Cryptocurrency Theft Detailed Report: Sold for Only $105 on the Dark Web

marsbitОпубліковано о 2025-12-29Востаннє оновлено о 2025-12-29

Анотація

Phishing attacks go beyond stealing credentials through fake links. Stolen data is quickly commodified on the dark web. This report traces how data is collected via email, Telegram bots, and administration panels (like BulletProofLink), then sold and reused in future attacks. Data types range from instantly monetizable information (bank cards, e-wallet logins) to data used for follow-up attacks (account credentials, phone numbers) or targeted schemes (biometric data, ID scans). Analysis shows 88.5% of attacks in early 2025 aimed to steal online account credentials. On dark web markets, data is packaged, validated, and sold—often via Telegram—with prices varying based on account age, balance, and attached services. Old leaked data remains dangerous, as criminals compile comprehensive digital profiles for highly targeted attacks like whaling. Once stolen, it doesn’t disappear. Users must use unique passwords, enable multi-factor authentication, and monitor their digital footprint to reduce risk.

Author: Olga Altukhova Editor: far@Centreless

Compiled by: Centreless X(Twitter)@Tocentreless

Typical phishing attacks often involve users clicking on a fraudulent link and entering their credentials on a fake website. However, the attack is far from over at this point. Once sensitive information falls into the hands of cybercriminals, it immediately becomes a commodity, entering the "pipeline" of the dark web market.

In this article, we will trace the flow path of stolen data: from data collection through various tools (such as Telegram bots and advanced admin panels), to the sale of the data and its subsequent use in new attacks. We will explore how once-leaked usernames and passwords are integrated into vast digital profiles, and why data leaked years ago can still be exploited by criminals to carry out targeted attacks.

Data Collection Mechanisms in Phishing Attacks Before tracking the subsequent whereabouts of stolen data, we first need to understand how this data leaves the phishing page and reaches the cybercriminals.

Through the analysis of real phishing pages, we have identified the following most common data transmission methods:

  • Sent to an email address
  • Sent to a Telegram bot
  • Uploaded to an admin panel

It is worth mentioning that attackers sometimes use legitimate services for data collection to make their servers harder to detect. For example, they may use online form services like Google Forms, Microsoft Forms, etc. Stolen data may also be stored on GitHub, Discord servers, or other websites. However, for the convenience of this analysis, we will focus on the main data collection methods mentioned above.

Email

The data entered by the victim into the HTML form on the phishing page is sent to the attacker's server via a PHP script, which then forwards it to an email address controlled by the attacker. However, due to the many limitations of email services—such as delivery delays, the possibility of the hosting provider banning the sending server, and operational inconvenience when handling large amounts of data—this method is gradually decreasing.

Phishing kit contents

For example, we once analyzed a phishing kit targeting DHL users. The index.php file contained a phishing form for stealing user data (here, email address and password).

Phishing form imitating the DHL website

The information entered by the victim is then sent to the email address specified in the mail.php file via a script in the next.php file.

Contents of the PHP scripts

Telegram Bot

Unlike the method above, scripts using a Telegram bot specify a Telegram API URL containing a bot token and corresponding Chat ID, rather than an email address. In some cases, this link is even hardcoded into the phishing HTML form. Attackers design detailed message templates to be automatically sent to the bot upon successful data theft. A code example is as follows:

Code snippet for data submission

Compared to sending data via email, using a Telegram bot provides phishers with stronger functionality, which is why this method is becoming increasingly popular. Data is transmitted to the bot in real-time, and the operator is notified immediately. Attackers often use disposable bots, which are harder to track and ban. Furthermore, its performance does not depend on the quality of the phishing page hosting service.

Automated Admin Panels

More sophisticated cybercriminals use specialized software, including commercial frameworks like BulletProofLink and Caffeine, often provided as "Platform as a Service" (PaaS). These frameworks provide a web interface (dashboard) for phishing campaigns, facilitating centralized management.

All data collected by the phishing pages controlled by the attacker is aggregated into a unified database and can be viewed and managed through their account interface.

Sending data to the administration panel

These admin panels are used to analyze and process victim data. Specific functions vary depending on the panel's customization options, but most dashboards typically have the following capabilities:

  • Real-time statistics classification: View the number of successful attacks by time, country, and support data filtering
  • Automatic verification: Some systems can automatically verify the validity of stolen data, such as credit card information or login credentials
  • Data export: Support downloading data in various formats for subsequent use or sale

Example of an administration panel

Admin panels are a key tool for organized cybercrime groups.

It is worth noting that a single phishing campaign often employs multiple data collection methods simultaneously.

Data Types Coveted by Cybercriminals

The data stolen in phishing attacks varies in value and purpose. In the hands of criminals, this data is both a means of profit and a tool for carrying out complex multi-stage attacks.

