{"id":25351,"date":"2019-02-17T14:05:00","date_gmt":"2019-02-17T14:05:00","guid":{"rendered":"http:\/\/79e856ea-46fc-4ff2-b5ce-53f5a6e7cedf"},"modified":"2019-02-17T14:05:00","modified_gmt":"2019-02-17T14:05:00","slug":"hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/","title":{"rendered":"Hacker puts up for sale third round of hacked databases on the Dark Web"},"content":{"rendered":"<p>A hacker going by the name of Gnosticplayers has put up for sale another set of hacked databases on a Dark Web marketplace.<\/p>\n<p>This is the third round of hacked databases the hacker has published on the Dark Web marketplace known as Dream Market. He previously posted a batch of 16 databases containing the data of 620 million users and a second batch of eight databases with the data of <a href=\"https:\/\/www.zdnet.com\/article\/127-million-user-records-from-8-companies-put-up-for-sale-on-the-dark-web\/\" target=\"_blank\">127 million users<\/a>.<\/p>\n<p>Today, the hacker published eight more hacked DBs containing data for 92.76 million users. The biggest name in today&#8217;s batch is GfyCat, the famous GIF hosting and sharing platform. The hacker is selling each database individually on Dream Market. Together, all eight are worth 2.6249 bitcoin, which amounts to roughly $9,400.<\/p>\n<p>In an interview with <em>ZDNet<\/em> on Friday, Gnosticplayers took credit for the hacks and denied being just an intermediary.<\/p>\n<p>The hacker says he intends to sell over one billion user records and then disappear with the money. His current total stands at roughly 840 million records.<\/p>\n<p>&#8220;My two main goals are: -money -downfall of American pigs,&#8221; he told us.<\/p>\n<p>New leaks are coming, including one from a cryptocurrency exchange, the hacker told <em>ZDNet<\/em>.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The eight companies whose data Gnosticplayers put up for sale today are listed below:<\/p>\n<table data-cke-table-faked-selection-table=\"\" cellspacing=\"1\" cellpadding=\"1\" border=\"1\">\n<thead readability=\"34\">\n<tr>\n<th scope=\"col\" class=\"cke_table-faked-selection\">Company<\/th>\n<th scope=\"col\" class=\"cke_table-faked-selection\">DB size<\/th>\n<th scope=\"col\" class=\"cke_table-faked-selection\">Breach date<\/th>\n<th scope=\"col\" class=\"cke_table-faked-selection\">Price<\/th>\n<th scope=\"col\" class=\"cke_table-faked-selection\">Content<\/th>\n<\/tr>\n<tr readability=\"7\">\n<td class=\"cke_table-faked-selection\">Legendas.tv (movie sharing service)<\/td>\n<td class=\"cke_table-faked-selection\">3.86 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2017\/10<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.35<\/td>\n<td class=\"cke_table-faked-selection\">username, password (cleartext), email, IP address<\/td>\n<\/tr>\n<tr readability=\"10\">\n<td class=\"cke_table-faked-selection\">Jobandtalent (job portal)<\/td>\n<td class=\"cke_table-faked-selection\">11 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2018\/02<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.4669<\/td>\n<td class=\"cke_table-faked-selection\">id, email, SHA1 encrypted password, password salt, first name, surname, current IP address<\/td>\n<\/tr>\n<tr readability=\"16\">\n<td class=\"cke_table-faked-selection\">Onebip (mobile payment platform)<\/td>\n<td class=\"cke_table-faked-selection\">2.6 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2017\/10<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.2626<\/td>\n<td class=\"cke_table-faked-selection\">user ID, name, email, password (cleartext), address, company info, phone number, PayPal info, banking info, login logs, API key, and other<\/td>\n<\/tr>\n<tr readability=\"7\">\n<td class=\"cke_table-faked-selection\">StoryBird (storytelling service)<\/td>\n<td class=\"cke_table-faked-selection\">4 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2015<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.2334<\/td>\n<td class=\"cke_table-faked-selection\">email, password (SHA256), username, other<\/td>\n<\/tr>\n<tr readability=\"5\">\n<td class=\"cke_table-faked-selection\">StreetEasy (real estate)<\/td>\n<td class=\"cke_table-faked-selection\">1 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2018\/05<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.175<\/td>\n<td class=\"cke_table-faked-selection\">username, email, password hash (SHA1) and salt, other<\/td>\n<\/tr>\n<tr readability=\"7\">\n<td class=\"cke_table-faked-selection\">GfyCat (GIF image hosting)<\/td>\n<td class=\"cke_table-faked-selection\">8 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2018<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.35<\/td>\n<td class=\"cke_table-faked-selection\">username, password hash (SHA512), email, other<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td class=\"cke_table-faked-selection\">ClassPass (fitness service)<\/td>\n<td class=\"cke_table-faked-selection\">1.5 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2018<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.204<\/td>\n<td class=\"cke_table-faked-selection\">email, password hash (SHA1), username, country, sex, full name<\/td>\n<\/tr>\n<tr readability=\"7\">\n<td class=\"cke_table-faked-selection\">Pizap (online photo editor)<\/td>\n<td class=\"cke_table-faked-selection\">60.8 Mil<\/td>\n<td class=\"cke_table-faked-selection\">2018<\/td>\n<td class=\"cke_table-faked-selection\">\u0e3f0.583<\/td>\n<td