Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Access To Thousands Of Breached Sites Found On Underground Market.

by The Gurus
November 8, 2018
in News
Flashpoint Logo
Share on FacebookShare on Twitter

Access to approximately 3,000 breached websites has been discovered for sale on a Russian-speaking underground marketplace called MagBo. Access to some of the sites is selling for as low as 50 cents (USD).

Analysts at Flashpoint who discovered the availability of access to the breached sites said that most of the victims come from ecommerce, while other victims in industries such as healthcare, legal, education, insurance, and government agencies were also found.

A number of the available servers investigated by Flashpoint led analysts to conclude that most of the breaches are from either U.S., Russian, or German hosting services. This particular market is populated by a more than a dozen vendors and hundreds of buyers who sell and take part in auctions in order to gain access to breached sites, databases, and administrator panels.

Flashpoint has shared its findings with law enforcement, which is working to notify victims.

Access to Breached Sites an Uneasy Trend
Illicit access to compromised or backdoored sites and databases is used by criminals for a number of activities, ranging from spam campaigns, to fraud, or cryptocurrency mining. These compromises have also been used to gain access to corporate networks. This could potentially allow actors to access proprietary internal documents or resources, as well as entry points through which they can drop various malicious payloads. The types of vulnerabilities present and the ways in which they can be exploited depend on the threat actor’s specific capability, motivation, targeting, and goals.

This is an uneasy trend that may have manifested itself already in a few high-profile publicly disclosed incidents. A recent well-publicised breach, for example, involved custom-built infrastructure, according to researchers at RiskIQ, allowing the attackers to avoid detection and compromise the data of 380,000 customers. Such an attack likely required compromised access and the ability to manipulate site content and inject code in order to steal customer data.

Today, a month-long breach at a computer retailer was disclosed. Attackers were able to inject code into the retailer’s site that sniffed for payment card numbers. In both breaches, researchers at RiskIQ and Volexity said the Magecart hacking group was behind the attacks.

MagBo a Recent Development on the Underground
Flashpoint analysts said the earliest advertisements for the MagBo market were posted in March to a top-tier Russian-language hacking and malware forum. The threat actor offered the market as a destination for sales of access to breached sites. Posts advertise access to websites that were breached via:

PHP shell access
Hosting control access
Domain control access
File Transfer Protocol (FTP) access
Secure Socket Shell (SSH) access
Admin panel access
Database or Structured Query Language (SQL) access

Potential customers will also find descriptions of the privilege levels available from the market, with labels such as “full access permissions,” “abilities to edit content,” and “add your content.”

In addition to access to breached websites, this particular market also sells stolen photocopies of national documents for identity fraud, breached payment wallet access, compromised social media accounts, and Bitcoin mixer or tumbler services.

Prices for compromised websites range from $0.50 USD to $1,000 USD per access, depending on a website ranking listing various host parameters. These parameters allow the buyer to purchase the exact breach they need depending on the website value as determined and checked by the store.

High-value targets would obviously fetch a higher price and capabilities to inject payment card sniffers or other tools for deeper network penetration. Sites with a lower ranking and a lesser perceived value are more likely to be abused for cryptocurrency mining or spam delivery.

Pre-emptive measures to protect against website exploitation include conducting audits and reviews of any externally accessible websites and their connections to any organisation networks.

[tpr-boilerplate company=’null’]

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Green Element Removes Barriers To Greener Business Operations With Innovative New Carbon Footprint Calculator.

Next Post

Businesses Are Future-Proofing Security Controls As Regulation Deadline Approaches.

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information