Tuesday, December 3, 2024
HomeSecurity NewsFacebook Logins Sold in Dark Web for $5.20 and Gmail logins for...

Facebook Logins Sold in Dark Web for $5.20 and Gmail logins for $1

Published on

SIEM as a Service

Cybercrime evolving as a big business, cybercriminals launch a number of services such as Cybercrime-as-a-service and Ransomware as a service, where they offer hacking tools and ransomware as a service in dark web markets.

The dark web markets remain as a place for selling stolen credit cards, the underground offers hacker-for-hire services, hacking tools, tutorials and more. These dark web markets are accessible through anonymization services such as Tor or I2P.

Also, cybercriminals offering Cybercrime-as-a-service that includes DDoS tools, Malware, Banking data, credit card data, and Ransomware.

- Advertisement - SIEM as a Service

According to the Fractl investigation report, the cost of user data is very nominal in dark web markets. These dark web markets part of the deep web that hosted in the Encrypted network and it can be reached via browser like Tor.

Also Read How To Access Deep Web Anonymously and know its Secretive and Mysterious Activities

Fractl monitored the listings of top Dark web Markets Dream, Point and Wall Street Market for months. An individual’s complete online identity, including personal identification numbers and hacked financial accounts, can be sold in dark web for $1,200.

Facebook credentials sold on the dark web for just $5.20 per account and they allow cybercriminals to obtain complete control over your account and post variety of scams. Gmail accounts are sold for $1 per account.

Paypal account that contains high balance sold for $247 and the Uber accounts with high balance for $7 according to Fractl report.

“A college student with not a considerable measure of cash in the bank may be worth $50,” Pascual said. “In case you’re close retirement, with a fat retirement record and a lot of cash in the bank, you’ll be worth more.”

Login details of food website GrubHub sold for $9 and the Airbnb account credentials for $8. Voter’s data also remain vulnerable. According to The Guardian report, Britain-based data analysis Cambridge Analytica harvested more than 50 million user profile without user’s consent and the data used in 2016 US election campaigns.
dark web markets

When identity theft happens, it is extremely hard to recoup the data that Cyber-Criminals have stolen. Commonly, we aren’t even mindful of how or when it happened.

That’s why it’s always better to take proactive security measures that will prevent fraudsters from stealing the personal details and information.

To prevent the identity theft it is recommended to enable to 2FA (two-factor authentication) in all possible circumstances.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a...

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link's HomeShield function, affecting a range of...

ElizaRAT Exploits Google, Telegram, & Slack Services For C2 Communications

APT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an...

Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a...

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems.This...