{"id":49657,"date":"2022-12-08T13:27:00","date_gmt":"2022-12-08T13:27:00","guid":{"rendered":"http:\/\/f9e57b18-a697-4865-b63c-29dc0750534a"},"modified":"2022-12-08T13:27:00","modified_gmt":"2022-12-08T13:27:00","slug":"cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/","title":{"rendered":"Cyber scammers are scamming each other, and revealing dark web secrets along the way"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/c62cdd341b512c2a26234cd59975e476901a5890\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=768\" alt=\"getty-mysterious-hands-on-a-keyboard.jpg\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4fa99bcd00f3ff0f532aff3b3b067efeb80a4c51\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1024\" alt=\"getty-mysterious-hands-on-a-keyboard.jpg\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280\" alt=\"getty-mysterious-hands-on-a-keyboard.jpg\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280\" alt=\"getty-mysterious-hands-on-a-keyboard.jpg\" width=\"1280\" height=\"868.3539486203615\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty<\/span><\/figcaption><\/figure>\n<p>Cyber criminals are losing millions of dollars to other cyber criminals after themselves falling victim to scams on dark web forums. And the way they&#8217;re publicly complaining about it could help uncover the secrets of the whole underground economy. &nbsp;<\/p>\n<p>Online scammers and fraudsters <a href=\"https:\/\/www.zdnet.com\/article\/the-biggest-cyber-crime-threat-is-also-the-one-that-nobody-wants-to-talk-about\/\" rel=\"follow\">cost consumers and businesses billions every year<\/a>, and it appears that even cyber criminals aren&#8217;t immune to falling victim to scams.&nbsp;<\/p>\n<p>According to <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/12\/07\/the-scammers-who-scam-scammers-on-cybercrime-forums-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">analysis of underground marketplaces by cybersecurity researchers at Sophos<\/a>, cyber criminals have lost at least $2.5 million to other <a href=\"https:\/\/www.zdnet.com\/article\/your-complete-guide-to-the-dark-web-and-how-to-safely-access-onion-websites\/\" rel=\"follow\">dark web<\/a> scammers during the past 12 months \u2013 and that&#8217;s just on three prominent cybercrime forums, so the total figure is likely to be a lot higher.&nbsp;<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/watch-out-for-this-triple-pronged-paypal-phishing-and-fraud-scam\/\" rel=\"follow\"><strong>Watch out for this three-pronged PayPal scam<\/strong><\/a>&nbsp;<\/p>\n<p>Scamming other cyber criminals can be an appealing prospect because there&#8217;s little risk of the police ever getting involved. While some dark web forum moderators do offer arbitration processes if someone is accused of conducting a scam, the anonymous nature of the cyber-criminal underground forums means that, for the most part, the worst consequence a scammer is going to face will be a ban from the forum.&nbsp;<\/p>\n<p>But this isn&#8217;t just an opportunity to enjoy schadenfreude at the expense of online scammers and other cyber criminals \u2013 it&#8217;s also a chance to gain insight into how cyber criminals work, providing intelligence on what attacks are being employed and how to stop them.&nbsp;<\/p>\n<p>It can also potentially help identify who is behind the schemes, because while most cyber criminals are careful about hiding their identity, information they hand over during the arbitration process can provide clues \u2013 which could ultimately be used to find out who they really are track them down.&nbsp;<\/p>\n<p>&#8220;Because forum rules demand proof to support scam allegations, wronged threat actors will often happily post screenshots of private conversations and source code, identifiers, transactions, chat logs, and blow-by-blow accounts of negotiations, sales, and troubleshooting,&#8221; said Matt Wixey, senior threat researcher at Sophos.&nbsp;<\/p>\n<p>&#8220;This hidden sub-economy isn&#8217;t just a curiosity. It gives us insights into forum culture; how threat actors buy and sell; their tactical and strategic priorities; their rivals and alliances; their susceptibility to deception \u2013 and specific, discrete intelligence about them,&#8221; he added.&nbsp;<\/p>\n<p>Many of the scams are based around &#8216;rip-and-run&#8217; schemes, where either a buyer receives a product but doesn&#8217;t pay for it, or a seller receives a payment but either doesn&#8217;t deliver the product or it doesn&#8217;t work as advertised. &nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-these-are-the-new-things-to-worry-about-in-2023\/\" rel=\"follow\"><strong>Cybersecurity: These are the new things to worry about in 2023<\/strong><\/a><\/p>\n<p>This can even include providing an application or service as advertised, then secretly using it to <a href=\"https:\/\/www.zdnet.com\/article\/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\/\" rel=\"follow\">plant malware<\/a> on the buyer, stealing information or money from them.