FBI seizes credentials-for-sale site WeLeakInfo.com

Security

The FBI has seized the domain for WeLeakInfo.com, a site that sold breached data records, after a multinational effort by law enforcement.

Authorities have arrested two 22-year-old men alleged to have operated the site. Based in Fintona, Northern Ireland, and Arnhem in the Netherlands, they are believed to have made over £200,000 (about $260,000) between them from the site.

The Internet Archive’s Wayback Machine first shows WeLeakInfo.com surfacing in April 2017, advertising itself as “the Most Extensive Private Database Search Engine”.

The FBI and the District of Columbia explained that the site had harvested over 12 billion records from over 10,000 data breaches, including names, email addresses, usernames, phone numbers, and passwords. The site disclosed records relating to data breaches of sites including Chegg.com, StockX, Dubsmash, and MyFitnessPal.

Customers could subscribe to WeLeakInfo.com for as little as a day, paying a minimum of $2 in return for unlimited access. UK authorities also found links between the site and sales of remote access trojans (RATs) and cryptors (tools that obfuscate malware code to avoid detection). It was available both online and also via the dark web service Tor.

The FBI and the District of Columbia worked with the UK’s National Crime Agency and the Netherlands National Police Corps on the site seizure, along with the German Bundeskriminalamt (the Federal Criminal Police Office of Germany) and the Police Service of Northern Ireland.

In an announcement about the arrests, UK NCA said that it had started investigating WeLeakInfo.com in August 2019. It had spotted people using credentials from the site in cyberattacks in the UK, Germany, and the US. The Agency passed its information to the Bundeskriminalamt and the FBI, and they co-ordinated the seizure of WeLeakInfo.com at 11:30pm UK time on Wednesday 15 January, the same day that the men were arrested.

WeLeakInfo’s operators ran it like a business. It had its own Twitter account, where they would update their customers about their new database acquisitions, while also justifying their site as a public service:

They would even run special offers and promos:

They would also use third-party text storage sites to list new sets of stolen credentials.

The URL for the credential sales service now displays a notice from the FBI explaining that it has seized the domain.

WeLeakInfo isn’t the only site to have sold breached data. LeakedSource shut down in 2017, as did LeakBase.


Latest Naked Security podcast

LISTEN NOW

Click-and-drag on the soundwaves below to skip to any point in the podcast.

Products You May Like

Articles You May Like

Company Launches Lockdown-Friendly Hacking Competition
5 tips for keeping your data safe this World Backup Day
Virgin Orbit announces new plans for first Asian spaceport in Oita, Japan
Hackers Exploit Zero-Day Bugs in Draytek Devices to Target Enterprise Networks
Hackers Used Local News Sites to Install Spyware On iPhones

Leave a Reply

Your email address will not be published. Required fields are marked *