class=\"cke_table-faked-selection\">Facebook user ID, password hash (SHA1 \/ not for all), email address, other<\/td>\n<\/tr>\n<\/thead>\n<\/table>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/02\/17\/fade0a37-8738-4a8c-a754-97b98399be87\/fe1be9be20af6cda1f7467966a461106\/gnosticplayers-round-3.png\" class=\"\" alt=\"Gnosticplayers round 3\"\/><\/span> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>None of the eight companies listed in Gnosticplayers&#8217; ad had previously disclosed a data breach. ZDNet has sent requests for comment to the eight companies. We will update the article with any information we get back. However, many of the companies whose data the hacker has put up for sale in the past week have already admitted to suffering security breaches, making very likely that the data he&#8217;s selling today is also legitimate.<\/p>\n<p>In addition, each listing was also accompanied with the following message:<\/p>\n<blockquote readability=\"17\">\n<p>George Duke-Cohan is a young and talented boy, instead of giving him a chance, the UK govt sends him to prison for three years.<br \/>Now, he&#8217;s been told by the American government, that he faces 65 years for the offense he was already sentenced to three years in the UK. It means he will be judged twice ??<br \/>May this upcoming release of dumps serve as a reminder:<br \/>When countries claim to respect their citizens, they have duty protect them. I wouldn&#8217;t be surprised whether George Duke-Cohan ends his life, the UK gov already destroyed him and doing this is like sentencing him to death.<br \/>If he is not given a fair justice during the upcoming days, weeks, years, more data will be released&#8230;.<\/p>\n<\/blockquote>\n<p>George Duke-Cohan is a UK national who is part og the <a href=\"https:\/\/www.zdnet.com\/article\/fbi-arrests-second-apophis-squad-hacker-in-the-us\/\" target=\"_blank\">Apophis Squad hacking crew<\/a>. He was <a href=\"http:\/\/www.nationalcrimeagency.gov.uk\/news\/1460-british-teen-admits-school-and-flight-bomb-threats\" target=\"_blank\" rel=\"noopener noreferrer\">arrested last summer<\/a> and sentenced to three years in prison <a href=\"http:\/\/www.nationalcrimeagency.gov.uk\/news\/1515-british-teen-jailed-after-admitting-school-and-flight-bomb-threats\" target=\"_blank\" rel=\"noopener noreferrer\">last December<\/a>.<\/p>\n<p><strong>UPDATE:<\/strong> GfyCat told ZDNet that they have started an investigation into the hacker&#8217;s claims.<\/p>\n<p>&#8220;We can also confirm that any account databases are strongly encrypted and salted, so no plain text passwords would be in any compromised data,&#8221; a spokesperson told us via email today.<\/p>\n<h3>More data breach coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacker is selling 93 million user records from eight companies, including GfyCat.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25352,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-25351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker puts up for sale third round of hacked databases on the Dark Web 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker puts up for sale third round of hacked databases on the Dark Web 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-17T14:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png\" \/>\n\t<meta property=\"og:image:width\" content=\"721\" \/>\n\t<meta property=\"og:image:height\" content=\"832\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hacker puts up for sale third round of hacked databases on the Dark Web\",\"datePublished\":\"2019-02-17T14:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/\",\"name\":\"Hacker puts up for sale third round of hacked databases on the Dark Web 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png\",\"datePublished\":\"2019-02-17T14:05:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png\",\"width\":721,\"height\":832},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker puts up for sale third round of hacked databases on the Dark Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker puts up for sale third round of hacked databases on the Dark Web 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/","og_locale":"en_US","og_type":"article","og_title":"Hacker puts up for sale third round of hacked databases on the Dark Web 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-17T14:05:00+00:00","og_image":[{"width":721,"height":832,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hacker puts up for sale third round of hacked databases on the Dark Web","datePublished":"2019-02-17T14:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/"},"wordCount":636,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/","url":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/","name":"Hacker puts up for sale third round of hacked databases on the Dark Web 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png","datePublished":"2019-02-17T14:05:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web.png","width":721,"height":832},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hacker puts up for sale third round of hacked databases on the Dark Web"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25351"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25351\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25352"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}