• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Automated dark web markets sell corporate email accounts for $2

Bill Toulas by Bill Toulas
December 8, 2022
Reading Time: 3 mins read
0
US charges BEC suspects with targeting federal health care programs

Hand holding a digital dollar symbol

RELATED POSTS

DISH slapped with multiple lawsuits after ransomware cyber attack

Twitter open-sources recommendation algorithm code

15 million public-facing services vulnerable to CISA KEV flaws

Cybercrime marketplaces are increasingly selling stolen corporate email addresses for as low as $2 to fill a growing demand by hackers who use them for business email compromise and phishing attacks or initial access to networks.

Analysts at Israeli cyber-intelligence firm KELA have closely followed this trend, reporting at least 225,000 email accounts for sale on underground markets.

The largest webmail shops are Xleet and Lufix, claiming to offer access to over 100k breached corporate email accounts, with prices ranging between $2 and $30, if not more, for highly-desirable organizations.

Webmail shop offers
Webmail shop offers (KELA)

Typically, these accounts were stolen via password cracking (brute-forcing) or credential stuffing, had their credentials stolen through phishing, or were bought from other cybercriminals.

Hackers use their access to corporate email accounts in targeted attacks like business email compromise (BEC), social engineering, spear-phishing, and deeper network infiltration.

Rise of webmail auto-shops

Sales of corporate email access have remained steady in the cybercrime space over the past couple of years, with threat actors on all major hacking forums selling email “combo lists” to access various firms.

Buy JNews
ADVERTISEMENT
Combo list sold on Breached forums
Combo list sold on ‘Breached’ forums (KELA)

In a recent high-profile case, ransomware actor ‘Everest’ offered alleged access to email accounts of an aerospace manufacturing company for $15,000.

Both bulk and curated offers involve the tedious process of negotiating with the seller and taking a risk on the validity of the claims. At the same time, the demand for corporate emails continues to grow.

This has created the need for automated webmail shops like Xleet, Odin, Xmina, and Lufix, which allow cybercriminals to easily buy access to the email accounts of their choice.

The main page of the Xleet shop
The main page of the Xleet shop (KELA)

“Many of these shops provide advanced functions, such as “proofs” that webmail access indeed works,” explains KELA in the report.

“These proofs include performing a live check on the email to verify the access or showing a screenshot of the compromised account inbox.”

The checker system incorporated on all four shops
The checker system incorporated on all four shops (KELA)

The most attractive offers are Office 365 accounts, which account for almost half of all listed webmail, followed by hosting providers like cPanel, GoDaddy, and Ionos. 

Providers of email accounts on offer
Providers of email accounts on offer (KELA)

The sellers in these shops aren’t using aliases but hide behind a masking system assigning them numbers. Odin offers more details about the sellers, like the number of items sold, total sales figures, and user ratings.

Seller details on Odin
Seller details on Odin (KELA)

Odin and Xleet also clarify how the webmails were sourced, with the categories including “hacked”, “cracked”, “logs”, or “created.” However, the majority (98%) in Xleet were either “hacked” or “cracked.”

“Logs” are email credentials stolen by info-stealing malware, while “created” are new email accounts that network intruders created on the breached firm using compromised administrator accounts.

The rise of these markets makes it imperative to enforce periodic password resets for all services and platforms to render compromised credentials useless.

Since most of the offered webmails are cracked or hacked, using strong (longer) passwords and training personnel to identify phishing emails would help reduce these threats significantly.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Dish Network confirms ransomware attack behind multi-day outage
Cyber Security

DISH slapped with multiple lawsuits after ransomware cyber attack

April 1, 2023
Twitter open-sources recommendation algorithm code
Cyber Security

Twitter open-sources recommendation algorithm code

March 31, 2023
Antivirus and EDR solutions tricked into acting as data wipers
Cyber Security

15 million public-facing services vulnerable to CISA KEV flaws

March 31, 2023
New GoTrim botnet brute forces WordPress site admin accounts
Cyber Security

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023

Recommended Stories

Malicious Dota 2 game modes infected players with malware

Malicious Dota 2 game mods infected players with malware

February 8, 2023
Severe AMI MegaRAC flaws impact servers from AMD, ARM, HPE, Dell, others

Severe AMI MegaRAC flaws impact servers from AMD, ARM, HPE, Dell, others

December 5, 2022
PancakeSwap’s attempt to flip Uniswap’s TVL thwarted for now

PancakeSwap’s attempt to flip Uniswap’s TVL thwarted for now

March 12, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    136 shares
    Share 54 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Toncoin [TON] climbs into resistance zone, but momentum favored the bulls
  • The Sandbox [SAND] deserted by users? How NFTs and prices closed Q1
  • DISH slapped with multiple lawsuits after ransomware cyber attack

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?