Old data breaches carried out years ago are entering into the limelight thanks to anonymous internet users like Keen.
Earlier this week, Keen, a data collector who runs the site Vigilante.pw, helped to uncover details about stolen data taken from the popular porn site Brazzers. A copy of almost 800,000 accounts, probably originally hacked back in 2012, fell into his hands.
The stolen database is just one of the many Keen has on file, in fact, and each one can involve thousands or even millions of internet accounts. Vigilante.pw continually archives past data breaches as a way to warn the public.
“I figured it would be a good way to raise awareness about breaches,” Keen said in an instant message.
Mountains of data
Vigilante.pw is among numerous data breach monitoring sites started by anonymous internet users that routinely post details on newly uncovered stolen data. They're a big part of the reason why, week after week, the full scale of past hacks is gradually beginning to surface.
Recent news on a 2012 Dropbox breach, for example, was initially sourced from a separate service known as Leakbase. That site obtained a copy of the stolen accounts and found email addresses and hashed passwords belonging to 68 million users.
Another service, called LeakedSource, has also been unearthing details on past hacks at music and gaming sites. “For the most part, the reason all of these mega breaches are coming to light now is because we've gone out and found the data exists,” LeakedSource said in an email.
The data’s age is also playing a role. For hackers, stolen information on user accounts is most useful when it's fresh and the breach has been kept secret. Most of the breaches coming to light today occurred three or four years ago.
“When hackers breach a site, they keep [the data] to themselves for years,” Leakbase said in a message over Twitter.
That stolen data often includes email addresses and crackable passwords, all of which can be exploited to carry out other hacks or used for spam mail purposes.
Uncovering old hacks
However, hackers can also choose to sell or trade the data, especially as it ages. Over time, the stolen goods will lose value and circulate more cheaply across the black market and through the underground data trading community. Along the way, it may leak out.
Kali is one anonymous internet user who collects stolen databases to study internet trends, and she supplies what he finds to Vigilante.pw. She said she feels sorry for affected users who are unaware they may be at risk.
“They have no clue what’s going on around them,” Kali said in an instant message.
Data breach monitoring sites, however, are stepping in and alerting the media about alleged breaches -- some of which weren’t fully known.
“There have been some cases of websites straight up denying that they have been breached, when it is clear that they have,” said Keen. Other websites may notify the public, he said, but by then it can be too late.
Almost every day, Vigilante.pw is collecting new stolen databases, sometimes even from hackers wanting to publicly shame a website for being breached. “The problem is that we add so much data that it doesn't really garner enough attention unless we contact journalists,” Keen said.
A double-edged sword?
Raising awareness is one thing, but other sites, including Leakbase and LeakedSource, are trying to make a business out of breach monitoring. Both go beyond listing data breaches and offer a paid, searchable database of all the accounts they have on file. That can include information such as passwords.
LeakedSource said the paid services can help businesses detect which of their users have been exposed in past beaches.
“These people aren't abusing our services," LeakedSource said. "We are actively turning away people offering money because we couldn't verify what they were going to be using our services for.”
LeakedSource's website also says that all the information it has found is already online in some form and freely available.
Not everyone agrees with making the stolen data so accessible, especially if the motive is making money.
“Where would you draw the line about bringing breaches to light?” Kali asked.
Although it's important to warn the public, she fears that posting too many details about data breaches, especially those of private services, can tip off hackers about where to strike next.
"That's why I think it's wrong," she said.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.