{"id":40353,"date":"2021-04-08T13:51:53","date_gmt":"2021-04-08T13:51:53","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32179\/Tons-Of-PII-Leaked-Due-To-Swarmshop-Hack.html"},"modified":"2021-04-08T13:51:53","modified_gmt":"2021-04-08T13:51:53","slug":"tons-of-pii-leaked-due-to-swarmshop-hack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/","title":{"rendered":"Tons Of PII Leaked Due To Swarmshop Hack"},"content":{"rendered":"<figure class=\"sc-1eow4w5-1 dhDQnh align--bleed js_lazy-image js_marquee-assetfigure\" data-id=\"dxikj3jyio5cjdmstgkn\" data-recommend-id=\"image:\/\/dxikj3jyio5cjdmstgkn\" data-format=\"jpg\" data-width=\"4920\" data-height=\"2767\" data-lightbox=\"true\" data-recommended=\"false\" contenteditable=\"false\" draggable=\"false\">\n<div class=\"sc-1eow4w5-2 loxZOX img-wrapper\" contenteditable=\"false\" data-syndicationrights=\"true\" data-imagerights=\"getty\" data-hidecredit=\"false\"><span class=\"sc-1eow4w5-0 dnhHtZ js_lightbox-wrapper\"><\/p>\n<div class=\"sc-1eow4w5-3 lktKQM image-hydration-wrapper\">\n<div><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"Illustration for article titled 70,000 SSNs, 600,000 Credit Card Records Leaked After Stolen-Data Hub Gets Hacked\" data-expanded-srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,pg_1,q_80,w_80\/dxikj3jyio5cjdmstgkn.jpg 80w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_140\/dxikj3jyio5cjdmstgkn.jpg 140w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_265\/dxikj3jyio5cjdmstgkn.jpg 265w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_340\/dxikj3jyio5cjdmstgkn.jpg 340w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_490\/dxikj3jyio5cjdmstgkn.jpg 490w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_645\/dxikj3jyio5cjdmstgkn.jpg 645w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_740\/dxikj3jyio5cjdmstgkn.jpg 740w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_965\/dxikj3jyio5cjdmstgkn.jpg 965w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1165\/dxikj3jyio5cjdmstgkn.jpg 1165w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1315\/dxikj3jyio5cjdmstgkn.jpg 1315w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1465\/dxikj3jyio5cjdmstgkn.jpg 1465w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1600\/dxikj3jyio5cjdmstgkn.jpg 1600w\" sizes=\" (max-width: 25em) calc(100vw - 32px), (max-width: 37.31em) calc(100vw - 32px), (min-width: 37.37em) and (max-width: 49.94em) calc(100vw - 32px), (min-width: 50em) and (max-width: 63.69em) 800px, (min-width: 63.75em) and (max-width: 85.19em) calc(66.5vw - 32px), 800px \" draggable=\"auto\" data-chomp-id=\"dxikj3jyio5cjdmstgkn\" data-format=\"jpg\" data-alt=\"Illustration for article titled 70,000 SSNs, 600,000 Credit Card Records Leaked After Stolen-Data Hub Gets Hacked\" data-anim-src srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,pg_1,q_80,w_80\/dxikj3jyio5cjdmstgkn.jpg 80w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,fl_progressive,q_80,w_320\/dxikj3jyio5cjdmstgkn.jpg 320w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,fl_progressive,pg_1,q_80,w_470\/dxikj3jyio5cjdmstgkn.jpg 470w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,pg_1,q_80,w_800\/dxikj3jyio5cjdmstgkn.jpg 800w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,pg_1,q_80,w_1600\/dxikj3jyio5cjdmstgkn.jpg 1600w\"><\/div>\n<\/div>\n<p><\/span><figcaption class=\"sc-7s1ndr-0 dzxYIl no-caption\">Photo<!-- -->: <!-- -->DAMIEN MEYER\/AFP<!-- --> (<!-- -->Getty Images<!-- -->)<\/figcaption><\/div>\n<p><span data-id=\"dxikj3jyio5cjdmstgkn\" data-recommend-id=\"image:\/\/dxikj3jyio5cjdmstgkn\" data-format=\"jpg\" data-width=\"4920\" data-height=\"2767\" data-lightbox=\"true\" data-recommended=\"false\" class=\"js_recommend\"><\/span><\/figure>\n<p><span><\/span><\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">Until recently, the carding store Swarmshop was a popular, illicit online market where cybercriminals could go to sell and purchase stolen credit card and banking data. However, the store\u2019s luck may have run out\u2014and it may have taken a little of your luck with it.<\/p>\n<div id class=\"bxm4mm-11 gamHXh js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-12 iqioLK ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">On March 17, a huge cache of the site\u2019s user and administrator data was leaked online to a different underground forum, <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.group-ib.com\/media\/swarmshop-breach\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.group-ib.com\/media\/swarmshop-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">a new report<\/a><\/span> published Thursday by threat research firm Group-IB shows.<!-- --> <\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">While it\u2019s unclear exactly who stole this data, how, or when, what we do know is that there is a lot of it. The leak exposed thousands of data points, including information on four of the site\u2019s administrators, 90 \u201csellers,\u201d and 12,250 \u201cbuyers.\u201d The dump included criminals\u2019 \u201cnicknames, hashed passwords, account balance, and contact details for some entries,\u201d the researchers write.