HomeCII/OT330M Email IDs Allegedly Scraped From SOCRadar.io

330M Email IDs Allegedly Scraped From SOCRadar.io

Published on

spot_img

A recent cybersecurity incident has caused a stir in the online community after a vast number of email addresses were exposed to the public. The data, amounting to an estimated 332 million email addresses, was allegedly scraped from the security intelligence platform SOCRadar.io and then shared on a cybercrime forum by a threat actor with the moniker Dominatrix, as reported by Hackread.

The data dump was originally collected by another actor known as “USDoD,” who has a history of involvement in previous data breaches. The information was extracted from “stealer logs and combolists,” indicating that malware infections played a role in the initial data gathering process. This incident sheds light on the broader issue of malware distribution and the exploitation of compromised systems.

According to Hackread, the data scraping incident took place in July 2024, with an announcement on the underground hacker forum Breach Forums revealing that 14GB worth of CSV files containing only email addresses obtained from various data breaches were available. Initially, the forum user under the alias USDoD was selling the scraped data for $7,000 but Dominatrix, who allegedly purchased the data, made it public on August 3, sharing the details with the Breach Forums community.

While the incident may not technically be classified as a data breach since it reportedly only involved email addresses without passwords, it raises significant concerns for individuals and organizations whose email addresses may be included in the leak. This exposure can potentially be used for malicious activities such as phishing attacks, brute-force attacks, and credential stuffing, posing a threat to online security and privacy.

The importance of robust cybersecurity measures is underscored by this incident, highlighting the need for individuals and organizations to prioritize their digital security. Recommendations include using unique passwords for each account, enabling multi-factor authentication whenever possible, and maintaining vigilance against unsolicited emails, links, and attachments.

As of now, SOCRadar.io has not issued an official statement addressing the incident, leaving the cybersecurity community eager for clarification on the nature of the data scraping and any preventative measures the company intends to implement to prevent similar occurrences in the future. Stay tuned for updates as the situation continues to unfold.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...