Dark web statistics & trends for 2024 | Prey (2024)

The dark web is a part of the Internet you may not know about. After all, 8% of U.S. adults have never even heard of the dark web, and 23% have heard of it but don’t know what it is, according to a 2022 survey. The dark web is so dark that it allows you to view content that search engines haven't even indexed, and it can’t be reached on traditional web browsers . And you can only access it through a Tor browser.

So…who uses it?

The dark web is used by the media, the intelligence community, whistleblowers, and citizens seeking assurance that their Internet use won’t be restricted or monitored. However, as the name implies, this more secretive part of the web has a darker side, filled with threats and illegal activity.

In this blog post, we’ll examine some dark web statistics and trends that shed light on what really happens there. We’ll also explore the types of criminal activity it attracts and explain how to protect yourself and your data from breaches and other dark web attacks.

Top dark web statistics

Let’s look at some of the key stats and trends that illustrate what the dark web is today, including its rate of growth and in which countries much of its activity takes place.

  • The deep web and dark web comprise 96% of the Internet, although the dark web is believed to be a far smaller share than the deep web.
  • There were more than 2.5 million daily visitors to the dark web on average in 2023. However, that number was increasingly growing, with an average of 2.7 million daily users in April 2023.
  • Germany had the highest daily users of Tor in 2023, taking the top spot from the United States for the first time in years. The U.S. now ranks second, followed by Finland, India, and Russia.
  • Nearly 57% of the dark web is illegal as of 2020, with content related to violence, extremist platforms, illegal marketplaces, drugs and cybercrime forums.
  • The most lucrative illegal digital products available to buy on the dark web include crypto accounts, online banking, and e-wallets, as of April 2023.
  • The U.S. currently ranks number one when it comes to data breach cost, with an average of $9.44 million per breach.
  • Cybercriminals could purchase the details of a credit card with a $5,000 balance for just $110 as of April 2023.
  • DDoS and malware attacks are part of a thriving market on the dark web. A cybercriminal can buy 1,000 threat installs for $1,800.
  • Ransomware cryptocurrency-based crimes on the dark web saw a nearly $176 million increase in 2023 compared to 2022.
  • There was a 38% increase in global cyberattacks in 2022 compared to 2021.

Dark Web user demographics

By the very nature of the dark net, getting data on its users can be difficult. However, a 2019 survey from Cornell University revealed some interesting statistics:

  • 84.7% of dark web users identify as males, while only 9.4% identify as female.
  • The majority (23.5%) of users were between 36 and 45 years old, 11.8% between 18 and 25 years old, and 5.9% were between 46 and 55 years old.

The dark web is always evolving, and that goes for the types of users it attracts. Below are some of the nefarious characters found roaming the dark web hallways today, according to ID Agent.

  • Malicious employees dealing with information such as passwords.
  • Cybercrime gangs, such as ransomware groups, that recruit others to join their network.
  • Hacktivists releasing data from governments or organizations they morally or politically oppose.
  • Initial access brokers selling compromised network access.
  • Advanced Persistent Threat (APT) groups and Nation-State threat actors performing operations that harm other countries or finance their activities.

Dark web marketplaces

Recorded Future found 8,400 active sites on the dark web in 2019. There are thousands of products and services sold on dark web forums every day—here are some of the most popular items available:

  • Cryptocurrency verified accounts. These Bitcoin accounts are often used for money laundering and other illicit activities.
  • Credit card numbers. These are often sold in bulk at a discounted rate. Like traditional marketers, cybercriminals like to generate increased traffic and buzz by offering discounts. As of April 2023, cybercriminals have the opportunity to buy information for a credit card with a $5,000 balance for a mere $110.
  • Employee login information: These stolen credentials include company names, addresses, employee numbers, email addresses, compromised passwords, and phone numbers.
  • Zoom account and meeting details. These links are available to buy on auction and include meeting IDs, email addresses, passwords, names, and host keys.
  • Fake identities and passports. Criminals use these fake documents for identity theft and fraud.
  • Illegal Drugs. The dark web is known for its thriving drug market, where users can purchase a variety of illegal substances.

Some of the most well-known dark web marketplaces have been shut down, including Silk Road (closed in 2013), AlphaBay (taken down in 2017, although it reportedly resurfaced in 2022) and Hydra Market (shut down in 2022). Despite efforts from law enforcement agencies to shut down these illegal marketplaces, new ones continuously pop up on the dark web. As of early 2024, popular dark web marketplaces include InTheBox, Genesis Market, and 2Easy. The anonymity of the dark web makes it difficult for authorities to track down the owners and operators of these sites.