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">While you might be wondering, \u201c<em>So what? Why do I care that a hacker\u2019s email address is now floating around the internet?<\/em>\u201d just know that it\u2019s a little more complicated than that. <\/p>\n<div class=\"bxm4mm-19 fIUNXF\" readability=\"2.1428571428571\">\n<div class=\"sc-1atgi65-0 sc-1atgi65-1 bdNdA-D js_commerce-inset-permalink\" data-inset-url=\"https:\/\/www.amazon.com\/New-Apple-Watch-GPS-40mm-Aluminum\/dp\/B08J5RBMRN?ascsubtag=1563676fca84edea3d6e40da31ae23596b98fb51&amp;ots=1&amp;tag=kinjadeals-20\" data-inset-category=\"CommerceInsetMobile\" readability=\"2.5\">\n<p>G\/O Media may get a commission<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">The leak also exposed the personal and banking information that the criminals had been trading\u2014meaning that data on thousands of victims has also been leaked. The information is quite sensitive, and it includes 68,995 sets of U.S. Social Security numbers, as well as 623,036 payment card records, nearly 63% of which are from U.S. banks, according to Group-IB\u2019s findings.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">To help clarify what the stolen data dump entails, Group-IB put together a graphic that breaks down the compromised records by country. As you can see, a vast majority of them are from the U.S.<\/p>\n<div id class=\"bxm4mm-11 gamHXh js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-12 iqioLK ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<figure class=\"sc-1eow4w5-1 dhDQnh align--bleed js_lazy-image js_marquee-assetfigure\" data-id=\"yiyi9u5jajtr5asggn8g\" data-recommend-id=\"image:\/\/yiyi9u5jajtr5asggn8g\" data-format=\"png\" data-width=\"1204\" data-height=\"676\" data-lightbox=\"true\" data-recommended=\"false\" contenteditable=\"false\" draggable=\"false\">\n<div class=\"sc-1eow4w5-2 loxZOX img-wrapper\" contenteditable=\"false\" data-syndicationrights=\"false\" data-imagerights=\"other-license\" data-hidecredit=\"false\"><span class=\"sc-1eow4w5-0 dnhHtZ js_lightbox-wrapper\"><\/p>\n<div class=\"sc-1eow4w5-3 lktKQM image-hydration-wrapper\">\n<div><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"Illustration for article titled 70,000 SSNs, 600,000 Credit Card Records Leaked After Stolen-Data Hub Gets Hacked\" data-expanded-srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,pg_1,q_80,w_80\/yiyi9u5jajtr5asggn8g.png 80w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_140\/yiyi9u5jajtr5asggn8g.png 140w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_265\/yiyi9u5jajtr5asggn8g.png 265w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_340\/yiyi9u5jajtr5asggn8g.png 340w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_490\/yiyi9u5jajtr5asggn8g.png 490w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_645\/yiyi9u5jajtr5asggn8g.png 645w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_740\/yiyi9u5jajtr5asggn8g.png 740w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_965\/yiyi9u5jajtr5asggn8g.png 965w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1165\/yiyi9u5jajtr5asggn8g.png 1165w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1315\/yiyi9u5jajtr5asggn8g.png 1315w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1465\/yiyi9u5jajtr5asggn8g.png 1465w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,g_center,pg_1,q_60,w_1600\/yiyi9u5jajtr5asggn8g.png 1600w\" sizes=\" (max-width: 25em) calc(100vw - 32px), (max-width: 37.31em) calc(100vw - 32px), (min-width: 37.37em) and (max-width: 49.94em) calc(100vw - 32px), (min-width: 50em) and (max-width: 63.69em) 800px, (min-width: 63.75em) and (max-width: 85.19em) calc(66.5vw - 32px), 800px \" draggable=\"auto\" data-chomp-id=\"yiyi9u5jajtr5asggn8g\" data-format=\"png\" data-alt=\"Illustration for article titled 70,000 SSNs, 600,000 Credit Card Records Leaked After Stolen-Data Hub Gets Hacked\" data-anim-src srcset=\"https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fill,f_auto,fl_progressive,g_center,h_80,pg_1,q_80,w_80\/yiyi9u5jajtr5asggn8g.png 80w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,fl_progressive,q_80,w_320\/yiyi9u5jajtr5asggn8g.png 320w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_fit,f_auto,fl_progressive,pg_1,q_80,w_470\/yiyi9u5jajtr5asggn8g.png 470w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,pg_1,q_80,w_800\/yiyi9u5jajtr5asggn8g.png 800w, https:\/\/i.kinja-img.com\/gawker-media\/image\/upload\/c_scale,f_auto,fl_progressive,pg_1,q_80,w_1600\/yiyi9u5jajtr5asggn8g.png 1600w\"><\/div>\n<\/div>\n<p><\/span><figcaption class=\"sc-7s1ndr-0 dzxYIl no-caption\">Screenshot<!-- -->: <!