Tuesday, March 4, 2025
HomeComputer Security620 Million Online Accounts Data Stolen from 16 Hacked websites - Available...

620 Million Online Accounts Data Stolen from 16 Hacked websites – Available in Dark Web for Sale

Published on

SIEM as a Service

Follow Us on Google News

A new shocking report revealed that almost 620 million online account data from 20 famous websites currently hackers selling it in dark web for less than $20,000 in Bitcoin.

Selling data contains account holder names, email addresses, and passwords. These passwords are hashed and some of the other information such as location, personal details, and social media authentication tokens.

Stolen data from following websites are combined in this 620 million online accounts and the register confirmed this all data was completely legit.

1.Dubsmash (162 million)
2. MyHeritage (92 million)
3. MyFitnessPal (151 million)
4. ShareThis (41 million)
5. HauteLook (28 million)
6. Animoto (25 million)
7. EyeEm (22 million)
8. 8fit (20 million)
9. Whitepages (18 million
10. Fotolog (16 million)
11. 500px (15 million)
12. Armor Games (11 million)
13. BookMate (8 million)
14. CoffeeMeetsBagel (6 million)
15. Artsy (1 million)
16. DataCamp (700,000).

All these Online Accounts records are stored in multi-gigabyte databases but there is no bank related data such as cards, bank account number are listed in this giant database.

Also Read : Secrets of Dark Web – How to Access Dark Web Safely

These data currently selling on Dark web market place and the analysts believes that the databases can be purchased from the Dream Market.

Since the database contains the huge account details, the selling data targeted to the potential buyers such as, spammers, password stealers and credentials in this data based used to perform brute force attacks.

According to the theregister, All of the databases are right now being touted separately by one hacker, who says he or she typically exploited security vulnerabilities within web apps to gain remote-code execution and then extract user account data. The records were swiped mostly during 2018, we’re told, and went on sale this week. report,”

Some of the above-listed websites such as MyHeritage, MyFitnessPal has been already hacked and the data were stolen by the cybercriminals and now all those data has listed here.

A spokesperson for MyHeritage confirms that the data listed in this leak contains their data which was stolen from their server during the period when they suffering the massive data breach in mid of the last year.

“Last week, half a dozen data were listed on Dream Market by the seller: when we spotted them, we alerted Dubsmash, Animoto, EyeEm, 8fit, Fotolog, and 500px that their account data was potentially being touted on the dark web.” Register said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

A Largest Dark Web Marketplace “Dream Market” Admin & Drug Dealer Sentenced 20 Years in Prison

Dark Web Users Fear that Dream Market Also TakeOver by Police

Largest Dark Web Marketplace Black Hand Shut Down By Authorities



Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...