Story image

617 million stolen records up for sale on dark web

13 Feb 2019

Approximately 617 million account details from 16 different websites are now for sale on the dark web, with some databases selling for the Bitcoin equivalent of $20,000.

The Dream Market cyber-souk is reportedly offering databases from websites including MyFitnessPal, Whitepages, Fotolog, Armor Games and BookMate, amongst others. UK media agency The Register reportedly viewed samples from the databases and confirmed that the stolen account details appear to be genuine. The account details include email addresses, passwords, names, personal details, and in some cases, their location. 

The passwords are also encrypted, which means they must be decrypted before they are used. Users’ financial information does not seem to be for sale in the databases, The Register claims. Security firm High-Tech Bridge’s CEO Ilia Kolochenko believes that the information for sale is probably a secondary offering of the breached databases. It’s likely somebody else has already purchased the stolen information.

“The first, thus exclusive and the most expensive sale, usually takes place in confidence and without notice to the breached party. Once multiple databases are grouped to be publicly offered, they are likely sold not for the first time,” says Kolochenko.

The Register says the number of accounts from the following websites are for sale on the dark web:

  • Dubsmash - 162 million accounts
  • MyFitnessPal - 151 million accounts
  • MyHeritage - 92 million accounts
  • ShareThis - 41 million accounts
  • HauteLook - 28 million accounts
  • Animoto - 25 million accounts
  • EyeEm - 22 million accounts
  • 8fit -20 million accounts
  • Whitepages - 18 million accounts
  • Fotolog -16 million accounts
  • 500px -15 million accounts
  • Armor Games -11 million accounts
  • BookMate - 8 million accounts
  • CoffeeMeetsBagel - 6 million accounts
  • Artsy - 1 million accounts
  • DataCamp - 700,000 accounts

“The biggest risk of targeted individual attacks against the victims, however, is probably already in the past: now the buyers will likely conduct large-scale phishing and malware campaigns without a high degree of sophistication,” predicts Kolochenko. 

“Nonetheless, the victims may still face password re-use attacks and therefore should be particularly cautious within the next few months.”

While most of the affected websites have acknowledged that they were breached, Kolochenko warns that others should act fast.

“Those websites that haven’t yet discovered the breaches themselves should immediately initiate a forensics procedure and talk to their legal advisors to coordinate disclosure imposed by the applicable law. Failure to do so may increase the damages sought by the victims and lead to supplementary monetary penalties by the authorities.” 

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.