Why Dark Web Phishing is Different
Phishing on the surface web relies on urgency and sloppy grammar. Dark web phishing is fundamentally different — attackers build elaborate replicas targeting users who already practice caution and value OPSEC. They mimic trusted marketplaces pixel-for-pixel, create fake login portals for encrypted services, and establish entire ecosystems designed to capture credentials.
The Scammer's Playbook
Fake Mirror Links (Typosquatting)
The most common technical trick. Scammers register .onion addresses nearly identical to legitimate ones, hoping you won't notice a single character difference. Lowercase 'l' becomes '1', 'm' becomes 'rn'. Always manually compare every character against a known-good source.
Fake Community Support
On forums, "helpful" users reply with "here's the official new link" or DM "updated addresses from the admin." These are hooks. The most helpful-looking reply is often a bot pushing a scam link.
Fake Directories & Clone Sites
Scammers build entire directory sites listing "verified" links — except every link leads to a phishing clone. They also create pixel-perfect replicas of markets with identical login pages, FAQs, and visual design.
Red Flags - Your Phishing Detector
- URL anomalies — Changed characters, extra segments, or unusual formatting. Compare against verified directories character-by-character.
- No PGP/2FA/HTTPS — Legitimate operators encourage PGP encryption. No 2FA option or missing HTTPS is a clear warning sign.
- Fee requests — "Verify your account by sending 0.005 BTC" is always a scam. No legitimate service charges access fees.
- Visual imperfections — Blurry logos, misaligned text, broken links, layout inconsistencies compared to the authentic site.
- Impossible deals — Thousands of positive reviews on a day-old vendor? Flagship products at 90% discount? Pure bait.
- Time pressure — "Account deleted in 24 hours unless you verify HERE" — designed to panic you into clicking.
Prevention Strategies
- Disposable environments: Browse in a VM with burner emails. Download something dangerous? It's contained.
- Bookmark verified URLs: Use Tor Browser bookmarks for known-good .onion addresses. Never re-discover via third parties.
- Manual URL verification: Check every character of .onion addresses before login, every single time.
- Cross-reference sources: Verify links through Dread, official PGP canaries, and multiple independent directories.
- Report phishing sites: When discovered, report to directories and community forums to protect others.
Emergency Protocol (Clicked a Phishing Link?)
- Disconnect internet immediately
- Shut down VM and exit Tor Browser
- Change passwords for ALL accessed services using a separate, clean device
- Monitor accounts and linked crypto wallets for unusual activity
- Generate new PGP keys if compromised
Trusted Verification Resources
Use established directories with strong community trust as starting points — but always verify independently. Don't rely on any single source. Cross-reference with community forums, PGP-signed announcements, and multiple directory listings.
Never add browser extensions to Tor Browser. The Tor Project explicitly warns against this — extensions mess with privacy settings, create false confidence, and may be harmful themselves.