Darknet: user data sold

Hackers decided to upload data to the Darknet and steal it from a two-year cyber espionage campaign.

The number of people affected by this massive data leak is more than 600,000. The mail service provider victim of this computer attack is none other than the Italian operator known as Email.it, which is recognized in the sector as a specialist in the provision of services in the field of e-mail.We opened a breach in the data center Email.it more than two years ago and settled down like an APT, the malicious point out.We took all the sensitive data possible from their server and then we chose to give them a chance to fill their holes by asking for a small bonus. They refused to talk to us and continued to deceive their users/customers. meant the hackers responsible for the leak.

This article will also interest you: 7600 websites of the Dark web offline after the attack of their host

They call themselves NoName Hacking Group. They then decide to put for sale the data they have collected following the company's refusal to give in to their blackmail. As such, the hacker group is offering about 5 to bit of personal data from the provider for 20,000 euros, or CAD$ 30,000. And about 15,000 euros to have access to all emails and attachments collected during the 2 years of espionage. And that's not all, it provides its customers with 46 databases, a backdoor access to the italian firm's website and even the source code of applications related to the site. In addition, for 600,000 passwords and other private information of users for only 3000 euros."We took as much sensitive data as possible from their servers and chose to give them a chance to plug their holes and ask them for a small reward," NNHG concludes. They refused to talk to us and continued to lie to their users and customers.explains the group of pirates.

They also note that the company does not have enough security measures to protect its users' data. For example, user correspondence, whether e-mail, faxes or other individual information, was not protected by encryption. This is a real fault on the part of the company. It is clear that the regulators will be referred to this matter and a fine or several may fall to this level. In addition, hackers noted that they had infiltrated the company's network since 2018 through a backdoor. And during these 2 years, the company has not detected their presence or even an irregularity. Unfortunately, this indicates a certain lack of safety.

Now access an unlimited number of passwords:

Check out our hacking software