š Welcome to the 105th issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Hereās an overview of whatās in this issue:
-
The tools you need to know
-
Strategies and limitations
-
Following data to the surface
-
ā¦and how to fight the monsters under the Internetās bed.
šŖ If you missed the last newsletter, hereās a link to catch up.
ā” Gathering OSINT from Live Traffic: Datasets and Cameras
šļø If you prefer to listen, hereās a link to the podcast instead.
Letās get started. ā¬ļø
Welcome (back) to the dark side. We have OSINT.
Although it looks dangerous, DARKInt itās perfectly safe if you know how – and if you read last weekās issue, you probably do. Without further introduction, letās go even deeper into Dark Web OSINT.
In Part Two, weāll cover:
-
The tools you need to know
-
Strategies and limitations
-
Following data to the surface
-
ā¦and how to fight the monsters under the Internetās bed.
Donāt forget your flashlight.
If the internet is an iceberg, it has three layers: the surface, deep, and dark web.
-
Surface Web: The normie āinternetā. Indexed by search engines like Google and Bing.
-
Deep Web: The āinvisibleā 90% of the web you donāt need a specific tool to access. Online banking, private networks, and corporate systems live here.
-
Dark Web: The unindexed 1-6% of the web, only accessible via specialised tools. Always anonymised, always encrypted.
What you find in this dark bottom layer – open-source or not – is dark web intelligence. So, think of Dark Web intelligence (or DARKINT) as OSINTās emo little brother. Got it? Good.
To access the Dark Web, specific tools are required. Hereās a conceptual run-down of the best tools for beginners curious about traversing the depths. Of course, this overview is intended for educational purposes only, rather than encouraging active exploration as soon as possible – itās best to think before you leap.
TOR is the most (in)famous of the bunch. Short for The Onion Router, TOR is too complex to unpack fully here. Whatās more, we already did that last week.
Basically, onion browsers work by routing your connection through multiple encrypted layers – a bit like an onion – so no single point can trace your activity. The Dark Webās sites then use .onion domains; āhidden services,ā where both user and host are obscured. Instead of connecting directly, both sides layer up encrypted links via a shared rendezvous point on the TOR network, so nobody knows anybody elseās true IP This creates the built-in anonymity which makes the Dark Web so popular, keeping everything⦠under wraps (sorry).
We know one of the most common forms of DARKInt comes in the form of the humble data breach. Public leak indexes are one of the most beginner-friendly entry points into DARKInt, as they point users to large collections of said breached data.
Unlike raw breach dumps (a.k.a. the actual compromised data) leak indexes are designed for search and discovery, and act as directories or lookup tools, rather than hosting any data directly. Theyāre finding where data exists, and how it connects across leaks. Although datasets are traded, reused or repackaged across multiple Dark Web platforms, indexes can often find specific data whether itās circulating across the Dark Web or in the wider web bloodstream beyond.
The usual caveats about breached data apply. Thereās always a compliance problem when handling potentially stolen data, so treat any data you find as if it were your own.
These arenāt the Dark Web Google. If TOR is your vehicle into the Dark Web, onion search engines are more like a slightly unreliable sat-nav; this Garmin wonāt get you there, but it might point you in the right direction. These tools donāt provide access to anything. Instead, they index and surface .onion sites, helping users discover hidden services they might not know about. Onion search engines:
Unlike TOR browsers (which actually connect you to sites) onion search engines sit a layer above like the onionās outer skin, acting as discovery tools rather than access tools. And because the Dark Web is so transient (sites appear, disappear, or hide deliberately), these engines are best thought of as more treasure hunt than Google search. The coverage on the aforementioned Garmin is patchy, unstable, and often outdated. Still, it works when it doesnāt drive you into a lake – or an active volcano.
-
Use the tools above (indexes, search engines) to identify breaches.
-
Extract identifiers (email, username, phone number) from DARKINT sources.
-
Pivot using emails.
-
Look for usernames.
-
Do the same for usernames – especially look for reuse across social media, forums, or gaming sites.
-
Look for variations, and cross-reference matches as in light-mode OSINT.
-
Pivot using phone numbers.
-
Correlate findings.
Lastly⦠Validate carefully.
-
Watch out for false positives, outdated, or manipulated data – on the Dark Web, these are all over the place
If these two guides have made the dark, dirty web sound all sunshine and rainbows, now is the time to crush your dreams. Thereās no unicorns skipping around down there. DARKInt has limitations, and plenty of them. Letās meet the monsters under the Internetās bed.
Imagine a world where everybody hates each other. Thatās kinda the Dark Web. DARKInt operates within an anonymised, adversarial ecosystem built to keep its infrastructure volatile, and access inconsistent. Elevated operational security risks are baked-in. Hidden services frequently appear and disappear, and interacting with them can expose investigators to threat just by virtue (or vice) of a click. Tread carefully.
Data quality is āhighly unreliableā to be polite. Breach dumps are often annoyingly duplicated, hopelessly outdated, trickily manipulated, or deliberately seeded with false facts. Financially motivated actors frequently distribute misleading datasets. At worst, you might end up involved in a particularly icky scam. At best, the overall signal-to-noise ratio can reach a hair-tearing level. Be patient.
So you have that āhighly unreliableā data. It might never become reliable. Attribution and validation are inherently limited on the Dark Web, where anonymisation layers and restricted visibility are the whole point. So much activity occurs behind closed doors – in closed networks or private exchanges – that datasets canāt always be corroborated or independently verified (outside of our dreams). Manage your expectations.
If you work recklessly in DARKInt, youāre playing psychological Russian roulette. You may encounter material that is disturbing, illegal, or just deeply distressing; content that stays with you long after youāve closed TOR. When people are anonymous, they showcase the worst things humanity can do to each other. Even if you do everything right, you can end up seeing something deeply wrong. Have caution.
Our journey through the Webās dark side is coming to an end. You should now know:
-
All DARKINT is OSINT, but not all OSINT is DARKINT
-
The tools beginners need to go web spelunking
-
How to bring dark data into the light
-
⦠and why the Dark Web isnāt where the unicorns live.
See you next issue, investigators!
š New CTF Challenge Live – Covert Communication
A new CTF challenge has been posted on our CTF website. This weekās challenge involves analyzing a covert communications channel used by a suspected intelligence operative and finding the name of the location.
Start competing in our Capture the Flag (CTF)
šŖ If you missed the last CTF, hereās a link to catch up.
Last weekās CTF challenge featured a challenge titled āThe Dark Web DBā required participants to investigate a suspected data breach involving Quick, where a threat actor allegedly published a customer database on the dark web and uncover key details about the publication.
To solve the challenge, we need:
-
Copy & paste the onion link into Wayback Machine.
-
Then we filter the results by date and select 06 March of 2026. We get a result for 06 March 2026 at 08:01:04.
-
We click on it, looking at the forum, on the right corner, we can see a post regarding a french and Belgian database.
-
It says that it was published 10 mins ago, we can also see the username of the threat actor who published it, which is: sarkstic.
-
Knowing that the forum was crawled at 08:01:04 and that the post says 10 mins ago, the post was made at 07:51:04.
ā Thatās it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.
By upgrading to paid, youāll get access to the following:
š All paid posts in the archive. Go back and see what youāve missed!
š If you donāt have a paid subscription already, donāt worry. Thereās a 7-day free trial. If you like what youāre reading, upgrade your subscription. If you canāt, I totally understand. Be on the lookout for promotions throughout the year.
šØ The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address.