Based on their use, stolen data can be divided into the following categories:

  • Immediate Monetization: Directly selling raw data in bulk, or immediately stealing funds from the victim's bank account or e-wallet
  1. Bank card information: Card number, expiration date, cardholder name, CVV/CVC code
  2. Online banking and e-wallet accounts: Login name, password, and one-time two-factor authentication (2FA) verification codes
  3. Accounts linked to bank cards: Login credentials for online stores, subscription services, or payment systems like Apple Pay/Google Pay
  • Used for subsequent attacks for further monetization: Using stolen data to launch new attacks for more gains
  1. Credentials for various online accounts: Usernames and passwords. It is worth noting that even without a password, just the email or phone number used as a login name has value to attackers
  2. Phone numbers: Used for phone scams (such as tricking users into giving 2FA codes) or phishing via instant messaging apps
  3. Personal Identifiable Information (PII): Full name, date of birth, address, etc., often used for social engineering attacks
  • Used for targeted attacks, extortion, identity theft, and deepfakes
  1. Biometric data: Voice, facial images
  2. Scanned copies and numbers of personal documents: Passport, driver's license, social security card, taxpayer identification number, etc.
  3. Selfies with documents: Used for online loan applications and identity verification
  4. Corporate accounts: Used for targeted attacks against businesses

We analyzed phishing and scam attacks that occurred between January and September 2025 to determine the data types most frequently targeted by criminals. The results showed: 88.5% of attacks aimed to steal various online account credentials, 9.5% targeted personal identity information (name, address, date of birth), and only 2% focused on stealing bank card information.

Selling Data on the Dark Web Market

Apart from being used for real-time attacks or immediate monetization, most stolen data is not used immediately. Let's take a deeper look at its flow path:

1. Data Packaged for Sale

After being consolidated, data is sold on dark web markets in the form of "data dumps"—compressed packages often containing millions of records from various phishing attacks and data breaches. A data dump may sell for as low as $50. The main buyers are often not active scammers, but dark web data analysts, the next link in the supply chain.

2. Classification and Verification

Dark web data analysts filter the data by type (email accounts, phone numbers, bank card information, etc.) and run automated scripts for verification. This includes checking the validity of the data and its potential—for example, whether a set of Facebook account passwords can also log into Steam or Gmail. Since users tend to use the same password on multiple websites, data stolen from a service years ago may still be applicable to other services today. Verified accounts that can still log in normally are sold at a higher price.

Analysts also correlate and integrate user data from different attack incidents. For example, an old social media leaked password, login credentials obtained from a phishing form impersonating a government portal, and a phone number left on a scam website may all be compiled into a complete digital profile of a specific user.

3. Sale on Specialized Markets

Stolen data is usually sold through dark web forums and Telegram. The latter is often used as an "online store," displaying prices, buyer reviews, and other information.

Offers of social media data, as displayed in Telegram

Account prices vary greatly, depending on many factors: account age, balance, linked payment methods (bank card, e-wallet), whether two-factor authentication (2FA) is enabled, and the popularity of the service platform. For example, an e-commerce account linked to an email, with 2FA enabled, a long usage history, and a large number of order records, will be sold at a higher price; for game accounts like Steam, expensive game purchase records increase their value; and online banking data involving high-balance accounts from reputable banks commands a significant premium.

The table below shows examples of prices for various types of accounts found on dark web forums as of 2025*.

4. High-Value Target Screening and Targeted Attacks

Criminals pay particular attention to high-value targets—users who hold important information, such as corporate executives, accountants, or IT system administrators.

Here is a possible scenario for a "whaling" attack: Company A has a data breach containing information on an employee who previously worked there and is now an executive at Company B. The attackers use Open Source Intelligence (OSINT) analysis to confirm that the user is currently employed at Company B. They then carefully forge a phishing email that appears to be from the CEO of Company B and send it to the executive. To enhance credibility, the email even cites some facts about the user from the previous company (of course, the attack methods are not limited to this). By lowering the victim's vigilance, criminals have the opportunity to further infiltrate Company B.

It is worth noting that such targeted attacks are not limited to the corporate sphere. Attackers may also target individuals with high bank account balances, or users holding important personal documents (such as those required for micro-loan applications).

Key Takeaways

The flow of stolen data is like an efficiently operating pipeline, with each piece of information becoming a commodity with a clear price tag. Today's phishing attacks widely use diverse systems to collect and analyze sensitive information. Once data is stolen, it quickly flows into Telegram bots or the attacker's admin panels, where it is then classified, verified, and monetized.

We must be清醒地认识到清醒地认识到 (clearly aware): Once data is leaked, it does not disappear into thin air. On the contrary, it is constantly accumulated, integrated, and may be used months or even years later to carry out targeted attacks, extortion, or identity theft against the victims. In today's online environment, staying vigilant, setting unique passwords for each account, enabling multi-factor authentication, and regularly monitoring one's digital footprint are no longer suggestions, but necessities for survival.

