Special Issues

Which stolen personal data is sold in the dark web

2 Mins read

Some journalists of the British magazine The Register found a database containing over 600 million credentials in the dark web

Among the data stolen on some of the sites in question there were also the geolocation of the user, other personal details and the credentials of access to some social networks

As reported by the English online newspaper specializing in technology The Register, these days are on sale data for as many as 617 million accounts registered on various Internet sites. And they are all for sale for 20 thousand dollars to be paid in Bitcoin on the Dark Web.

There would be 16 apps that stole sensitive user data : Dubsmash, MyFitnessPal, MyHeritage, ShareThis, HauteLook, Animoto, EyeEm, 8fit, Whitepages, Fotolog, 500px, Armor Games, BookMate, Coffee Meets Bagels, Artsy and DataCamp.

That is in that part of the Internet that you will never find on Google, because it is protected by private networks that you can access only through special software and with credentials that are only released to ” trusted people “. The dark web is, above all, a huge market of illegal goods on which you can also find personal data stolen from hacked sites. But what stolen data is sold in the dark web ?

From which sites are the data taken?

In addition to the amount of data, they also leave their “variety” surprising. According to the British magazine, hackers have got their hands on the credentials of photo sharing portals, wellness platforms , gaming platforms and much more. Specifically, the data come from: Dubsmash (162 million), MyFitnessPal (151 million), MyHeritage (92 million), ShareThis (41 million), HauteLook (28 million), Animoto (25 million), EyeEm (22 million), 8fit (20 million), Whitepages (18 million), Fotolog (16 million), 500px (15 million), Armor Games (11 million), BookMate (8 million), CoffeeMeetsBagel (6 million), Artsy (1 million), and DataCamp (700,000).

What kind of data are for sale in the dark web?

The Register pretended to be a user interested in buying that data and was able to view some ” samples “: they contained above all real names and surnames, email address and encrypted password. Among the data stolen on some of the sites in question there were also the geolocation of the user, other personal details and the credentials of access to some social networks. As seen from the English site, however, there were no data related to bank accounts or credit cards. Otherwise those data would have had a much higher value.

Who buys data in the dark web?

But who buys the stolen data on the dark web? In reality, these data can be used by many categories of cyber-criminals: from classic spammers who would use them to storm advertising with so-called ” credential stuffers “, ie those who use your credentials to enter social profiles and collect other valuable personal information . Even those who try to implement scams with phishing may be interested in knowing your name, surname and e-mail address. Your personal interests collected by some of these sites could be used, together with name, surname and email, to create profiles for sale on the black market in order to send you unsolicited targeted advertising.

In this case, therefore, it is relatively low value data because to make them return it is necessary to rework them or use them to steal other information. Quite different are cases where hackers get data such as credit card numbers or online bank account credentials. In these cases, in fact, the stolen information has an immediate economic value and, therefore, are not always resold: sometimes they are used directly by those who stole them, to empty the bank account.

581 posts

About author
Professional writer with more than 7 years of experience. Joseph has worked as a content creator and editor on different web pages. He has been coordinator and content manager in various editorial teams. He also has extensive experience in SEO and digital marketing.
Related posts
Special IssuesTips and Tricks

How to protect your business against ongoing cybercrime

4 Mins read
Reinforcing the measures for the use of equipment is an obligation nowadays since companies carry out their activities remotely, and the data…
ApplicationSpecial IssuesTips and Tricks

3 easiest ways to turn any website into Android Apps [Guide]

5 Mins read
Installing too many apps on your phone not only slows it down, it also makes it less battery efficient. Many of the…
Special Issues

Prevent Android apps from using data in the background

2 Mins read
For someone who does not want applications to perform analysis and share their own data in the background, it may be good…
Power your team with InHype

We don't send spam mails to any of our subscriber. So, relax and subscribe our latest blogs.