Dark web marketplace bites the dust after colossal DDoS attack

(Image credit: Archive)

One of the world’s largest dark web marketplaces for all things cannabis has been permanently shut down after a major distributed denial of service (DDoS) attack kept the site offline for a prolonged period of time.

In an official announcement, the operators of the Cannazon marketplace said the DDoS attack wasn’t the reason for the shutdown, but it presented an opportunity to close the website down, as was always the plan.

“No market will be here forever,” the announcement reads. “We are officially retiring. The massive DDoS attack was a very good chance to lower the number of orders and we decided to keep the market partially offline afterwards. This is the reason why the market was not reachable and not fully functional in the last days. By this, we could ensure that the number of orders was minimized and all paid orders were shipped.”

Cannabis marketplace

The site’s poor performance in its final moments led to the community being abuzz with the talks of exit scamming. Cannazon’s operators addressed this issue in the announcement as well, saying all sellers have been accounted for (or will be in the coming days).

“All open orders have been finalized now, disputes have been settled and refunded eventually. All vendors are able to withdraw their money. If your most recent order is delayed, you can still contact your vendor on the market regarding this.” 

Those who failed to get all of their signed Bitcoin multisig transactions should look out for an encrypted message posted on Dread later in the week, the operators said. 

Cannabis is still illegal in most parts of the world, and Cannazon’s operators served only non-US customers. Users that wanted to purchase cannabis-related products were required to register an account first, and were able to pay for the goods either in Bitcoin or Monero cryptocurrencies.

When a major dark web marketplace shuts down, new entrants often emerge as a replacement. Some malicious actors try to take advantage of this power vacuum, creating fake websites that only phish for data and distribute malware

Via Bleeping Computer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.