Science
Cybercriminals Target Business Insiders on Dark Web for Recruitment
Cybercriminals are increasingly using the dark web to recruit insiders from various organizations to facilitate malicious activities. This trend includes both public recruitment posts and discreet approaches via platforms like LinkedIn. By enlisting employees with access to sensitive company resources, these criminals can steal confidential data or launch devastating cyberattacks.
Recruitment Tactics and Real-World Examples
Research from NordStellar highlights a rise in dark web posts seeking employees from specific companies, particularly targeting those working in social media and cryptocurrency sectors. Over the past year, the NordStellar team identified 25 unique posts aimed at recruiting insiders. In particular, an incident involving the cryptocurrency exchange platform Coinbase in 2025 exemplifies the risks. Cybercriminals reportedly bribed employees to leak user information, highlighting how recruitment efforts can lead to serious breaches.
According to Vakaris Noreika, a cybersecurity expert at NordStellar, some cybercriminals are open about their recruitment methods, while others prefer to operate under the radar. “Employees can grant cybercriminals access to critical data, such as personal customer information and confidential business agreements,” Noreika explains. This type of data can be exploited for various malicious purposes, including launching ransomware attacks or executing sophisticated phishing scams.
Insider threats often remain undetected for extended periods. Employees are trusted members of the organization, which can make it difficult for security teams to identify any suspicious behavior. Unlike external threats, insiders may not trigger typical security alerts, such as unusual login attempts or data transfers. “Insiders are familiar with the organization’s internal security policies and weaknesses, allowing them to adjust their actions to avoid suspicion,” Noreika adds.
Strategies for Safeguarding Against Insider Threats
To mitigate the risks posed by insider threats, organizations must implement robust cybersecurity measures. Noreika emphasizes that maintaining high observability into system and data usage is essential. Any unexpected system behavior or access patterns should be flagged and investigated thoroughly. “Patterns of unusual behavior are the first indicator that the user might be an insider,” he states. Security teams need to monitor employees who frequently access sensitive information to ensure they have the appropriate authorization.
Another critical aspect is developing an incident recovery plan to minimize the fallout from a cyberattack instigated by insiders. This plan should encompass incident detection and outline the necessary steps to contain the threat and mitigate damage effectively.
In related news, Google has announced plans to discontinue its dark web monitoring tool, the Dark Web Report, which scanned for users’ exposed personal information. As of January 15, 2026, scans for new dark web breaches will cease, and by February 16, 2026, the report will no longer be available, with all related data set for deletion. Google aims to shift its focus toward tools that provide clearer, actionable steps for customers to protect their online information, although no new cybersecurity tools have been announced yet.
The evolving landscape of cyber threats underscores the need for organizations to remain vigilant. With the dark web becoming a recruitment ground for malicious actors, the importance of robust cybersecurity strategies has never been clearer.
-
Science8 months agoToyoake City Proposes Daily Two-Hour Smartphone Use Limit
-
Top Stories8 months agoPedestrian Fatally Injured in Esquimalt Collision on August 14
-
Technology8 months agoDark Adventure Game “Bye Sweet Carole” Set for October Release
-
Health8 months agoB.C. Review Reveals Urgent Need for Rare-Disease Drug Reforms
-
Technology8 months agoKonami Revives Iconic Metal Gear Solid Delta Ahead of Release
-
World8 months agoJimmy Lai’s Defense Challenges Charges Under National Security Law
-
Lifestyle8 months agoVictoria’s Pop-Up Shop Shines Light on B.C.’s Wolf Cull
-
Technology8 months agoSnapmaker U1 Color 3D Printer Redefines Speed and Sustainability
-
Technology8 months agoApple Expands Self-Service Repair Program to Canada
-
Technology8 months agoAION Folding Knife: Redefining EDC Design with Premium Materials
-
Technology8 months agoSolve Today’s Wordle Challenge: Hints and Answer for August 19
-
Business8 months agoGordon Murray Automotive Unveils S1 LM and Le Mans GTR at Monterey
