Thursday, January 30, 2025
HomeComputer Security3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web...

3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web Marketplace

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals listed 3000 Hacked websites access for sale in Russian based underground marketplace that sells for less than $50.

The underground marketplace is the best area for criminals where they can sell and buy various malicious software and stolen data for a very cheapest price.

This hacked website selling in Russian-speaking underground marketplace called MagBo where the advertisement calling the shop as “the best thing on the dark side.”

These websites belong to the breaches that launched against U.S., Russian, or German based hosting services.

Most Of the compromised sites are E-commerce and other sectors such as healthcare, legal, education, insurance, and government agencies.

This MagBo Dark web marketplace is specifically engaged for selling and buying things such as breached sites, databases, and administrator panels.

MagBo Marketplace 

MagBo has been listed as one of the top marketplaces in Russian-language hacking and malware forum and the cybercriminals offer a compromised website that was breached via following bypass methods.

  • PHP shell access
  • Hosting control access
  • Domain control access
  • File Transfer Protocol (FTP) access
  • Secure Socket Shell (SSH) access
  • Admin panel access
  • Database or Structured Query Language (SQL) access

Apart from this buyers can also find the privilege level of the listed sites for selling and its label as the following category.

  •  Full access permissions
  • Abilities to edit content
  • Add your content.

According to Flashpoint, In addition to access to breached websites, this particular market also sells stolen photocopies of national documents for identity fraud, breached payment wallet access, compromised social media accounts, and Bitcoin mixer or tumbler services.

Hacked Websites Usage

These compromised websites are used for various malicious purposes including spreading malware, spam campaign,  cryptocurrency mining and gaining the access to the corporate networks.

Also, it allows accessing the sensitive internal document, finding the vulnerabilities to exploit the internal networks and other criminals activities.

Researchers believe that This is an uneasy trend that may have manifested itself already in a few high-profile publicly disclosed incidents.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in...

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious...

Threat Actor IntelBroker Allegedly Claiming Breach of Hewlett Packard Enterprise Data

A threat actor known as IntelBroker has taken to a prominent dark web forum...