Markets for Stolen Data

Stolen data often ends up being sold online. The data is obtained through intrusive methods without the people whose data is being stolen having any knowledge of it.

Mass breaches of online services is a common way of getting data. Attackers exploit software vulnerabilities, misconfigurations, or weak credentials at companies to copy entire user databases (emails, passwords, payment tokens, profiles). Large batches of real user records get dumped or sold online.

A notable example of a breach was the Yahoo breach in 2013-14. Yahoo later disclosed that up to 3 billion accounts were affected (names, email addresses, phone numbers, dates of birth, hashed passwords, security questions).

Phishing and social-engineering are also used to gather data. Phishers use fraudulent emails and SMSs and have webpages to trick people into revealing credentials. They can also be targeted (spear-phishing) against specific employees, for instance, to gain corporate access.

Malicious programs on victims’ devices can capture keystrokes, form data, browser cookies, or exfiltrate files. Attacks involve tools sold in illicit markets used for both mass campaigns and targeted intrusions.

The RedLine Stealer, for example, is a modern “info-stealer” sold as Malware-as-a-Service that feeds today’s credential markets. The data stolen include browser passwords and cookies, saved credit cards, and crypto wallets.

Credential markets like Russian Market and 2easy Shop sell credentials, cookies, malware logs, and corporate access. Buyers include fraud rings, access brokers, and ransomware affiliates. Data is also sold on dark net forums like XSS Forum and Exploit Forum.

Telegram has become a major hub for stolen-data sales. Channels advertise fresh breaches, samples are shared publicly, and deals happen in private chats.

Many breaches are first discovered not by companies, but when credentials appear for sale or fraud spikes occur or the threat intelligence teams detect leaks. This has turned criminal markets into an unintended early-warning system.

Online trade in stolen data is no longer chaotic or amateur. It is a structured, resilient economy with specialization at every stage — from malware developers to credential brokers to fraud operators.

Understanding how data is stolen and sold is no longer just a cybersecurity issue. It is a societal one, affecting trust in digital systems, financial stability, privacy, and national security.

1 comment

Leave a comment

Your email address will not be published. Required fields are marked *