Deep-dive on dark web attacks

Hackers on the dark web use various advanced techniques to perform security breaches and compromise data.

Malware attacks

Malware is any software that is designed to harm or exploit a computer system. Dark web hackers often use malware such as keyloggers, ransomware, and trojan horses to access sensitive information and cause damage.

DDoS attacks

Distributed Denial of Service (DDoS) attacks overwhelm a target’s network or system with vast amounts of traffic, which makes them inaccessible to users. Dark web hackers often use botnets to carry out DDoS attacks, causing disruption and financial loss for their targets.

Social engineering

Hackers take advantage of human vulnerabilities to trick people into handing over their personal data or giving them unauthorized access to something they shouldn’t have access to. Social engineering dark web attack tactics include:

  • Phishing emails
  • Phone calls
  • Pretexting
  • Baiting
  • Social media messages

Credential-Based Attacks

Credential-based attacks are a form of cyber threat where attackers use stolen or forged credentials to gain unauthorized access to systems and data. These attacks are particularly dangerous as they can bypass many traditional security measures, allowing attackers to impersonate legitimate users and exploit internal systems.

Industries most vulnerable to dark web attacks

While all businesses and individuals can fall victim to a dark web attack, certain industries find themselves more vulnerable. According to a Cybersecurity Insiders report, the five industries most targeted by hackers (in no particular order) are:

  • Education and research
  • Finance and insurance
  • Healthcare and pharmaceuticals
  • Public administration
  • Retail

Schools and other educational institutions were the number-one most attacked market in 2022 according to Check Point Research, seeing a 43% increase compared to 2021. The same report found that the healthcare industry also saw a growing number of attacks in 2022, an 86% increase year over year.

Dark web statistics & trends for 2024 | Prey (1)


Dark web trend outlook for 2024

The dark web isn’t going anywhere anytime soon, and in order to protect yourself online, it’s important you become aware of what to expect. Today’s biggest cyber threats aren’t exactly the same as they were yesterday or will be tomorrow.

For now, let’s go back in time by exploring the evolution of the dark web before looking at predictions for 2024 and beyond.

Evolution of cybercrime

Another evolution in cybercrime is the motivation of the cybercriminal. While a threat actor doesn’t generally care about the type or size of the organization they target, their motivation generally, although not always, points to the victim. Understanding these motivations helps to plan effective cybersecurity strategies.

Hackers have evolved over time, which has made defending cybercrime a challenging task. It used to be that technological advancements were the main factor that motivated hackers.

Now that there are organizations that employ trained and certified cybersecurity experts to detect vulnerabilities and gaps, hackers have other motivations. The evolution of these motivations really goes hand-in-hand with the evolution of hacking, in general.

  • In the 1980s, people started to buy personal computers that connected through their phone networks. However, technology also helped hackers up their game, as they broke into networks and computers. A new motivation transpired when they realized they could monetize their skills.
  • In the 2000s, Microsoft started paying hackers to infiltrate Windows. This ethical hacking found vulnerabilities and fixes before more ill-motivated hackers came along and took advantage.
  • In the 2010s, hacking became even more lucrative with the rise of ransomware attacks. While ransomware was a problem throughout the decade, it really stepped up its game in 2019 when “big game hunting” was used in a big way. The term refers to ransomware gangs aiming high, targeting the likes of compare networks, as opposed to the individual.
  • Today, hackers use AI and machine learning technologies to expedite their cyberattacks. They constantly find new and sophisticated ways to exploit system weaknesses and steal valuable information.

As technology advances, so do the methods used by hackers to breach networks and steal sensitive information.

The future of the dark web

While dark web trends have undergone major evolutions over the years, cybercriminals have also evolved their tactics, and they aren’t done yet. In 2022, an HP Wolf Security report predicts the following threats for the future of the dark web:

  • Cybercriminals will perform more efficient attacks. We’ve already started to see this happen. Cybercrime has been broken down into repeatable, step-by-step actions, creating opportunities for increased efficiency and automation. The number of dark web hackers is only predicted to rise, as they could turn to AI to automate post-exploration actions, such as choosing targets from a victim’s contact book.
  • More targeted and professional intrusions. To get more out of intrusions, hackers will continue to use APT tactics, like establishing long-term access with networks and increasing the time spent on target reconnaissance.
  • Attacks could result in even more damage. As businesses integrate IoT and undergo digital transformation, attacks will likely use the resultant attack surfaces to their advantage. We may see more extortion attacks using the threat of data destruction in those sectors that rely on IoT devices.

