Tuesday, July 16, 2024

U.S. Authorities Take Down The largest underground Marketplace “Slilpp” That Offers 80 Million Stolen Credentials

The U.S. Department of Justice has proclaimed that in association with law enforcement agencies in Germany, the Netherlands, and Romania, it has recently taken down the domain names and servers of SlilPP.

But, don’t know about SlilPP? It is a black market website that deals with and sells stolen credentials on the dark web.

In 2012, initially this dark web marketplace, SlilPP appeared, and mainly focusing on selling user names and passwords for various services, including bank accounts, online payment accounts, mobile phone accounts, retailer accounts, and other online accounts.

Acting Assistant Attorney General of the Justice Department’s Criminal Division, Nicholas L. McQuaid stated:- 

“The SlilPP marketplace allegedly caused hundreds of millions of dollars in losses to victims worldwide, including by enabling buyers to steal the identities of American victims. The department will not tolerate an underground economy for stolen identities, and we will continue to collaborate with our law enforcement partners worldwide to disrupt criminal marketplaces wherever they are located.”

The operator of SlilPP also organized several forums for sellers and provided various payment mechanisms as well. 

While at the moment of seizure, the security authorities discovered that the vendors of SlilPP marketplace were selling more than 80 million login credentials that belong to the users of more than 1,400 companies, and not only that among them even some are high-profile ones.

To find out the server and domain names hosting the SlilPP black marketplace the US Federal Bureau of Investigation (FBI) closely working and investigating the whole with other law enforcement agencies in other countries to completely take down the SlilPP black marketplace through the US and international legal procedures.

Nearly 10 years ago this black marketplace, SlilPP was founded, and that’s why the security authorities of law enforcement agencies have claimed that the total loss of victims caused by SlilPP is very difficult to calculate.

However, the US Department of Justice has estimated the approx loss value caused by SlilPP is more than $200 million in the United States alone. 

Though the full influence of SlilPP is not yet known, but, from the above damage figure we can assume that how devastating the approx damage value could be.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.


Latest articles

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver malware effectively.These...

New ShadowRoot Ransomware Attacking Business Via Weaponized PDF’s

X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails...

Hacktivist Groups Preparing for DDoS Attacks Targeting Paris Olympics

Cyble Research & Intelligence Labs (CRIL) researchers have identified a cyber threat targeting the...

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles