Connect with us

Hi, what are you looking for?



Hundreds Access Fake Bank Account Data “Leaked” to Dark Web

Researchers at Bitglass have tracked the journey of a series of fake accounts “leaked” to the Dark Web to have an overview of login attempts and how such data travels across the underground.

Researchers at Bitglass have tracked the journey of a series of fake accounts “leaked” to the Dark Web to have an overview of login attempts and how such data travels across the underground.

This is the second operation of its kind conducted by Bitglass, after the company tracked fake personal data across the globe in a similar experiment last yearThe company discovered at the time that the leaked data traveled five continents and 22 countries within two weeks and that it was viewed more than 1,000 times and downloaded 47 times.

Dubbed Project Cumulus, the second annual “Where’s Your Data” experiment (PDF) involved creating a digital identity for an employee of a fictitious retail bank, along with a functional web portal for the bank, and a Google Drive account, and pairing them with real credit-card data. Researchers leaked “phished” Google Apps credentials to the Dark Web and started tracking the activity on these accounts.

Bitglass researchers registered five bank login attempts and three Google Drive login attempts within 24 hours after the so called leak. Within 48 hours of the initial leak, files were downloaded, and the account was viewed hundreds of times over the course of a month, with many hackers successfully accessing the victim’s other online accounts.

The researchers recorded more than 1400 visits to the Dark Web credentials and the fictitious bank’s web portal and note that one in ten hackers attempted to log in to Google with the leaked credentials. Moreover, they say that 94 percent of hackers who accessed the Google Drive uncovered the victim’s other online accounts and attempted to log into the bank’s web portal.

According to the researchers, 36 percent of hackers successfully accessed the fake victim’s personal banking account using the leaked password, while some of them logged into the account several times. Bitglass also noticed that 68 percent of all logins came from Tor-anonymized IP addresses to hide their tracks.

Last year, when the leaked files were viewed 200 times in the first few days, only few download attempts over Tor were recorded, making files easy to track. However, the researchers noticed a large number of downloads via Tor late last year, after an eight-month quiet period.

Advertisement. Scroll to continue reading.

The experiment also revealed that 12 percent of hackers who successfully accessed the Google Drive attempted to download files with sensitive content and that some of them even cracked encrypted files after download. Researchers were able to track this type of activity because all files were embedded with Bitglass watermarks that messaged back each time new activity was recorded.

The researchers also note that 34.85 percent of the non-Tor visits to the fake bank web portal were from Russia, 15.67 percent came from the United States, 3.5 percent were from China, and 2 percent came from Japan. Overall, login attempts were registered from 30 countries across six continents, the researchers said.

“Our second data-tracking experiment reveals the dangers of reusing passwords and shows just how quickly phished credentials can spread, exposing sensitive corporate and personal data. Organizations need a comprehensive solution that provides a more secure means of authenticating users and enables IT to quickly identify breaches and control access to sensitive data,” Nat Kausik, CEO, Bitglass, said.

Related: DoJ Investigating Leak of FBI, DHS Employee Details

Related: 13 Million Passwords Leaked From Free Hosting Service

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...