Unfortunately, the dark web provides a platform for hackers to network and collaborate by inspiring one another and sharing tactics and data breaches. This can result in the development of more advanced attack methods in the future.

Dark web trend impact on businesses and individuals

With the increasing reliance on digital platforms for business operations, cybersecurity has become an integral part of any person’s or organization's strategy. The threat landscape is constantly evolving, making it essential for individuals and businesses to invest in certified cybersecurity practices to detect data breaches and vulnerabilities and gaps before malicious actors exploit them.

Business risks and vulnerabilities

While the dark web doesn’t directly affect the daily activities of most SMBs, the effects shouldn’t be ignored. Here are some of the biggest impacts that the dark web can have on SMBs.

  • Financial loss and data breaches. When sensitive information makes its way onto the dark web, it can result in substantial financial losses. Criminals can use this data to extort businesses, drain accounts, or commit fraud.
  • Reputational damage. A company’s data existing on the dark web can harm that company’s reputation, resulting in a reduction of customer trust and a loss of business.
  • Operational disruption. A cyberattack that results in a data leak can disrupt business operations, affecting services and internal processes.
  • Legal and compliance issues. SMBs in regulated industries could face compliance issues and legal fines if their customer data has been compromised.

Strategies for businesses to mitigate dark web attack risks

There are steps that businesses can take in order to fight back and protect their data from cyber threats. Here are some actions that can help you counter some of the dark web statistics seen in this post.

When it comes to a business or an individual, traditional methods of tracking the dark web can be inefficient and time-consuming. Fortunately, we live in an age where technology is more than capable of helping us out. Here are some of the tools and practices that businesses can use to avoid falling foul of cybercriminals on the dark web.

  • Dark Web Surveillance: Dark web monitoring tool is a vital solution in your cybersecurity arsenal. By continuously scanning the dark web for leaked or stolen credentials, organizations can identify breaches early. Upon detection of compromised credentials, companies can prompt users to create new, more secure passwords, significantly reducing the window of opportunity for cybercriminals to exploit stolen data.
  • Employee awareness and training. Having an informed staff is crucial to the defense against cybercrime. Training your employees on safe cyber practices, password hygiene, and phishing scams is essential.
  • Strong infrastructure. Businesses need to invest in secure VPNs, antivirus software, and firewalls to defend themselves against cyber threats.
  • Incident response planning. A plan for how to respond to a data breach can greatly reduce its effect.

Individual security protection

Whether you’re a business owner or not, you should look to protect yourself from cybercrime on the dark web. Here are some steps you can take to help prevent your personal information from being accessed and shared online.

  • Create strong passwords for your online accounts. Make sure to also choose a password unique to each account. That way, if a cybercriminal manages to steal one of your passwords, they won’t be able to access your other accounts. If you receive a notification that your data has been leaked, change your login details immediately.
  • Use password managers on your mobile devices and computers. A password manager can not only make it easier for you to track all of your different passwords but also make it harder for hackers to access your data.
  • Consider a dark web monitoring service. This can scan the dark web to locate your personal data and inform you if any has been found.

Don’t be the next dark web statistic: Protect yourself against cybercrime

If the above dark web statistics and trends have alarmed you in any way, that’s perfectly valid. But that doesn’t mean there isn’t something you can do about it. By following the tips and recommendations outlined in this blog post, you’ll be in a far better position than most to defend yourself against cybercrime on the dark web.

Also, make sure to remain informed of any updated recommendations to protect yourself against cybercrime on the dark web. That will help you remain alert to the most commonly used techniques used by hackers at any given time.

For added security, sign up for a free 14-day trial from Prey Project. Prey will help keep your digital assets and identity safely away from the dark web. The protection will apply to all your devices so you can browse and send communications without fear of your data being compromised. Take advantage of Prey’s no-risk, 14-day trial and give you and your business the protection it deserves.

Dark web statistics & trends for 2024 | Prey (2024)

FAQs

How to check dark web report google? ›

To start, open Google One, go to “Dark web report,” and tap Set Up > Start Monitoring. You'll then be able to choose exactly what information you'd like to keep an eye on, including your name, address, email, password, and phone number.

What are the statistics of the dark web? ›

Top dark web statistics

There were more than 2.5 million daily visitors to the dark web on average in 2023. However, that number was increasingly growing, with an average of 2.7 million daily users in April 2023.

