Login Register

The 2easy Marketplace Is Becoming a Significant Player on the Dark Web.

By Dr.Dang March 22, 2022, 7:46 p.m.
The 2easy Marketplace Is Becoming a Significant Player on the Dark Web.

The 2easy marketplace is growing and is yet to become the next big thing on the dark web. The site has become a major participant in selling stolen data, also known as logos acquired from the more than 600,000 machines related to information stealing software.

Since its inception in 2018, 2easy has had tremendous growth. It's only last year that it only sold data from 28,000 infected devices and was considered a tiny player. This year however, many have been surprised and 2easy is not the tiny player that they despised a year ago.

So what are logos

Well, these are  archives of data taken from malware-infected web browsers or systems. The most crucial feature of logos is that they often contain account credentials, cookies, and stored credit cards.

According to some research carried out by experts at KELA, the market’s rapid growth may be happening due to the market’s platform development and quality of the offers. KELA is an Israeli dark web intelligence firm. Quality of the offer specifically has resulted in positive feedback from the criminal community.

The ‘2easy’ Marketplace

Europol's tech partner BleepingComputer reports that 2easy is a totally automated market. So what does that mean in a nutshell? Well, this simply implies that anybody can open an account. After opening an account, you can go as far as depositing money into your wallets and make transactions without involving the vendors directly.

Logs are available for as low as $5 per item. So this is almost cheaper than the normal pricing. No wonder people go this direction. Furthermore, based on actor feedback analysis from several dark web forums, there's something unique about the site. 2easy logs routinely give genuine credentials that grant network access to a wide range of companies.

Far from being affordable and valid, 2easy’s GUI is both user-friendly and strong. The marketplace doesn't have many restrictions. It even allows actors to perform a variety of functions on the site. Ranging from viewing all URLs to which infected machines logged in to searching URLs of interest. It allows browsing through a list of infected machines from which credentials were stolen. Again, you can check the seller’s rating and review tags assigned by sellers. It usually includes the date when the machine was infected and sometimes additional notes from the seller, and acquiring credentials.

Do you find this content interesting?
This is just a MIRROR ! Find us via our Main TOR domain
And Let us know by leaving a comment and a rating.

Also, don't forget to follow our Official Telegram Channel to stay informed and safe by Reading  NOIRdotNEWS


Please visit our onion version to comment.