&nbsp;<\/p>\n<p>They&#8217;re called &#8216;rip-and-run&#8217; schemes because the scammer rips their victim off then runs away, either by ghosting additional messages and complaints or disappearing from the forum altogether.&nbsp;<\/p>\n<p>But there are also cyber criminals who engage in meticulously planned, long-term scams. For example, one scheme involved someone creating 19 fake criminal marketplaces, and then tricking users into handing over $100 &#8216;activation fees&#8217; to join.&nbsp;<\/p>\n<p>Others, simply engage in scams out of spite, because they hold a grudge against another user \u2013 or they think they&#8217;ve been scammed themselves.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/my-stolen-credit-card-details-were-used-4500-miles-away-i-tried-to-find-out-how-it-happened\/\" rel=\"follow\">My stolen credit card details were used 4,500 miles away. I tried to find out how it happened<\/a><\/strong><\/p>\n<p>When these disputes do end up in arbitration, it&#8217;s often the case that one or all the parties involved receive warnings or get banned. On one forum, the ban is even accompanied by the personal information that&#8217;s been submitted alongside the claim, partially doxing them in an attempt to deter other scammers.&nbsp;<\/p>\n<p>&#8220;If there&#8217;s a takeaway from all this, it&#8217;s that no user is immune; any trade on criminal forums involves an inherent risk of scams. While there are both proactive and reactive (arbitration rooms) measures in place, scammers are not only common, but \u2013 judging by the data we gathered \u2013 often successful,&#8221; said Wixey.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scammers are scamming scammers, and that&#8217;s creating an unexpected window into their world.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-49657","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber scammers are scamming each other, and revealing dark web secrets along the way 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber scammers are scamming each other, and revealing dark web secrets along the way 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-08T13:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber scammers are scamming each other, and revealing dark web secrets along the way\",\"datePublished\":\"2022-12-08T13:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/\"},\"wordCount\":701,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fca1a1e59bc744ac70244b088bd699f160abdab5\\\/2022\\\/02\\\/16\\\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\\\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/\",\"name\":\"Cyber scammers are scamming each other, and revealing dark web secrets along the way 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fca1a1e59bc744ac70244b088bd699f160abdab5\\\/2022\\\/02\\\/16\\\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\\\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2022-12-08T13:27:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fca1a1e59bc744ac70244b088bd699f160abdab5\\\/2022\\\/02\\\/16\\\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\\\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fca1a1e59bc744ac70244b088bd699f160abdab5\\\/2022\\\/02\\\/16\\\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\\\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber scammers are scamming each other, and revealing dark web secrets along the way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber scammers are scamming each other, and revealing dark web secrets along the way 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/","og_locale":"en_US","og_type":"article","og_title":"Cyber scammers are scamming each other, and revealing dark web secrets along the way 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-12-08T13:27:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber scammers are scamming each other, and revealing dark web secrets along the way","datePublished":"2022-12-08T13:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/"},"wordCount":701,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/","name":"Cyber scammers are scamming each other, and revealing dark web secrets along the way 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280","datePublished":"2022-12-08T13:27:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/fca1a1e59bc744ac70244b088bd699f160abdab5\/2022\/02\/16\/7b8a31ea-98e5-4b15-b69f-606567d1cd26\/getty-mysterious-hands-on-a-keyboard.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-scammers-are-scamming-each-other-and-revealing-dark-web-secrets-along-the-way\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber scammers are scamming each other, and revealing dark web secrets along the way"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49657"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49657\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}