Menu
Data hoarders are shining a spotlight on past breaches

Data hoarders are shining a spotlight on past breaches

Anonymous internet users routinely collect copies of stolen databases

Old data breaches carried out years ago are entering into the limelight thanks to anonymous internet users like Keen.

Earlier this week, Keen, a data collector who runs the site Vigilante.pw, helped to uncover details about stolen data taken from the popular porn site Brazzers. A copy of almost 800,000 accounts, probably originally hacked back in 2012, fell into his hands.

The stolen database is just one of the many Keen has on file, in fact, and each one can involve thousands or even millions of internet accounts. Vigilante.pw continually archives past data breaches as a way to warn the public.

“I figured it would be a good way to raise awareness about breaches,” Keen said in an instant message.

Mountains of data

Vigilante.pw is among numerous data breach monitoring sites started by anonymous internet users that routinely post details on newly uncovered stolen data. They're a big part of the reason why, week after week, the full scale of past hacks is gradually beginning to surface.

Recent news on a 2012 Dropbox breach, for example, was initially sourced from a separate service known as Leakbase. That site obtained a copy of the stolen accounts and found email addresses and hashed passwords belonging to 68 million users.

Another service, called LeakedSource, has also been unearthing details on past hacks at music and gaming sites. “For the most part, the reason all of these mega breaches are coming to light now is because we've gone out and found the data exists,” LeakedSource said in an email.

The data’s age is also playing a role. For hackers, stolen information on user accounts is most useful when it's fresh and the breach has been kept secret. Most of the breaches coming to light today occurred three or four years ago.

“When hackers breach a site, they keep [the data] to themselves for years,” Leakbase said in a message over Twitter.

That stolen data often includes email addresses and crackable passwords, all of which can be exploited to carry out other hacks or used for spam mail purposes.

Uncovering old hacks

However, hackers can also choose to sell or trade the data, especially as it ages. Over time, the stolen goods will lose value and circulate more cheaply across the black market and through the underground data trading community. Along the way, it may leak out.

Kali is one anonymous internet user who collects stolen databases to study internet trends, and she supplies what he finds to Vigilante.pw. She said she feels sorry for affected users who are unaware they may be at risk.

“They have no clue what’s going on around them,” Kali said in an instant message.

Data breach monitoring sites, however, are stepping in and alerting the media about alleged breaches -- some of which weren’t fully known.

“There have been some cases of websites straight up denying that they have been breached, when it is clear that they have,” said Keen. Other websites may notify the public, he said, but by then it can be too late.

Almost every day, Vigilante.pw is collecting new stolen databases, sometimes even from hackers wanting to publicly shame a website for being breached. “The problem is that we add so much data that it doesn't really garner enough attention unless we contact journalists,” Keen said.

A double-edged sword?

Raising awareness is one thing, but other sites, including Leakbase and LeakedSource, are trying to make a business out of breach monitoring. Both go beyond listing data breaches and offer a paid, searchable database of all the accounts they have on file. That can include information such as passwords.

LeakedSource said the paid services can help businesses detect which of their users have been exposed in past beaches.

“These people aren't abusing our services," LeakedSource said. "We are actively turning away people offering money because we couldn't verify what they were going to be using our services for.”

LeakedSource's website also says that all the information it has found is already online in some form and freely available.

Not everyone agrees with making the stolen data so accessible, especially if the motive is making money.

“Where would you draw the line about bringing breaches to light?” Kali asked.

Although it's important to warn the public, she fears that posting too many details about data breaches, especially those of private services, can tip off hackers about where to strike next.

"That's why I think it's wrong," she said.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Reseller News launches inaugural Hall of Fame lunch

Reseller News launches inaugural Hall of Fame lunch

Reseller News welcomed 2015 and 2016 inductees - Darryl Swann, Dave Rosenberg, Gary Bigwood, Keith Watson, Mike Hill and Scott Green - to the inaugural Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed how the channel can collectively work together to benefit New Zealand, the Kiwi skills shortage and the future of the industry. Photos by Maria Stefina.

Reseller News launches inaugural Hall of Fame lunch
Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Show Comments