{"id":26187,"date":"2019-03-18T14:48:26","date_gmt":"2019-03-18T14:48:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29946\/Hacker-Returns-And-Puts-26Mil-User-Records-For-Sale-On-The-Dark-Web.html"},"modified":"2019-03-18T14:48:26","modified_gmt":"2019-03-18T14:48:26","slug":"hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/","title":{"rendered":"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web"},"content":{"rendered":"<p>A hacker who has previously put up for sale over 840 million user records in the past month, has returned with a fourth round of hacked data that he&#8217;s selling on a dark web marketplace.<\/p>\n<p>This time, the hacker has put up for sale the data of six companies, totaling 26.42 million user records, for which he&#8217;s asking 1.2431 bitcoin ($4,940).<\/p>\n<p>The hacker&#8217;s name is Gnosticplayers, and since February 11 the hacker has put up for sale data for 32 companies in three rounds [stories on <a href=\"https:\/\/www.theregister.co.uk\/2019\/02\/11\/620_million_hacked_accounts_dark_web\/\" target=\"_blank\" rel=\"noopener noreferrer\">Round 1<\/a>, <a href=\"https:\/\/techcrunch.com\/2019\/02\/14\/hacker-strikes-again\/\" target=\"_blank\" rel=\"noopener noreferrer\">Round 2<\/a>, and <a href=\"https:\/\/www.zdnet.com\/article\/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web\/\" target=\"_blank\">Round 3<\/a>] on Dream Market, a dark web marketplace.<\/p>\n<p>Today, the hacker published a new batch of files from six new companies, namely game dev platform <a href=\"https:\/\/gamesalad.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GameSalad<\/a>, Brazilian book store <a href=\"https:\/\/www.estantevirtual.com.br\/\" target=\"_blank\" rel=\"noopener noreferrer\">Estante Virtual<\/a>, online task manager and scheduling apps <a href=\"https:\/\/coubic.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Coubic<\/a> and <a href=\"https:\/\/lifebear.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LifeBear<\/a>, Indonesia e-commerce giant <a href=\"https:\/\/www.bukalapak.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bukalapak<\/a>, and Indonesian student career site <a href=\"https:\/\/www.youthmanual.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">YouthManual<\/a>.<\/p>\n<table data-cke-table-faked-selection-table cellspacing=\"1\" cellpadding=\"1\" border=\"1\">\n<thead readability=\"24.5\">\n<tr>\n<th scope=\"col\">Company<\/th>\n<th scope=\"col\">DB size<\/th>\n<th scope=\"col\">Breach date<\/th>\n<th scope=\"col\">Price<\/th>\n<th scope=\"col\">Content<\/th>\n<\/tr>\n<tr readability=\"7\">\n<td>GameSalad (game dev platform)<\/td>\n<td>1.5 Mil<\/td>\n<td>2019\/02<\/td>\n<td>\u0e3f0.0785<\/td>\n<td>email, password (SHA1\/SHA256), username, IP address<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td>Estante Virtual (Brazilian book shop)<\/td>\n<td>5.45 Mil<\/td>\n<td>2019\/02<\/td>\n<td>\u0e3f0.2618<\/td>\n<td>name, username, password (SHA1), address, email, phone number<\/td>\n<\/tr>\n<tr readability=\"6\">\n<td>Coubic (scheduling software)<\/td>\n<td>1.5 Mil<\/td>\n<td>2019\/02<\/td>\n<td>\u0e3f0.157<\/td>\n<td>name, email, password (SHA256)<\/td>\n<\/tr>\n<tr readability=\"8\">\n<td>LifeBear (Japanese scheduling app)<\/td>\n<td>3.86 Mil<\/td>\n<td>2019\/02<\/td>\n<td>\u0e3f0.2618<\/td>\n<td>email, password (MD5), username, event details, app settings<\/td>\n<\/tr>\n<tr readability=\"10\">\n<td>Bukalapak (Indonesian e-commerce site)<\/td>\n<td>13 Mil<\/td>\n<td>2017\/07<\/td>\n<td>\u0e3f0.34<\/td>\n<td>username, name, email, password hash (SHA512+salt), shopping details, IP adress, other<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td>YouthManual.com (Indonesian youth student and career site)<\/td>\n<td>1.12 Mil<\/td>\n<td>2019\/02<\/td>\n<td>\u0e3f0.144<\/td>\n<td>name,email, password hash (SHA1+salt), hobbies, education, other<\/td>\n<\/tr>\n<\/thead>\n<\/table>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/03\/17\/84ca65fe-0d76-4857-9c0e-f2e1bea5275f\/5ce232c4c26ed4865f213c4a2a04d696\/gnosticplayers-round-4.png\" class alt=\"Gnosticplayers Round 4\"><\/span> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p><em>ZDNet<\/em> has reached out to the allegedly hacked companies with emails earlier today. It is worth mentioning that many of the companies whose data Gnosticplayers has sold in the previous three rounds have already confirmed breaches.<\/p>\n<p>Coubic returned comment and said it was investigating the breach. So did LifeBear, which admitted that it was &#8220;most likely&#8221; that it servers got hacked, but the company is still investigating.