DEV Community

Cover image for How Phishing Works on the Darknet (Technical Overview)
Tor BBB
Tor BBB

Posted on

How Phishing Works on the Darknet (Technical Overview)

Phishing on the darknet differs from traditional phishing in both execution and detection.

Attackers frequently clone onion services, deploy phishing mirrors, and distribute links through compromised forums or trusted-looking directories. Because Tor hides traditional signals like IP reputation, users must rely on behavioral and structural indicators instead.

Common technical traits include:

Identical HTML with modified form actions

Credential harvesting scripts hosted off-mirror

Redirect-based onion phishing flows

A technical and security-focused analysis of phishing on the darknet—including threat models and mitigation strategies—is outlined here:
https://torbbb.com/phishing-on-the-darknet/

Top comments (0)