Monday, April 14, 2025
HomeComputer Security3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web...

3000 Hacked Websites Access comes to Sale in Russian Underground Dark Web Marketplace

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals listed 3000 Hacked websites access for sale in Russian based underground marketplace that sells for less than $50.

The underground marketplace is the best area for criminals where they can sell and buy various malicious software and stolen data for a very cheapest price.

This hacked website selling in Russian-speaking underground marketplace called MagBo where the advertisement calling the shop as “the best thing on the dark side.”

- Advertisement - Google News

These websites belong to the breaches that launched against U.S., Russian, or German based hosting services.

Most Of the compromised sites are E-commerce and other sectors such as healthcare, legal, education, insurance, and government agencies.

This MagBo Dark web marketplace is specifically engaged for selling and buying things such as breached sites, databases, and administrator panels.

MagBo Marketplace 

MagBo has been listed as one of the top marketplaces in Russian-language hacking and malware forum and the cybercriminals offer a compromised website that was breached via following bypass methods.

  • PHP shell access
  • Hosting control access
  • Domain control access
  • File Transfer Protocol (FTP) access
  • Secure Socket Shell (SSH) access
  • Admin panel access
  • Database or Structured Query Language (SQL) access

Apart from this buyers can also find the privilege level of the listed sites for selling and its label as the following category.

  •  Full access permissions
  • Abilities to edit content
  • Add your content.

According to Flashpoint, In addition to access to breached websites, this particular market also sells stolen photocopies of national documents for identity fraud, breached payment wallet access, compromised social media accounts, and Bitcoin mixer or tumbler services.

Hacked Websites Usage

These compromised websites are used for various malicious purposes including spreading malware, spam campaign,  cryptocurrency mining and gaining the access to the corporate networks.

Also, it allows accessing the sensitive internal document, finding the vulnerabilities to exploit the internal networks and other criminals activities.

Researchers believe that This is an uneasy trend that may have manifested itself already in a few high-profile publicly disclosed incidents.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...

FortiGate 0-Day Exploit Allegedly Up for Sale on Dark Web

A chilling new development in the cybersecurity landscape has emerged, as a threat actor...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...