If you unfortunately become a victim of a phishing attack, please take the following measures:

  1. If bank card information is leaked, immediately call the bank to report the loss and freeze the card.
  2. If account credentials are stolen, immediately change the password for that account, and also change the passwords for all other online services that use the same or similar passwords. Be sure to set a unique password for each account.
  3. Enable multi-factor authentication (MFA/2FA) on all supported services.
  4. Check the account's login history and terminate any suspicious sessions.
  5. If your instant messaging or social media account is stolen, immediately notify friends and relatives, reminding them to be wary of fraudulent messages sent in your name.
  6. Use professional services (such as Have I Been Pwned, etc.) to check if your data has appeared in known data breach incidents.
  7. Be highly vigilant of any unexpected emails, phone calls, or promotional information you receive—they may seem credible precisely because attackers are using your leaked data.

Пов'язані питання

QWhat are the three most common methods for transmitting stolen data from phishing pages to cybercriminals?

AThe three most common methods are: sending to an email address, sending to a Telegram bot, and uploading to an administration panel.

QWhy are cybercriminals increasingly using Telegram bots over email for data collection?

ATelegram bots provide real-time data transmission, immediate notifications to the operator, are harder to track and block, and their performance is not dependent on the quality of the phishing page hosting service.

QWhat percentage of phishing and scam attacks from January to September 2025 aimed to steal online account credentials?

A88.5% of the attacks aimed to steal various online account credentials.

QWhat is the typical first step in the 'pipeline' of stolen data after it is collected and before it is used in new attacks?

AThe data is packaged and sold as 'dumps' on dark web marketplaces, often for as little as $50.

QAccording to the article, what is one crucial step a victim should take if their online account credentials are stolen?

AThey should immediately change the password for that account and also change the passwords for all other online services where the same or a similar password was used, ensuring a unique password for every account.

Пов'язані матеріали

Why Hasn't the U.S. Seen the Rise of 'Huabei' or 'Jiebei'?

The article explores why the U.S. lacks large-scale consumer credit products like China's "Huabei" and "Jiebei," despite having a developed financial sector. Key reasons include: 1. **Structural Barriers**: A fragmented federal and state regulatory system, reinforced by post-2008 reforms like the Dodd-Frank Act, raises compliance costs and protects traditional banks, stifling fintech innovation. 2. **Credit Card Dominance**: Credit cards, used by 70-80% of adults, form a $1.28 trillion debt market with high APRs (avg. 22.3%). This system cross-subsidizes users who pay in full with those carrying balances, creating a predatory yet entrenched ecosystem. 3. **Data Privacy Laws**: Strict regulations (e.g., FCRA, CCPA) prevent tech giants from leveraging behavioral data for credit scoring, unlike in China where such data fuels fintech models. 4. **Capital Market Disincentives**: Wall Street penalizes tech firms entering finance due to lower valuations associated with heavy regulation and risk, as seen in Apple’s failure with Apple Card. 5. **Banking Oligopoly**: Major banks control consumer lending, leveraging lobbying power and consumer habits to maintain high-cost credit, while alternatives like payday loans (400% APR) or "unbanked" services remain niche or exploitative. Ultimately, regulatory, structural, and corporate interests collectively block the emergence of accessible, low-cost digital lending in the U.S.

Odaily星球日报42 хв тому

Why Hasn't the U.S. Seen the Rise of 'Huabei' or 'Jiebei'?

Odaily星球日报42 хв тому

More and More 'Model Supermarkets' Are Opening: ByteDance, Alibaba, and Tencent Compete to Integrate

Chinese tech giants like ByteDance, Alibaba, and Tencent are accelerating the rollout of integrated AI model subscription services—dubbed “model supermarkets”—to provide developers with bundled access to multiple leading domestic large language models (LLMs). ByteDance’s Volcengine recently upgraded its "Coding Plan" by adding newer models like GLM-5.1, Minimax M2.7, and Kimi k2.6, allowing subscribers to use various top models under a single monthly fee starting at ¥40. However, user feedback reveals significant issues, including rapid consumption of usage limits (e.g., hitting caps within hours), frequent server errors (like HTTP 429), and slow response times during peak hours. Complaints about misleading deduction rates—where calls to advanced models consume more quota—are also common. The trend is industry-wide: Alibaba, Tencent, and Baidu have all launched similar multi-model coding plans. While these platforms reduce trial costs for developers, they also expose challenges in balancing affordability with service quality and computational stability. Amid this shift, independent AI companies like Zhipu, MiniMax, and Moonlight Face (Kimi) are developing strategies to avoid becoming mere “pipes” in this ecosystem—focusing on vertical applications, autonomous agents, and long-context models to retain competitiveness. Analysts suggest that, while platform aggregation may pressure model firms in the short term, specialized and vertical AI capabilities will remain differentiated in the long run.

marsbit45 хв тому

More and More 'Model Supermarkets' Are Opening: ByteDance, Alibaba, and Tencent Compete to Integrate

marsbit45 хв тому

Торгівля

Спот
Ф'ючерси
活动图片