sb-eu logo
Story image

617 million stolen records up for sale on dark web

13 Feb 2019

Approximately 617 million account details from 16 different websites are now for sale on the dark web, with some databases selling for the Bitcoin equivalent of $20,000.

The Dream Market cyber-souk is reportedly offering databases from websites including MyFitnessPal, Whitepages, Fotolog, Armor Games and BookMate, amongst others. UK media agency The Register reportedly viewed samples from the databases and confirmed that the stolen account details appear to be genuine. The account details include email addresses, passwords, names, personal details, and in some cases, their location. 

The passwords are also encrypted, which means they must be decrypted before they are used. Users’ financial information does not seem to be for sale in the databases, The Register claims. Security firm High-Tech Bridge’s CEO Ilia Kolochenko believes that the information for sale is probably a secondary offering of the breached databases. It’s likely somebody else has already purchased the stolen information.

“The first, thus exclusive and the most expensive sale, usually takes place in confidence and without notice to the breached party. Once multiple databases are grouped to be publicly offered, they are likely sold not for the first time,” says Kolochenko.

The Register says the number of accounts from the following websites are for sale on the dark web:

  • Dubsmash - 162 million accounts
  • MyFitnessPal - 151 million accounts
  • MyHeritage - 92 million accounts
  • ShareThis - 41 million accounts
  • HauteLook - 28 million accounts
  • Animoto - 25 million accounts
  • EyeEm - 22 million accounts
  • 8fit -20 million accounts
  • Whitepages - 18 million accounts
  • Fotolog -16 million accounts
  • 500px -15 million accounts
  • Armor Games -11 million accounts
  • BookMate - 8 million accounts
  • CoffeeMeetsBagel - 6 million accounts
  • Artsy - 1 million accounts
  • DataCamp - 700,000 accounts

“The biggest risk of targeted individual attacks against the victims, however, is probably already in the past: now the buyers will likely conduct large-scale phishing and malware campaigns without a high degree of sophistication,” predicts Kolochenko. 

“Nonetheless, the victims may still face password re-use attacks and therefore should be particularly cautious within the next few months.”

While most of the affected websites have acknowledged that they were breached, Kolochenko warns that others should act fast.

“Those websites that haven’t yet discovered the breaches themselves should immediately initiate a forensics procedure and talk to their legal advisors to coordinate disclosure imposed by the applicable law. Failure to do so may increase the damages sought by the victims and lead to supplementary monetary penalties by the authorities.” 

Story image
Trend Micro integrates with AWS Network Firewall
As a Launch Partner, Trend Micro has integrated managed threat intelligence feeds from its cloud security solution to enable superior protection in line with this new AWS managed firewall service.More
Story image
Video: 10 Minute IT Jams - SonicWall VP on the benefits of Boundless Cybersecurity
Today's interviewee will discuss the ins and outs of the company's Boundless Cybersecurity solution and how it can help APAC organisations adjust to the new normal, as well as explaining the 'cybersecurity business gap'.More
Story image
Video: 10 Minute IT Jams - Vectra AI exec discusses cybersecurity for Office 365
In Techday's second IT Jam with Vectra AI, we speak again with its head of security engineering Chris Fisher, who discusses the organisational impact of security breaches within Microsoft O365, why these attacks are on the rise, and what steps organisations should take to protect employees from attacks.More
Story image
40% of free VPN apps found to leak data
81.4 million users who downloaded free VPNs could be putting themselves at risk.More
Story image
Rising threat of data breaches among enterprises drives growth in network security revenue
"Key factors leading to the growth of network security market revenue in the Asia Pacific region includes instances of ransomware attacks, targeted attacks and phishing."More
Story image
Zerto launches security solutions for containerised applications
The company has launched its beta program of Zerto for Kubernetes (Z4K), an extension of its Zerto Platform, to support next-generation, cloud native applications.More