// security & fraud prevention

Anti-Phishing Guide — Protecting Yourself from Fake Darknet Markets

Phishing attacks targeting darknet market users are sophisticated, prevalent, and financially devastating. This comprehensive guide explains how attackers operate, how to verify legitimate access, and the tools and behaviors that prevent credential theft.

⚠ You Are Under Active Attack

Attackers are actively creating fake darknet market mirrors right now. These sites are often indistinguishable from the real market by visual inspection alone. The only reliable verification method is PGP signature verification. Never skip this step.

How Darknet Market Phishing Works

The Anatomy of a Phishing Attack

A darknet market phishing attack typically follows a structured playbook: (1) The attacker creates an exact visual clone of the target market, (2) registers an .onion address that is visually similar to the legitimate address (differing by one or two characters), (3) distributes this address through high-traffic community channels, and (4) waits for victims to log in.

When a victim enters credentials on a phishing site, the attacker captures the username and password. They immediately log into the real market using these credentials, drain any deposited cryptocurrency balance, and may change the victim's PGP key and email address to lock them out permanently.

The entire theft process typically takes under 60 seconds from credential capture to fund drain — before the victim even realizes something is wrong.

Distribution Channels

Phishing links are distributed through:

  • Telegram groups claiming to be official market announcements
  • Reddit threads with fake "updated mirror" posts
  • Forum posts on darknet community forums with fabricated reputation
  • Clearnet search results — attackers optimize fake sites for Tor-to-clearnet redirect queries
  • Pastebin and similar sites — fake "official" link lists
  • Direct messages to market accounts from compromised vendor accounts

Technical Sophistication

Modern phishing sites for darknet markets are highly sophisticated:

  • Pixel-perfect HTML/CSS copies of the real interface
  • Functional search and browsing — listing data is scraped from the real market
  • Fake canary statements (unsigned or signed with different key)
  • Fake "PGP verification" pages that ask you to verify an attacker-controlled key
  • SSL certificates for .onion addresses (not a trust indicator)
  • Real-time credential replay attacks that pass 2FA if the attacker is fast enough
1

Attacker Creates Clone Site

Pixel-perfect copy of the real market with similar .onion address

2

Distributes Fake Link

Posts to forums, Telegram, Reddit as "updated mirror"

3

Victim Enters Credentials

Attacker captures username and password instantly

4

Attacker Logs into Real Market

Drains wallet balance in under 60 seconds

5

Account Locked

Changes email and PGP key to permanently lock out victim

How to Protect Yourself

🔑

PGP Signature Verification (Primary Defense)

The market's PGP key is the only unforgeable authentication mechanism. Every verified address is published alongside a PGP signature from the market's master key. Import the key, verify the signature, and confirm the key fingerprint matches exactly. This process takes 2 minutes and cannot be faked by attackers who don't possess the private key.

📌

Bookmarking Verified Links

Once you have verified a legitimate .onion address through PGP, bookmark it in Tor Browser's bookmark manager. Use this bookmark for all future access. Never manually type an .onion address — character-by-character verification is error-prone and unnecessary if a verified bookmark exists.

🛡️

Tor Browser Security Level

Set Security Level to "Safest." This disables JavaScript, which is required for many phishing attack techniques including automated credential replay attacks, real-time keylogging, and WebRTC-based IP leaks. JavaScript-free phishing sites are significantly less dangerous as they cannot execute attack code.

🔒

Two-Factor Authentication

Enable PGP-based 2FA on your market account. This means any login requires decrypting a challenge encrypted to your PGP public key — an attacker who has only your password cannot complete login without also having your private PGP key. This is the single most effective individual account protection measure.

🚫

Distrust All External Sources

Treat every link received from any external source — Telegram, Reddit, forums, direct messages, clearnet sites — as potentially phishing until PGP-verified. The only trustworthy source of a legitimate .onion address is a PGP-signed mirror list verified against the market's master key.

👁️

Visual URL Inspection

V3 .onion addresses are 56 characters long. After verifying via PGP, memorize the first and last 8 characters of legitimate addresses. Phishing addresses often use 'l' vs '1', '0' vs 'o', or substitute similar-looking characters. A character-by-character check of saved addresses against what's in your browser bar is a secondary defense layer.

Recognize Phishing Attempts

Signs You May Be on a Phishing Site

  • The site works with JavaScript enabled (real market is JS-free)
  • Canary statement is unsigned or dated more than 35 days ago
  • PGP key fingerprint doesn't match your saved verified fingerprint
  • You got the link from Telegram, Discord, Reddit, or a forum
  • The site asks for phone number, email verification, or extra confirmation
  • Page loads unusually fast (no Tor hidden service overhead)
  • Unusual captcha types not present on the legitimate site
  • SSL certificate is shown (legitimate .onion sites don't need SSL)

Social Engineering Tactics

  • "Official" market announcements via Telegram claiming new link
  • Urgency tactics — "Market going down, use backup link NOW"
  • Fake staff accounts in community forums promoting links
  • Compromised vendor accounts sending phishing links to past customers
  • SEO-optimized clearnet sites ranking for darknet market search queries
  • Link obtained from PGP-verified official source only
  • PGP signature verified against master key fingerprint
  • Tor Browser Security Level set to Safest
  • JavaScript is disabled in browser
  • Canary statement current and correctly signed
  • PGP-based 2FA enabled on account
  • Strong, unique password not used elsewhere
  • Using bookmarked link, not typing or copying
  • Not on shared or public device
1

Act Immediately

Go to the real market via verified link immediately

2

Change Password

Change password immediately if account is still accessible

3

Withdraw Funds

Transfer any remaining wallet balance to a fresh XMR address

4

Report to Market

Report the phishing site to market staff via verified contact