Data hoarders are shining a spotlight on past breaches

Anonymous internet users routinely collect copies of stolen databases

Old data breaches carried out years ago are entering into the limelight thanks to anonymous internet users like Keen.

Earlier this week, Keen, a data collector who runs the site Vigilante.pw, helped to uncover details about stolen data taken from the popular porn site Brazzers. A copy of almost 800,000 accounts, probably originally hacked back in 2012, fell into his hands.

The stolen database is just one of the many Keen has on file, in fact, and each one can involve thousands or even millions of internet accounts. Vigilante.pw continually archives past data breaches as a way to warn the public.

“I figured it would be a good way to raise awareness about breaches,” Keen said in an instant message.

Mountains of data

Vigilante.pw is among numerous data breach monitoring sites started by anonymous internet users that routinely post details on newly uncovered stolen data. They're a big part of the reason why, week after week, the full scale of past hacks is gradually beginning to surface.

Recent news on a 2012 Dropbox breach, for example, was initially sourced from a separate service known as Leakbase. That site obtained a copy of the stolen accounts and found email addresses and hashed passwords belonging to 68 million users.

Another service, called LeakedSource, has also been unearthing details on past hacks at music and gaming sites. “For the most part, the reason all of these mega breaches are coming to light now is because we've gone out and found the data exists,” LeakedSource said in an email.

The data’s age is also playing a role. For hackers, stolen information on user accounts is most useful when it's fresh and the breach has been kept secret. Most of the breaches coming to light today occurred three or four years ago.

“When hackers breach a site, they keep [the data] to themselves for years,” Leakbase said in a message over Twitter.

That stolen data often includes email addresses and crackable passwords, all of which can be exploited to carry out other hacks or used for spam mail purposes.

Uncovering old hacks

However, hackers can also choose to sell or trade the data, especially as it ages. Over time, the stolen goods will lose value and circulate more cheaply across the black market and through the underground data trading community. Along the way, it may leak out.

Kali is one anonymous internet user who collects stolen databases to study internet trends, and she supplies what he finds to Vigilante.pw. She said she feels sorry for affected users who are unaware they may be at risk.

“They have no clue what’s going on around them,” Kali said in an instant message.

Data breach monitoring sites, however, are stepping in and alerting the media about alleged breaches -- some of which weren’t fully known.

“There have been some cases of websites straight up denying that they have been breached, when it is clear that they have,” said Keen. Other websites may notify the public, he said, but by then it can be too late.

Almost every day, Vigilante.pw is collecting new stolen databases, sometimes even from hackers wanting to publicly shame a website for being breached. “The problem is that we add so much data that it doesn't really garner enough attention unless we contact journalists,” Keen said.

A double-edged sword?

Raising awareness is one thing, but other sites, including Leakbase and LeakedSource, are trying to make a business out of breach monitoring. Both go beyond listing data breaches and offer a paid, searchable database of all the accounts they have on file. That can include information such as passwords.

LeakedSource said the paid services can help businesses detect which of their users have been exposed in past beaches.

“These people aren't abusing our services," LeakedSource said. "We are actively turning away people offering money because we couldn't verify what they were going to be using our services for.”

LeakedSource's website also says that all the information it has found is already online in some form and freely available.

Not everyone agrees with making the stolen data so accessible, especially if the motive is making money.

“Where would you draw the line about bringing breaches to light?” Kali asked.

Although it's important to warn the public, she fears that posting too many details about data breaches, especially those of private services, can tip off hackers about where to strike next.

"That's why I think it's wrong," she said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Michael Kan

IDG News Service
Show Comments

Father’s Day Gift Guide

Brand Post

Bitdefender 2019

Bitdefender’s best-in-class security solutions have been awarded Product of the Year. Get cybersecurity that 500 MILLION users already have and trust!

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?