DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Too Cheap, Too Convenient: Replicas Offering Billions of User Records

Posted on December 6, 2020 by Dissent

Researchers at GDI Foundation recently took a look at sites where you can find or buy records with users’ login credentials.  The researchers validated the accuracy of some the records by contacting individuals whose details they found on some sites.

The risk of such sites is obvious — criminals can cheaply buy data that they can use for all kinds of attacks.  In some cases, the passwords in the database are working passwords because the users never knew that they had been compromised or they reused them across sites.

GDI’s researchers, led by Sanyam J., looked at four sites that they describe and discuss in their report: Weleakinfo[.]to, Breachdirectory[.]tk, Ghostproject[.]fr, and Hackinstatgxl3zk[.]onion


CAUTION:  With respect to the breachdirectory.tk site, the researchers note:

as of today, whoever visits this website, please be careful the website is malicious and leads to several redirects and open unwanted tabs, and hangs your system.


Why did the researchers do all this research?  Sanyam explains:

The issue is even after the weleakinfo seize and other websites of similar type which are seized, hackers are making more copies of such websites and we don’t care about it until this data is put on sale on some hacker forum on the dark web and that is when one attention goes. I want to bring all the people as well as law enforcement authorities’ attention regarding such websites so that rapid actions are taken on such websites.

You can read Sanyam’s report on Medium.

I have no doubt that law enforcement already knows about all these sites. And I’m not sure what we, the public, can do even if we “care harder.” But he’s right in that this situation puts people at more risk and something needs to be done — or tried.

In the meantime, remember that just because you may not find your email address or password on a site like HaveIBeenPwned, it doesn’t mean your credentials aren’t up for sale and available on any of a number of sites or “combo lists” that circulate on forums.

 


Related:

  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Scenes from a "No Kings" Protest, 10-18-25
  • No Kings. Not Today. Not Ever.
  • An arrested man's lawyer claims his client can't be ShinyHunters' leader. His argument wasn't persuasive.
Category: Commentaries and Analyses

Post navigation

← Police arrest two in data theft cyberattack on Leonardo defense corp
Firm that built NHS Nightingale Hospital hit by cyber attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.