Security

Cyber-crime

Data broker amasses 100M+ records on people – then someone snatches, sells it

We call this lead degeneration


What's claimed to be more than 183 million records of people's contact details and employment info has been stolen or otherwise obtained from a data broker and put up for sale by a miscreant.

The underworld merchant, using the handle KryptonZambie, has put a $6,000 price tag on the information in a cybercrime forum posting. They are offering 100,000 records as a sample for interested buyers, and claim the data as a whole includes people's corporate email addresses, physical addresses, phone numbers, names of employers, job titles, and links to LinkedIn and other social media profiles.

We believe this information is already publicly available, and was gathered up by a data-broker called Pure Incubation, now called DemandScience. That biz told us it was aware of its data being put up for sale, and sought to clarify what had been obtained – business-related contact details that are already out there.

"It is also important to note that we process publicly available business contact information, and do not collect, store, or process consumer data or any type of credential information or sensitive personal information including accounts, passwords, home addresses or other personal, non-business information," a DemandScience spokesperson said in an email to The Register.

Seems to us this is the circle of data brokerage life. One org scrapes a load of info from the internet to profit from, someone else comes along and gets that info one way or another to profit from, sells it to others to profit from...

Here's the rest of the company's statement, in which it tells us it doesn't for now think the info was obtained directly from its systems in an IT security breach:

Earlier this year we became aware that a threat actor, in a post on a black hat hacking crime forum, claimed that he or she had information that was allegedly hacked from Pure Incubation, and that it involved data legacy systems which have been decommissioned. We immediately activated our security and incident response protocols. We determined that all our systems are 100% operational, and the investigation, conducted by internal resources and outside counsel, found that no systems had been breached.

We concluded that some older Pure Incubation data could have been shared by or hacked from a contractor or publisher partner, but do not have proof. We are continuing to monitor the situation, so it would not be appropriate to expand further at this point.

DemandScience claims to "generate leads for a future-proof sales and marketing funnel," all of which is marketing jargon for: We scrape people's publicly available identifiers and other data from a variety of sources, bundle it up nicely, and sell it to companies that then use it to target you in advertising campaigns. 

In other words: It's a data broker, which means, if you are lucky enough to live in California, at least, you can opt out of DemandScience selling your data.

Have I Been Pwned spotted the data dump for sale, and added it to its list of security incidents on Wednesday. The info went on sale around February, it seems, and the data thieves are flogging at least 122 million unique email addresses scooped up by Pure Incubation.

In a subsequent report by HIBP founder and Microsoft regional director Troy Hunt, which includes a screenshot of an email from DemandScience – sent to someone whose info was in the data peddled by KryptonZambie – that blamed the leak on a "system that has been decommissioned for approximately two years."

Infosec watcher HackManac also sounded the alarm with a screenshot of the miscreant's forum posting, in which KryptonZambie claimed 183,745,481 records are up for grabs. We should note: Neither HackManac nor The Register has verified these claims.

After coming across the pile of data for sale, and hearing from someone whose personal information was swept up in the affair, Hunt said he decided to check whether his own info was included. He did find a decade-old email address and an incorrect job title.

"I'll be entirely transparent and honest here - my exact words after finding this were 'motherfucker!' True story, told uncensored here because I want to impress on the audience how I feel when my data turns up somewhere publicly," Hunt wrote.

We couldn't have said it any better ourselves. ®

Send us news
18 Comments

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed

Here's what $20 gets you these days

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

Encryption backdoor debate 'done and dusted,' former White House tech advisor says

When the FBI urges E2EE, you know it's serious business

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools