Thursday, February 13, 2025
HomeCyber AttackDark Web Hosting Provider Got Hacked, 6,500+ Sites Including Root Account Deleted...

Dark Web Hosting Provider Got Hacked, 6,500+ Sites Including Root Account Deleted From Server

Published on

SIEM as a Service

Follow Us on Google News

Hackers compromised leading dark web hosting provider Daniel’s hosting and deleted all the hosting account from the server including the root user account.

According to Daniel Winzen analysis on November 15th the hosting server got hacked, hackers gained access to the server by using a PHP zero-day exploit that leaked before a day the server’s got compromised.

Hackers logged into the dark web hosting server through phpmyadmin and managed to delete all the accounts. More 6500 websites hosted on the dark web platform got deleted. Winzen says there is no possible way to recover the data from the breach.

He said ZDNet, “I would deem it as unlikely to have been the actual point of entry as the configuration files with database access details were read-only for the appropriate users and commands run by this vulnerability shouldn’t have had the necessary permissions.”

dark web hosting

The Dark Web is defined as “the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser: part of the deep web.

“Unfortunately, it is not possible to find the root cause by log analysis as on 14th at 5:33 the database had already been accessed with this user and it is unknown for how long the hackers may have had access to the database due to rotating logs frequently,” Winzen blog post reads.

The source code of Daniel’s dark web hosting platform has been available on GitHub which may facilitate the hackers to review the source code and to exploit the vulnerability.

Winzen said that he will re-enable the server once the vulnerability has been fixed, most likely the server will back up starting this December.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Hackers are Selling Social Media Logins & Financial Details On Dark Web starting from £2

3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web Marketplace

Malicious Hackers Selling Variety of Hacking Tools on the Dark Web that Starts from $1 – Here the Price list

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...