Hackers selling 1.5 million social networking accounts

Cyber criminals are selling on data from social networking accounts to help the spread of malware and money scams.

Data security

Social networking accounts are a favoured target for cyber criminals, and a report released today has shown the crime is going global.

iDefense, the cyber security intelligence division of VeriSign, has discovered that more than 1.5 million account details are being put up for sale by hackers on just one online forum called "kirllos" as the black market for personal data continues to explode.

"The trend for harvesting information from social networking sites has been around for some time now, however cyber criminals typically limited their attacks to social media sites within their own geography," said Rick Howard, director of intelligence at iDefense.

"However the increasing exploitation of users of popular international platforms is important as it signifies that criminals are becoming more and more internationalised these sites provide a convenient platform for criminals to expand their trade around the globe."

Prices for the data can vary depending on how many contacts the user has on their account, ranging from $25 (16) per 1,000 accounts with 10 contacts or less to $45 for accounts with over 10 online friends.

Even accounts where the user has no contacts are still popular sellers as they can help with the spread of malware through friend finder tools and friend requests.

The data stolen can then enable criminals to commit money scams and data mining as well as start malware or spam campaigns.

Howard warned users of social networking sites to be vigilant with their privacy measures and to immediately report any unusual activity to the website in question.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021