Turning Specialized Platform Data Breaches into Defensive Insights

- Posted in Leak by - Permalink

Background: Since the beginning of the internet, a variety of communities have existed, ranging from hacking and malware development groups to those involved in insider information sales and illegal pharmacy platforms. Among these, some communities are dedicated to sharing and selling breached data, which can be used for both legitimate and illegitimate purposes. Recently, data from a prominent platform was released, including user details such as IP addresses, registration IPs, internal message logs, and payment information. This platform's purpose was to sell breached data, which organizations face on a daily basis.

enter image description here

Saga of that story: In April 2022, the platform's infrastructure was seized as a result of an international law enforcement operation. In March 2023, the founder of that platform was arrested. The key to identifying the platform’s owner was a seemingly simple piece of metadata, which appeared in other data leaks. In April 2023, a similar platform exposed[.]vc was created with the goal of continuing the activities of the previous one. Almost immediately, information from the previous platform's user database, which included approximately 100 pieces of metadata per registered user—such as IP addresses, email addresses, usernames, registration IPs, webpages, and other contact details—was put up for sale.

enter image description here

After the newly created platform disappeared, it was replaced by another platform with the domain REDACTEDNAME[.]VC (the root domain was redacted). However, this new domain was also eventually seized by law enforcement. The platform was then migrated to a new domain and infrastructure.

Recently, an unknown person publicly released the database from the old one platform (whose founder had been arrested). This database was made available in both SQL and JSON formats and contained full information about users, wallets, messages, posts, threads, and more.

enter image description here

As a defender, several useful pieces of information can be derived: Threat Intelligence: Email Addresses and IP Logs: Collecting registered user email addresses and IP logs can be valuable for threat intelligence. This information may help in the future to de-anonymize individuals involved in attacks against your organization’s protection layers. However, it’s important to remember that some individuals in the list may be ethical specialists or legitimate users.

Tracking Digital Footprints: Identifying Threat Actors: If your organization has previously been targeted by the platform, the leaked data can assist in tracking the digital footprint of threat actors. By analyzing this data, you can gain insights into their activities and connections, helping to better understand and mitigate threats.

Leak Analyze: The countries listed in this analysis represent the IP addresses from which users have registered. However, this does not necessarily indicate that the users are physically located in these countries. The results should be interpreted with caution, as several factors can influence the IP address data. For example, users may be accessing the site through VPNs or other proxy services that could mask their true location. Therefore, the IP address information reflects where the connection appears to originate rather than the actual geographic location of the users.


Afghanistan: 10


Albania: 230


Algeria: 783


Andorra: 17


Angola: 13


Anguilla: 1


Argentina: 791


Armenia: 57


Aruba: 6


Australia: 3960


Austria: 1042


Azerbaijan: 186


Bahamas: 18


Bahrain: 90


Barbados: 8


Belarus: 157


Belize: 6


Benin: 37


Bhutan: 4


Bolivia (Plurinational State of): 64


Bosnia and Herzegovina: 119


Botswana: 14


Brazil: 2991


Brunei Darussalam: 32


Bulgaria: 818


Burkina Faso: 2


Cambodia: 420


Cameroon: 37


Canada: 3529


Cape Verde: 3


Cayman Islands: 1


Chile: 367


China: 2883


Colombia: 328


Costa Rica: 85


Cote D'ivoire: 78


Croatia: 207


Cuba: 6


Curacao: 4


Cyprus: 80


Czechia: 571


Denmark: 561


Dominican Republic: 156


Ecuador: 129


Egypt: 1207


El Salvador: 32


Equatorial Guinea: 3


Eritrea: 3


Estonia: 259


Eswatini: 3


Ethiopia: 38


Falkland Islands [Malvinas]: 1


Faroe Islands: 1


Fiji: 4


Finland: 737


France: 4683


French Guiana: 2


French Polynesia: 4


Gabon: 1


Gambia: 1


Georgia: 274


Germany: 5653


Ghana: 165


Greece: 488


Greenland: 8


Guadeloupe: 4


Guam: 6


Guinea: 3


Guinea-Bissau: 1


Guyana: 3


Haiti: 7


Honduras: 27


Hungary: 480


Iceland: 72


India: 4255


Indonesia: 56712


Iran (Islamic Republic of): 224


Iraq: 774


Ireland: 470


Israel: 992


Italy: 2202


Jamaica: 22


Japan: 3445


Jordan: 235


Kazakhstan: 161


Kenya: 176


Kiribati: 3


Korea (the Republic of): 906


Kuwait: 91


Kyrgyzstan: 37


Lao People's Democratic Republic: 13


Latvia: 227


Lebanon: 113


Lesotho: 1


Liberia: 2


Libya: 260


Liechtenstein: 7


Lithuania: 631


Luxembourg: 255


Madagascar: 13


Malawi: 2


Malaysia: 1021


Maldives: 17


Mali: 5


Malta: 37


Marshall Islands: 2


Mauritania: 16


Mauritius: 46


Mexico: 2022


Micronesia (Federated States of): 3


Moldova (the Republic of): 178


Monaco: 5


Mongolia: 41


Montenegro: 26


Morocco: 1406


Mozambique: 12


Myanmar: 86


Namibia: 11


Nauru: 1


Nepal: 158


Netherlands (Kingdom of the): 5678


New Caledonia: 11


New Zealand: 408


Nicaragua: 21


Niger: 7


Nigeria: 544


North Macedonia: 100


Norfolk Island: 5


Norway: 629


Oman: 75


Pakistan: 4324


Palestine: 80


Panama: 54


Papua New Guinea: 28


Paraguay: 31


Peru: 661


Philippines: 1275


Poland: 1972


Portugal: 788


Puerto Rico: 35


Qatar: 96


Romania: 1310


Russian Federation: 1733


Rwanda: 5


Saint Kitts and Nevis: 9


Saint Lucia: 3


Saint Martin (French part): 2


Saint Pierre and Miquelon: 1


Saint Vincent and The Grenadines: 2


Samoa: 2


San Marino: 3


Sao Tome and Principe: 2


Saudi Arabia: 651


Senegal: 19


Serbia: 571


Seychelles: 14


Sierra Leone: 3


Singapore: 5798


Sint Maarten (Dutch part): 1


Slovakia: 225


Slovenia: 111


Solomon Islands: 2


Somalia: 14


South Africa: 429


Spain: 2368


Sri Lanka: 117


Sudan: 30


Suriname: 9


Sweden: 2445


Switzerland: 1065


Syria (Syrian Arab Republic): 38


Taiwan (Province of China): 2339


Tajikistan: 6


Tanzania: 29


Thailand: 729


Timor-Leste: 8


Turkey (Turkiye): 4545


Turkmenistan: 1


Uganda: 24


Ukraine: 740


United Arab Emirates: 612


United Kingdom of Great Britain and Northern Ireland: 6323


United States of America: 30006


Uruguay: 72


Uzbekistan: 49


Vanuatu: 1


Venezuela (Bolivarian Republic of): 147


Vietnam: 2053


Yemen: 46


Zambia: 4


Zimbabwe: 17

Conclusion: By analyzing such leaks, we can enhance our defensive strategies, particularly during the post-mortem phase of incident response. This data can provide valuable insights into attack vectors, help identify potential sources of threats, and inform our response strategies. In some cases, analyzing leaks can assist us in achieving our goals related to incident response, improving our overall security posture.