Consultant SSD Authorization Computer Accessories Wearables Co-Managed IT Hacker Processors Microsoft Teams Licensing Notifications Insurance Gadget Black Market Server Management Printing Webcam Customer relationships Best Available Inventory Troubleshooting Cameras Memes Science Spyware Travel Alerts Electronic Health Records Management Machine Learning Worker Paper Display Mobile Security Update File Management NarrowBand IT Windows 8 HP Live Streaming Work/Life Balance Downtime Remote Working WIndows 7 Telecommute Reporting Unified Threat Management Sales Voice over IP Ink Avoiding Downtime Multi-Factor Security Wearable Technology Benchmarks Social e-waste Outlook Managed Services Provider Wireless Technology E-Commerce Hosted Desktop Document Management Cables Windows Media Player Automobile WhatsApp People Solid State Drive Bloatware Data loss Knowledge eCommerce Running Cable Recycling Broadband Profitability

Mobile? Grab this Article!

QR-Code dieser Seite