Hackers Selling Facebook Account Logins Details On Dark Web For $3

Facebook suffered a major security breach last week, hackers stolen more than 50 million accounts access tokens by exploiting a bug in View As a feature.

The Independent reported that they spotted a number of listings on underground dark web markets offering personal data of Facebook users starting from $3.

The dark web markers are the popular place for the cybercriminals to sell the stolen login credentials, financial data, and malicious tools.

Listings found to be available with the famous dark web market like Dream Market, which is well-known for selling various malware, hacking tools, and login credentials.

Hackers selling the stolen Facebook credentials between $3 and $12 and it can be purchased only through the bitcoin and bitcoin cash.

“If sold individually at these prices, the value of the stolen data on the black market would be somewhere between $150m and $600m,” reads Independent report.

Recently another UK firm MoneyGuru published a detailed report about the data listed on dark web markets and their pricing details, according to the report one can purchase someone’s online life at the average cost of £744.30.

Facebook Vice President said that we are not sure who is behind the attack “Since we’ve only just started our investigation, we have yet to determine whether these accounts were misused or any information accessed.”

The social media giant could be liable for fines up to $1.63 billion according to the General Data Protection Regulation (GDPR).

Related Read

Key Elements and Important Steps to General Data Protection Regulation (GDPR)

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been identified…

2 hours ago

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats and…

2 hours ago

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions, potentially…

2 hours ago

CatB Ransomware Abuses Microsoft Distributed Transaction Coordinator for Stealthy Payload Execution

The cybersecurity realm has encountered a formidable adversary with the emergence of CatB ransomware, also…

2 hours ago

Smokeloader Malware Operators Busted, Servers Seized by Authorities

In a major victory against cybercrime, law enforcement agencies across North America and Europe have…

3 hours ago

CISA Alerts on Actively Exploited Linux Kernel Out-of-Bounds & Read Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued alerts regarding two actively exploited vulnerabilities…

3 hours ago