<\/p>\n<p>The difference between Round 4 and the previous three rounds is that five of the six databases Gnosticplayers put up for sale were acquired during hacks that have taken place last month, February 2019.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The hacker said that he put up the data for sale mainly because these companies had failed to protect passwords with strong encryption algorithms like bcrypt.<\/p>\n<p>Most of the hashed passwords the hacker put up for sale today can cracked with various levels of difficulty &#8211;but they can be cracked.<\/p>\n<p>&#8220;I got upset because I feel no one is learning,&#8221; the hacker told <em>ZDNet<\/em> in an online chat earlier today. &#8220;I just felt upset at this particular moment, because seeing this lack of security in 2019 is making me angry.&#8221;<\/p>\n<p>In a conversation with <em>ZDNet<\/em> last month, the hacker told us he wanted to hack and put up for sale more than one billion records and then retire and disappear with the money.<\/p>\n<p>But in a conversation today, the hacker says this is not his target anymore, as he learned that other hackers have already achieved the same goal before him.<\/p>\n<p>Gnosticplayers also revealed that not all the data he obtained from hacked companies had been put up for sale. Some companies gave into extortion demands and paid fees so breaches would remain private.<\/p>\n<p>&#8220;I came to an agreement with some companies, but the concerned startups won&#8217;t see their data for sale,&#8221; he said. &#8221; I did it that&#8217;s why I can&#8217;t publish the rest of my databases or even name them.&#8221;<\/p>\n<p><em>Article updated with Coubic and LifeBear responses.<\/em><\/p>\n<h3>More data breach coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29946\/Hacker-Returns-And-Puts-26Mil-User-Records-For-Sale-On-The-Dark-Web.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26188,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[169],"class_list":["post-26187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacydata-lossfraudidentity-theft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T14:48:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png\" \/>\n\t<meta property=\"og:image:width\" content=\"731\" \/>\n\t<meta property=\"og:image:height\" content=\"693\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web\",\"datePublished\":\"2019-03-18T14:48:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/\"},\"wordCount\":576,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png\",\"keywords\":[\"headline,hacker,privacy,data loss,fraud,identity theft\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/\",\"name\":\"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png\",\"datePublished\":\"2019-03-18T14:48:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png\",\"width\":731,\"height\":693},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,data loss,fraud,identity theft\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacydata-lossfraudidentity-theft\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/","og_locale":"en_US","og_type":"article","og_title":"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-18T14:48:26+00:00","og_image":[{"width":731,"height":693,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web","datePublished":"2019-03-18T14:48:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/"},"wordCount":576,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png","keywords":["headline,hacker,privacy,data loss,fraud,identity theft"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/","url":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/","name":"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png","datePublished":"2019-03-18T14:48:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web.png","width":731,"height":693},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-and-puts-26mil-user-records-for-sale-on-the-dark-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,data loss,fraud,identity theft","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydata-lossfraudidentity-theft\/"},{"@type":"ListItem","position":3,"name":"Hacker Returns And Puts 26Mil User Records For Sale On The Dark Web"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26187"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26187\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26188"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}