Feedback Friday: Industry Experts Comment on Hive Ransomware Takedown

Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Authorities Seize Hacked Server Marketplace

Law enforcement agencies in the United States and Europe today announced the seizure of xDedic, an underground online marketplace selling access to hacked servers and personally identifiable information. 

Law enforcement agencies in the United States and Europe today announced the seizure of xDedic, an underground online marketplace selling access to hacked servers and personally identifiable information. 

xDedic was detailed in June 2016, when it was selling access to over 176,000 unique hacked servers around the world. Active since around 2014, the website almost immediately turned to the Tor network to keep its operators hidden from security researchers and law enforcement. 

Despite that, however, authorities in the United States, Belgium and Ukraine, in collaboration with the European law enforcement agency Europol, managed to seize the shady marketplace on January 24, effectively ceasing its operation. 

xDedic used a widely distributed network to keep the location of its underlying servers hidden, and also used the virtual currency Bitcoin to maintain anonymity for its administrators, buyers, and sellers. 

The website provided buyers with the ability to search for compromised computer credentials by various criteria, including price, geographic location, and operating system. 

Evidence obtained during the investigation suggests the website facilitated more than $68 million in fraud, impacting victims worldwide, spanning all industries, “including local, state, and federal government infrastructure, hospitals, 911 and emergency services, call centers, major metropolitan transit authorities, accounting and law firms, pension funds, and universities.”

In the United States, the investigation was led by the Federal Bureau of Investigation and the Internal Revenue Service (IRS) of Tampa (Florida), with assistance from U.S. Immigration and Customs Enforcement’s Homeland Security Investigations and the Florida Department of Law Enforcement. 

The Federal Computer Crime Unit (FCCU), the Federal Prosecutor’s Office and the Investigating Judge of Belgium, along with the Ukrainian National Cyber Police and Prosecutor General’s office of Ukraine led the investigation in Europe, with the support of the Bundeskriminalamt of Germany and Europol. 

Also today, Europol announced that authorities in Europe and beyond are taking action against the users of DDoS-for-hire marketplaces, after tens of such services were seized last year.

Related: Honeypot Highlights Danger to ICS Systems From Criminal Hackers

Related: Hacker Offers Access to Machine at International Airport for $10

Related: Over 176,000 Unique Hacked Servers Sold on xDedic Marketplace

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.

Cybercrime

Cybercriminals earned significantly less from ransomware attacks in 2022 compared to 2021 as victims are increasingly refusing to pay ransom demands.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.