-- -->Lucas Ropek\/Group-IB<\/figcaption><\/div>\n<p><span data-id=\"yiyi9u5jajtr5asggn8g\" data-recommend-id=\"image:\/\/yiyi9u5jajtr5asggn8g\" data-format=\"png\" data-width=\"1204\" data-height=\"676\" data-lightbox=\"true\" data-recommended=\"false\" class=\"js_recommend\"><\/span><\/figure>\n<p class=\"sc-77igqf-0 bOfvBY\">Granted, this data was already compromised\u2014though the recent breach means it is now even more widely distributed than it already was. Instead of just being peddled to some individual buyer, it is now freely accessible to anyone who wants to download it. <\/p>\n<div id class=\"bxm4mm-11 gamHXh js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-12 iqioLK ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">\u201cWhile underground forums get hacked from time to time, cardshop breaches do not happen very often,\u201d Dmitry Volkov, Group-IB\u2019s CTO, said in a statement. \u201cIn addition to buyers\u2019 and sellers\u2019 data, such breaches expose massive amounts of compromised payment and personal information of regular users.\u201d<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">Though these incidents may be uncommon, cybercrime forums have actually been getting hacked <em>a lot<\/em> lately. Ongoing reports of sites getting hit have aroused the suspicion of criminals, some of whom see the <span><a class=\"sc-1out364-0 hMndXN sc-145m8ut-0 kVnoAv js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/someone-is-hacking-the-hackers-1846406428&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/someone-is-hacking-the-hackers-1846406428\">handiwork of law enforcement<\/a><\/span> at play. Attribution in these cases is pure speculation, however\u2014so it\u2019s currently impossible to say why an uptick like this might actually be happening. <\/p>\n<div id class=\"bxm4mm-11 gamHXh js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-12 iqioLK ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 bOfvBY\">In the case of Swarmshop, researchers seem to believe the attack is the work of another criminal. The site suffered a similar attack about a year ago, at which time data was also stolen. Regardless of who is responsible, researchers think the breach is likely to affect Swarmshop\u2019s standing in the cybercrime community.<\/p>\n<p class=\"sc-77igqf-0 bOfvBY\">\u201cThis is a major reputation hit for the card shop as all the sellers lost their goods and personal data,\u201d Volkov said. \u201cThe shop is unlikely to restore its status.\u201d<\/p>\n<div id class=\"bxm4mm-11 gamHXh js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic movable-ad\">\n<div class=\"bxm4mm-12 iqioLK ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32179\/Tons-Of-PII-Leaked-Due-To-Swarmshop-Hack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40354,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[3002],"class_list":["post-40353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackercybercrimedata-lossfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tons Of PII Leaked Due To Swarmshop Hack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tons Of PII Leaked Due To Swarmshop Hack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-08T13:51:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tons Of PII Leaked Due To Swarmshop Hack\",\"datePublished\":\"2021-04-08T13:51:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/\"},\"wordCount\":539,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif\",\"keywords\":[\"headline,hacker,cybercrime,data loss,fraud\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/\",\"name\":\"Tons Of PII Leaked Due To Swarmshop Hack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif\",\"datePublished\":\"2021-04-08T13:51:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,cybercrime,data loss,fraud\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackercybercrimedata-lossfraud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tons Of PII Leaked Due To Swarmshop Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tons Of PII Leaked Due To Swarmshop Hack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/","og_locale":"en_US","og_type":"article","og_title":"Tons Of PII Leaked Due To Swarmshop Hack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-04-08T13:51:53+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif","type":"image\/gif"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tons Of PII Leaked Due To Swarmshop Hack","datePublished":"2021-04-08T13:51:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/"},"wordCount":539,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif","keywords":["headline,hacker,cybercrime,data loss,fraud"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/","url":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/","name":"Tons Of PII Leaked Due To Swarmshop Hack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif","datePublished":"2021-04-08T13:51:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/tons-of-pii-leaked-due-to-swarmshop-hack.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tons-of-pii-leaked-due-to-swarmshop-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,cybercrime,data loss,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackercybercrimedata-lossfraud\/"},{"@type":"ListItem","position":3,"name":"Tons Of PII Leaked Due To Swarmshop Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40353"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40354"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}