·
How hackers can earn 17.3M USD from your data
This is more than just a quest of curiosity. Our case study in collaboration with independent third-party researchers’ work may help you stay safer online and off. If we understand what types of data criminals can buy from hackers on the dark web, we will understand what types of threats we can face and what types of data we should be securing.
Some basic stats about the market analyzed:
Number of listings: >22,000;
Number of factual sales: >720,000;
Income from factual sales: >17.3 million USD.
The analysis includes the types, prices and sources of those items and focuses on items that contain personal data (including financial data, online accounts, documents, and emails).
How much does stolen data cost on the dark web?
Before we dive in, a word of caution: Do not attempt this at home under any circumstances. The dark web contains many malicious links and connections to illegal activity. The third-party cybersecurity research experts we worked with took significant precautions while performing this research.
A few things to note while reviewing this data:
Data classified by country only in cases where countries are denoted by the seller.
The account price data does not represent university and gaming accounts because these were not numerous enough to accurately gauge their prices.
Payment card average price data in this report taken from our payment card report.
Email prices are denoted in bulk.
SSNs as a separate item are included in the document category as well, but not enough of them were available to accurately judge their average price.
What are the most common items on dark web markets?
In some ways, a dark web market is much like any other. Criminals who buy products on these criminal markets expect to make their money back and then some – the same way a tradesman might buy a tool at a hardware store.
The only problem, of course, is that they make their money by stealing it from innocent people. Therefore, analyzing these markets can give us a general idea of the damage that criminals can do with this stolen data in their hands.
Click on the graph on the right to see what categories and items were the most common.
The most commonly found item in the market was payment card data. That is not surprising as the previous NordVPN research showed that it can take as little as 6 seconds to brute-force (guess a number) a payment card:
A few interesting facts we observed:
Crypto wallets and account login details are hotter than bank accounts.
The most expensive accounts were Binance (395 USD avg.), Kraken (384 USD avg.), and Crypto.com (350 USD avg.). Some were even more expensive than fiat bank accounts.
Passports are valuable.
Copies of passports were the most expensive item at about 600 USD avg. However, prices varied greatly between countries, with Argentinian passports being the cheapest (9 USD) and Czech, Slovakian and Lithuanian passports tied for most expensive (3,800 USD).
Emails can be bought in big quantities.
Batches of email addresses are used to launch broad scams and hacks. The EU had the most expensive personal (11.4 USD avg.) and business (199.99 USD avg.) addresses, but interestingly enough, US voter emails were far more expensive (99 USD avg.) than voter emails from any other country.
Things that could be brute-forced or guessed are sold at much lower prices.
Payment card data or mobile phone numbers cost around 10 USD. Another easy way for hackers to steal a user’s data or digital asset is credential stuffing. That is why online accounts come at a low price as well: a hacked Netflix account can be bought for 10 USD, an Uber account for 12 USD.
Biggest sources
Experienced hackers know how to cover their tracks, so it’s nearly impossible to determine where many of these hackers operate from. However, we can tell where they “set up shop”. The locations where they declare their markets can tell us about where the demand for their products lies or where they have an easier time running their businesses.
For all of the fearsome terminology and criminal intent, these dark web markets on the face seem much like many other online markets. Here’s an example of how a dark web market may look like:
How can you stay secure?
Unfortunately, the incredibly broad scope of the data offered on these criminal markets makes it difficult to offer specific advice. However, there are some fundamental steps we can take.
Make sites and services earn your trust:
Hackers get lots of data by targeting the websites and services you share your data with. You can’t personally secure the servers that store your data, but you can “vote with your wallet/feet.” Make your data security a priority. If a site or a service asks you for sensitive data, ask them tough questions about how they secure it and what they’ll do if they’re breached.
Monitor your accounts:
Request weekly bank statements or activate transaction notifications on your app. Turn up the security settings on all of your accounts so you know when login attempts are made from suspicious devices. Make use of any tools offered by the sites or services you use (the password manager NordPass, for example, offers Data Breach Scanner, while NordVPN includes Dark Web Monitor).
Stay vigilant:
One side of the coin is knowing how to protect your data, and the other is knowing how to react quickly and effectively when your sensitive data is used.
Use strong and unique passwords:
If your password is long, it’ll probably be hard to guess. If it’s unique, then even if one of your accounts is breached, the rest will stay safe. With a collection of strong and unique passwords, you’ll stay more secure longer.
Protect your digital life with more cybersecurity apps
Enjoy the all-round security provided by our apps. Protect your internet traffic, passwords, and files.
Let NordPass be your everyday companion. It will keep your passwords close at hand even when you’re offline, making your digital life safer and simpler.
Get alerted before damage is done. A built-in NordPass Premium feature will scan the web and inform you if your sensitive information has been exposed in a data breach.
Contact us
For more information on this in-depth cautionary research report, contact us below!