Thursday, March 28, 2024

Hackers Selling More than 200 Million Stolen Data from Chinese Hotel Chain in Dark Web

Hackers advertising and selling more than 200 million highly sensitive data in a Dark web forum that was stolen from the China-based hotel chain.

Initially, researchers believe that the stolen information is only personally identifiable information (PII) of Chinese customer but further analysis helps then to uncovered that the stolen information from other Asian countries as well.

These stolen data belong to one the data breach that reported in last August 29 that exposed up to 130 million PII from Huazhu Hotels Group.

A Dark web forum that advertises these stolen data for the cost of eight bitcoins that is roughly around  US$58,000.

Advertising Data Amount from Hacked Database Data

Hackers claiming that the First set of stolen data contains various sensitive information including names, mobile phone numbers, email addresses, ID numbers, and residential addresses, among others from 53GB data contain 123 million records.

The second set of data contain 130 million customer ID information such as registered check-in time, customer name, ID number, home address, birthday, and internal ID number from 22.3 GB data.

Third dark web advertisement refers around 240 million records from 66.2GB data which including customer names, room numbers, card numbers, mobile numbers, email addresses, check-in and departure times, and hotel ID numbers.

Apart from this, Buyers and members of the dark web forum specifically request the particular set of data, for example, one of the forum members asked only a female data.

Selling Stolen Data and Compromised Victims are not limited

According to Trend Micro research, The data from the hotel chain is only a portion of what’s being sold in the deep web forum. The following is an example of other stolen data and illicit products we found being sold in the forum:

  1. Student-, hotel-, and financial investment-related PII. This PII included full names, Alipay accounts, WeChat bills, debit card, and other finance-related data.
  2. Banking and ID card information; interestingly, this is sold in the form of pictures of people holding the IDs, likely done as proof of identification.
  3. PII of contestants of a national pageant. The PII included names, physical attributes, and social media accounts.
  4. Stolen Taiwanese and Brazilian credit card data (payment can be sent to the user’s Steam account).
  5. PII of residents in Beijing.
  6. China national passports and other documents.
  7. Personal pictures of young female users in QQ accounts.

Our various research efforts showed that stolen and leaked PII is a staple offering in many cybercriminal underground marketplaces, which makes data privacy and security a must for organizations, Trend Micro said.

Also Read:

Tor Browser for Android – Browse Anonymously on Android Devices

Mobile Spyware Maker mSpy Leaked Millions of Sensitive Data Online in Plain Text

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles