Monday, March 4, 2024

The Largest Online Marketplace of Stolen Login Credentials Seized by Law Enforcement

On March 16, 2022, a federal grand jury put on trial Igor Dekhtyarchuk, a citizen of the Russian Federation (Russia), with charges for running a cyber-criminal marketplace that sold thousands of stolen login credentials, Personally Identifiable Information, and authentication tools.

Dekhtyarchuk ran Marketplace A, which allegedly sold credentials of over 48,000 hacked email accounts, 39,000 internet accounts, and had an average visitor count of 5,000 people every day.

Marketplace A specializes in the selling of illegally obtained access devices for compromised online payment platforms, retailers, and credit cards, and also provides data associated with such accounts, such as users’ names, names and addresses, account credentials, and credit card data. This operation is known as a “carding shop.”

Dekhtyarchuk first made an appearance on the hacker forums in November 2013 with the alias name “floraby”. In April 2018, he started to advertise about the selling of account data in Russian hacker forums. In two months, he opened Marketplace A and started to advertise his marketplace soon.

However, Marketplace A had a completely different approach for its buyers. The website works just as how a legitimate store would work.

A person visiting the website to buy credentials can also buy credit card accounts of that victim. Sometimes, customers can also buy information relating to the victim’s retail accounts and other financial data. 

Another thing to be highlighted was the seven-day rental incremental plan that Dekhtyarchuk provided its customers.

He provided a downloadable software that the customers can use to input the purchased credentials along with the cookie that is provided with purchase. This helps the customers to access a company’s account easily.

During the period of March 2021 and July 2021, the FBI made a covert operation to track down the cybercriminals. The FBI worked with an Online Covert Employee (OCE) to track their location.

At the period of this covert operation, they purchased nearly 131 accounts from the marketplace. After every purchase, access was provided via a link or Telegram channels.

However, Finally, the hackers were brought to justice. 

The FBI stated, “This case exemplifies the need for all of us, right now, to take steps to protect our online identity, our personal data, and our monetary accounts,” said U.S. Attorney Brit Featherston.  “Cyber-criminals are lurking behind the glow of computer screens and are harming Americans.  These investigations require dedicated professionals who work tirelessly to stop thieves that steal from unknowing innocent people.  To those who dedicate their lives to stopping cyber-criminals, we thank you.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles