Sunday, April 6, 2025
HomeCyber Security News35 Million U.S Voter Records Selling in Popular Dark web Hacking Forum...

35 Million U.S Voter Records Selling in Popular Dark web Hacking Forum from $150 USD to $12,500 USD

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a database contains almost 35 Million U.S Voter Records that selling in the popular hacking forum at a various price from $150 USD to $12,500 USD depends on the buyer’s requirement.

The database is very large and it contains very valuable personally identifiable information, voting history and the price includes for each and every states.

There is 19, U.S states database are posted for sale in the underground hacking forum that includes 23 million records for just three of the 19 states and rest of the state’s records having different numbers.

Researchers said, “To our knowledge,  this represents the first reference on the criminal underground of actors selling or distributing lists of 2018 voter registration data, including US voters’ personally identifiable information and voting history”.

In this case, sellers indicate that they receive weekly updates of voter registration data across the states and they receive information via contacts within the state governments.

Its seems threat actors legitimately obtain the database from the state government and using it for malicious purpose in a hacking forum.

Sales Advertisement in Hacking Forum

An Advertisement that posted in the popular English-language speaking hacking forum on October 5, 2018, shows that the following 19 states affected citizens records.

  • Georgia
  • Idaho
  • Iowa
  • Kansas
  • Kentucky
  • Louisiana
  • Minnesota
  • Mississippi
  • Montana
  • New Mexico
  • Oregon
  • South Carolina
  • South Dakota
  • Tennessee
  • Texas
  • Utah
  • West Virginia
  • Wisconsin
  • Wyoming

The price of the U.S Voter Records fixed based on a number of voter records per database listing and/or, to a lesser degree of confidence and the price range fixed from $150 USD to $12,500 USD depending on the state.

Texas($1300), Wisconsin($12,500) and Louisiana($5000) state record only covered 23 million records and the rest of the record belongs to remaining states.

Threat actor also organized a crowdfunding campaign to purchase each U.S Voter Records registration database where he mentioned that the all earlier purchased users will be having Kansas voter database for free.

According to Anomali Labs , A second crowdfunding project, voted by forum members to select the next state, is close to 20.7% of its funding goal. Oregon currently leads the voting for the second state to be published.

“This type of information can facilitate criminal actions such as identity fraud or allow for false submissions of changes online to voter registrations, making some legitimate voters ineligible to cast ballotsIn a voter identity theft scenario, fraudsters can cause disruptions to the electoral process through physical address changes, deletion of voter registrations, or requests for absentee ballots on behalf of the legitimate voter”.Anomali Labs said.

Also Read:

Thousands of US Voters Personal Data Leaked Online Again

California Voter Database Leaked – 19 Million Voters Records Under Risk

Hackers Stole More than 19 Million Records of California State Voter Database

198 Million American Voters Personal Records Leaked In Public- Biggest Voters Data Leak Ever

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...