• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Hacking News
Leaks

Data of millions of Japanese sold on underground hacking forums

May 24th, 2018 Waqas Security, Leaks 0 comments
Data of millions of Japanese sold on underground hacking forums
Share on FacebookShare on Twitter

A cybercriminal operating from outside China was found to be selling data of nearly 200 million Japanese users on underground hacking forums, claims FireEye’s iSight Intelligence report.

In the was noted that the data is collected from 50 not-so-popular Japanese websites. Once a huge database was developed, the data was put for sale in December 2017 and the asking price is just $150 (¥1,000 CNY) for the entire archive.

In the report, FireEye researchers noted that small Japanese websites were the key targets of the hackers, mainly the sites connected with food, beverage, financial, entertainment, transportation and retail industry.

FireEye claims that the data is authentic because it not only contains information of users who had already gotten their private data leaked in previous breaches but also data of new users. Some of the data belongs to the hack attacks that took place in June 2016 while the new ones go as far as May 2013.

Data vary considerably according to the site from where the information was stolen. However, a majority of datasets have similar information including real names, dates of birth, home addresses, contact numbers and email IDs.

See: Japan’s Coincheck cryptocurrency exchange hacked; $534 Million stolen

Some of the buyers commented on the thread, where the alleged Chinese hacker posted the database for sale, stating that they have already bought the PII cache but didn’t receive the files yet. Quite possibly the comments were posted by other data sellers to mislead potential buyers or they might just be true.

FireEye claims to have tracked the online ID of the hacker on a QQ social network, but this particular ID is linked to another hacker’s online ID who has a bad reputation and bad reviews on the internet. As noted by FireEye researchers:

“This QQ address is connected to an individual living in China’s Zhejiang province.”

This hacker is identified to be active since 2013, which is also the year of the oldest data that is part of the hacked database. Researchers at FireEye reported that the hacker is selling data on multiple hacking forums based in China and in other countries as well including North American countries, New Zealand, Australia, European countries, Hong Kong and Taiwan.

The database although doesn’t include very sensitive information but whatever is included is enough to allow anyone carrying out identity theft, fraud, spam, and malware distribution.

Note:

According to WorldoMeters, the total population of Japan is around 127,216,210 but since FireEye researchers have found data on 200 million people it is quite possible that the dataset includes information on several other nationalities.

See: Japanese hosting company Kagoya hacked; credit card data stolen

Image credit: Depositphotos

  • Tags
  • China
  • Cyber Crime
  • dark web
  • Data
  • hacking
  • internet
  • Japan
  • LEAKS
  • Privacy
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Multilingual malware hits Android devices for phishing & cryptomining
Next article Teen monitoring app exposes plaintext Apple ID passwords of its users
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Gamarue malware found in UK Govt-funded laptops for homeschoolers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Gamarue malware found in UK Govt-funded laptops for homeschoolers
Security

Gamarue malware found in UK Govt-funded laptops for homeschoolers

34
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

311
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

101

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us