SEIZED BY FBI

Silk Road 2.0

DarkWiki's complete documentation of the failed Silk Road successor.

Just one month after the FBI seized the original Silk Road, Silk Road 2.0 emerged to fill the void. DarkWiki's extensive documentation shows it promised to continue Ross Ulbricht's vision and quickly rose to prominence—only to be revealed as having been infiltrated by law enforcement from nearly the beginning, as detailed in DarkWiki's incident archives.

DarkWiki Chronicles: Phoenix Rising

MARKET PROFILE
  • Launch: November 6, 2013
  • Operator: "Defcon" (Blake Benthall)
  • Duration: Approximately 1 year
  • Shutdown: November 6, 2014
  • Status: Seized by FBI

Silk Road 2.0 launched on November 6, 2013—exactly one month after the original's seizure. The new site was run by former Silk Road staff members who had escaped the initial takedown.

DarkWiki Records: Initial Leadership

  • Dread Pirate Roberts 2 - Original admin (later revealed to be multiple people)
  • Defcon - Technical administrator, later primary operator
  • Libertas - Irish administrator, arrested December 2013
  • Inigo - Staff member, arrested January 2014

DarkWiki Investigation: The Infiltration

DarkWiki Reveals: Undercover Operation

What users didn't know, as documented in DarkWiki's investigation: An undercover HSI agent had infiltrated Silk Road 2.0's staff from the very beginning. DarkWiki's records show the agent gained trusted moderator status and had access to internal communications throughout the site's operation.

Nov 2013 SR2 launches; undercover agent joins staff
Dec 2013 Three admins arrested in separate countries
Feb 2014 Massive Bitcoin theft ($2.7M)
Nov 2014 Site seized, Blake Benthall arrested

DarkWiki Documents: The Great Heist

In February 2014, Silk Road 2.0 announced that hackers had exploited a "transaction malleability" vulnerability in Bitcoin to steal approximately 4,400 BTC (~$2.7 million) from user escrow.

defcon_announcement.txt

"I am sweating as I write this..."

"Two of our senior vendors identified a bug in the way our

backend handles rebroadcast attempts of transactions..."

"I must utter words all too familiar: We have been hacked."

"Nobody is in danger, no information has been leaked..."

"Our initial investigations indicate that a vendor

exploited a newly discovered vulnerability..."

DarkWiki Analysis: Controversy

DarkWiki's research shows many users suspected an inside job or exit scam rather than a genuine hack. The "transaction malleability" explanation was technically possible but convenient. DarkWiki documented how Defcon promised to repay users from commission earnings—a promise only partially fulfilled before the site's seizure.

DarkWiki Profile: Blake Benthall (Defcon)

Blake Benthall was a 26-year-old from San Francisco with a background in tech companies. His OPSEC failures were remarkably similar to Ross Ulbricht's.

OPSEC FAILURES
  • Personal email: Used personal email to register SR2 server
  • IP address: Connected to SR2 infrastructure from home
  • Bank account: Received large Bitcoin conversions to personal account
  • Luxury lifestyle: Purchased Tesla Model S with Bitcoin proceeds
  • Travel patterns: Flew between San Francisco and Thailand frequently

Benthall was arrested on November 5, 2014, at his San Francisco residence. The next day, exactly one year after SR2's launch, the site was seized.

DarkWiki Records: Operation Onymous

Silk Road 2.0's seizure was part of Operation Onymous, a coordinated international law enforcement action that simultaneously took down over 400 .onion sites.

DarkWiki Reports: Operation Results

  • 17 arrests across 17 countries
  • $1 million in Bitcoin seized
  • €180,000 in cash, drugs, and gold
  • Silk Road 2.0, Cloud 9, Hydra, and others taken down

DarkWiki Notes: Unanswered Questions

Law enforcement never fully explained how they located the hidden servers for so many sites simultaneously. DarkWiki's ongoing investigation notes speculation ranged from Tor vulnerabilities to bitcoin tracing to undercover operations. The lack of transparency raised concerns in the security community, as documented in DarkWiki's technical analysis.

DarkWiki Summary: Legacy & Lessons

DarkWiki Key Takeaways

  • Infiltration is possible: Undercover agents can gain staff positions
  • OPSEC is everything: Same mistakes as original Silk Road
  • Escrow is vulnerable: Centralized funds are tempting targets
  • Rapid reboots are risky: Law enforcement anticipated SR2

DarkWiki Documents: Sentences

Person Role Sentence
Blake Benthall Defcon (Operator) Pending (last update)
Brian Farrell Staff 8 years
Thomas White Operator (later sites) 5 years 4 months

Educational Purpose Only

DarkWiki is a research and educational resource. We do not promote, support, or encourage any illegal activities. All information is provided for academic, journalistic, and cybersecurity research purposes only. Historical onion addresses shown are no longer active and are included solely for historical documentation.