What are the most common crimes on the dark web? ›

The sale of illegal drugs is the most common type of crime committed on the dark web, followed by counterfeit currency and financial fraud.

How to monitor the dark web? ›

You can set up a monitoring profile with a paid Google One membership. Sign up for Google One. You don't need a paid Google One membership to run a dark web report for the email address associated with your Google Account. Scan the dark web for your email address.

Is Google dark web report free? ›

You don't need a paid Google One membership to run a dark web report for the email address associated with your Google Account.

Can I check if my information is on the dark web? ›

Run a free Dark Web scan

This is a good place to start — however, free scanners only check for email addresses (and sometimes phone numbers). To see if your financial data, SSN, or IDs have been leaked, you need to sign up for a Dark Web monitoring service.

What is mostly on the dark web? ›

The type of content that has the most popularity on the dark web is illegal p*rnography—more specifically, child p*rnography.

How much crime is on the dark web? ›

Illicit activity on the dark web

In 2022, the total value received by darknet markets and fraud shops worldwide amounted to 1.5 billion U.S. dollars, down from 3.1 billion U.S. dollars in 2021. Furthermore, the share of illegal transactions in total cryptocurrency transactions worldwide in 2022 was 0.24 percent.

What is the dark web capable of? ›

The Dark Web is used by cybercriminals to buy and sell illegal goods and services, coordinate attacks, distribute malware and phishing kits, and share other prebuilt exploits. But, perhaps a big surprise to anyone thinking the Dark Web is just for criminal activity, it can also be leveraged for legitimate purposes.

What is the number 1 cyber crime? ›

Bulk phishing, smishing, and business e-mail compromise (BEC) are the most common types. In 2022, 85 percent of the surveyed worldwide organizations reported encountering bulk phishing attacks, while roughly three in four were targeted by smishing scams.

What are some fun facts about the dark web? ›

Over 30% of North Americans access the dark web regularly. An astonishing 25,927,476 passwords that belong to employees at Fortune 1000 companies were available readily in dark web markets and data dumps. About 65% of active criminal gangs rely on spear phishing powered by dark web data to launch attacks.

Which is the number 1 most common Internet crime? ›

9 Most Common Computer and Internet Cyber Crimes
  • Harassment. ...
  • Ransomware. ...
  • Prostitution. ...
  • Child p*rnography & Solicitation. ...
  • Intellectual Property Theft. ...
  • Account Hacking. ...
  • Drug Trafficking. ...
  • Credit Card Fraud.

Does Google monitor the dark web? ›

The only drawback of using Google's dark web monitoring is that it's not free — Google One plans start at $20 per year. But it can be shared with up to five other users, each able to set their own profile for dark web monitoring.

Can Experian really scan the dark web? ›

You can run a free dark web scan with Experian to see if your Social Security number, phone number or email is on the dark web.

Can I check if my email is on the dark web? ›

However, you can use a few tools to find out whether your email address has appeared on the dark web. For instance, you can use the NordPass Data Breach Scanner to monitor your email addresses and credit card details. Having your data exposed during a leak is a strong indication that it's present on the dark web.

How do I see Google reports? ›

Instructions
  1. Sign in to your Google Ads account.
  2. Click Campaigns. , and then Insights & reports.
  3. Click Report editor.
  4. Under "Predefined reports (dimensions)," select and open the report you'd like to see. To view the full list of predefined reports, select View all.

Where is the dark web report? ›

If you want to see if your data is safe from the dark web, you can follow these simple steps: – Go to one.google.com. – Under “Dark web report,” click Try now. – Click Run scan.

What to do if my SSN is found on the dark web? ›

If you think someone is using your Social Security number and creating credit problems for you, you should report it at IdentityTheft.gov, the Social Security Administration says. You'll go through the steps of putting a fraud alert on your credit reports, alerting the FTC, and possibly filing a police report.

Top Articles
Latest Posts
Article information

Author: Velia Krajcik

Last Updated:

Views: 5535

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Velia Krajcik

Birthday: 1996-07-27

Address: 520 Balistreri Mount, South Armand, OR 60528

Phone: +466880739437

Job: Future Retail Associate

Hobby: Polo, Scouting, Worldbuilding, Cosplaying, Photography, Rowing, Nordic skating

Introduction: My name is Velia Krajcik, I am a handsome, clean, lucky, gleaming, magnificent, proud, glorious person who loves writing and wants to share my knowledge and understanding with you.