Darknet Data Leaks: Types and Trends

Darknet Data Leaks: Types and Trends

Let’s face it: data leaks have become so common these days that we’re hardly surprised anymore. Every day, we see notifications about someone’s data being compromised, stored on an open server, and so on. The darknet has become a repository for all stolen data, as buyers for this information are found within the dark web. Not long ago, a cybersecurity company called Terbium Labs released a study analyzing the causes and consequences of personal data ending up on the darknet. You can find their research here.

So, what’s going on with data leaks and the darknet? Let’s break it down.

1. Database Dumps

Who hasn’t been hacked at least once? There are countless stolen accounts available in database dumps from all over the internet—ranging from medical organizations and financial institutions to dating sites and online forums. (Note: Remember the massive Mail.ru email hack?) These dumps are everywhere on the darknet. Have you checked if you’ve been hacked?

2. Doxxing

Doxxing is the process of searching for all kinds of information about a person that’s publicly available: analyzing social networks, dating sites, and various popular services. The goal is usually to find compromising material on the target. Doxxing services can also be ordered on the darknet.

Note: In the Russian darknet and Telegram, there’s an even more interesting service called “probiv.” This involves access to certain closed databases not used in regular doxxing, making it more effective.

3. Shops Selling Fake and Real Documents

Forgeries, forgeries, forgeries. Anything you want: passports, driver’s licenses, social security cards, ID cards—you can buy it all on well-known darknet marketplaces. It’s important to note that it’s not just fakes being sold; for example, real passport scans are sold in bulk.

Where do real documents come from? For example, a municipal employee with access to all residents’ passport scans might decide to sell them. In the U.S., Texas state authorities have even been known to sell residents’ data.

4. Shops Selling Bank Card User Data

Of course, the rise of skimming and carding has created a demand for credit and debit card user data. Carding forums are popping up everywhere. Think about why that is.

Note: Recently, a member of our team experienced about 140 attacks on their card. In the end, 50 EUR was stolen. It turned out they had entered their card details on a very convincing phishing site a while back.

5. Fake Tax Returns

This one’s a bit of a joke, but it’s real. In the international darknet, there’s a market for fake tax returns. Hiding your income? Someone will help you! However, there’s a good chance it’s a scam, so we don’t recommend trying it.

6. Guides for Opening Accounts Using Stolen Data

This is as old as time. For example, by buying a couple of passport scans, you can easily create a QIWI or Yandex.Money wallet. Instructions for creating verified wallets using stolen data are all over onion forums, so passport data is definitely trending.

7. Scams and Fakes

There are various fake marketplaces. For example, a fake version of Hydra (a well-known darknet market) can be used to steal wallet data and funds. Another example is fake exchanges that steal payment data, money, and sometimes even passport data—though only the gullible fall for that.

8. Major Company Failures

For example, the recent Facebook fail and the Cambridge Analytica scandal that made headlines everywhere. Another example is VKontakte, where it was possible to access the phone number linked to any account. Yet another is the recent failure of the MEGA cloud storage service.

9. Source Code Dumps

Another favorite activity of disgruntled former programmers or successful hackers looking to make money or prove a point is dumping a project’s source code onto the dark web. This kind of information can be worth millions of dollars.

As you can see, there are plenty of ways for data to end up on the darknet, and no one is completely safe. All we can do is periodically check if our data has appeared in dumps or on various underground forums. And, of course, be vigilant: about 70% of data is stolen through phishing.

Leave a Reply