{"id":49558,"date":"2022-12-03T14:27:31","date_gmt":"2022-12-03T14:27:31","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34101\/Darknet-Markets-Generate-Millions-In-Revenue-Selling-Stolen-Personal-Data.html"},"modified":"2022-12-03T14:27:31","modified_gmt":"2022-12-03T14:27:31","slug":"darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/","title":{"rendered":"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/hax04-800x335.jpg\" alt=\"Hacker in binary code digital background. Cyber crime and internet privacy hacking. Network security, Cyber attack, Computer Virus, Ransomware, and Malware Concept. 2D illustration.\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"0 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2022\/12\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">29<\/span> <span class=\"visually-hidden\"> with 0 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 156:single\/related:416d3d352776c60c8e3a583aa949d0d3 --><!-- empty --><\/p>\n<p>It is common to hear news reports about large data breaches, but what happens once your personal data is stolen? Our research shows that, like most legal commodities, stolen data products flow through a supply chain consisting of producers, wholesalers, and consumers. But this supply chain involves the <a href=\"https:\/\/doi.org\/10.1093\/bjc\/azab116\">interconnection of multiple criminal organizations<\/a> operating in illicit underground marketplaces.<\/p>\n<p>The stolen data supply chain begins with producers\u2014hackers who exploit vulnerable systems and steal sensitive information such as credit card numbers, bank account information, and Social Security numbers. Next, the stolen data is advertised by wholesalers and distributors who sell the data. Finally, the data is purchased by consumers who use it to commit <a href=\"https:\/\/theconversation.com\/heres-how-much-your-personal-information-is-worth-to-cybercriminals-and-what-they-do-with-it-158934\">various forms of fraud<\/a>, including fraudulent credit card transactions, identity theft, and phishing attacks.<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/fraud-chain.png\" class=\"enlarge\" data-height=\"190\" data-width=\"1000\" alt=\"The stolen data supply chain, from data theft to fraud. \"><img loading=\"lazy\" decoding=\"async\" alt=\"The stolen data supply chain, from data theft to fraud. \" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/fraud-chain-640x122.png\" width=\"640\" height=\"122\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/fraud-chain.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/fraud-chain.png\" class=\"enlarge-link\" data-height=\"190\" data-width=\"1000\">Enlarge<\/a> <span class=\"sep\">\/<\/span> The stolen data supply chain, from data theft to fraud. <\/div>\n<\/figcaption><\/figure>\n<p>This trafficking of stolen data between producers, wholesalers, and consumers is enabled by darknet markets, which are websites that resemble ordinary e-commerce websites but are accessible only using special browsers or authorization codes.<\/p>\n<p>We found <a href=\"https:\/\/doi.org\/10.1093\/bjc\/azab116\">several thousand vendors selling tens of thousands of stolen data products<\/a> on 30 darknet markets. These vendors had more than $140 million in revenue over an eight-month period.<\/p>\n<h2>Darknet markets<\/h2>\n<p>Just like traditional e-commerce sites, darknet markets provide a platform for vendors to connect with potential buyers to facilitate transactions. Darknet markets, though, are notorious for the sale of illicit products. Another key distinction is that access to darknet markets requires the use of special software such as <a href=\"https:\/\/www.torproject.org\/\">the Onion Router<\/a>, or TOR, which provides security and anonymity.<\/p>\n<p><a href=\"https:\/\/news.law.fordham.edu\/jcfl\/2018\/02\/21\/silk-road-the-dark-side-of-cryptocurrency\/\">Silk Road<\/a>, which emerged in 2011, combined TOR and bitcoin to become the first known darknet market. The market was eventually seized in 2013, and the founder, <a href=\"https:\/\/www.theguardian.com\/technology\/2015\/may\/29\/silk-road-ross-ulbricht-sentenced\">Ross Ulbricht, was sentenced<\/a> to two life sentences plus 40 years without the possibility of parole. Ulbricht\u2019s hefty prison sentence did not appear to have the intended deterrent effect. Multiple markets emerged to fill the void and, in doing so, created a thriving ecosystem profiting from stolen personal data.<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/listing.png\" class=\"enlarge\" data-height=\"858\" data-width=\"1508\" alt=\"Example of a stolen data &quot;product&quot; sold on a darknet market.\"><img loading=\"lazy\" decoding=\"async\" alt=\"Example of a stolen data &quot;product&quot; sold on a darknet market.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/listing-640x364.png\" width=\"640\" height=\"364\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/listing-1280x728.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/listing.png\" class=\"enlarge-link\" data-height=\"858\" data-width=\"1508\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Example of a stolen data &#8220;product&#8221; sold on a darknet market.<\/div>\n<\/figcaption><\/figure>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<h2>Stolen data ecosystem<\/h2>\n<table class=\"right\" width=\"320\">\n<tbody>\n<tr>\n<th colspan=\"5\">Key stats from individual darknet stolen data marketplaces<\/th>\n<\/tr>\n<tr>\n<th>Market<\/th>\n<th>Vendors<\/th>\n<th>Listings<\/th>\n<th>Sales<\/th>\n<th>Revenue<\/th>\n<\/tr>\n<tr>\n<td>Agartha<\/td>\n<td>302<\/td>\n<td>16,296<\/td>\n<td>237,512<\/td>\n<td>$91,582,216.00<\/td>\n<\/tr>\n<tr>\n<td>Amazin<\/td>\n<td>6<\/td>\n<td>43<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<\/tr>\n<tr>\n<td>Apollon<\/td>\n<td>650<\/td>\n<td>9,885<\/td>\n<td>238<\/td>\n<td>$3,703.00<\/td>\n<\/tr>\n<tr>\n<td>Asean\/ASAP<\/td>\n<td>59<\/td>\n<td>2,921<\/td>\n<td>0<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Aurora<\/td>\n<td>71<\/td>\n<td>2,913<\/td>\n<td>128,561<\/td>\n<td>$3,003,846.00<\/td>\n<\/tr>\n<tr>\n<td>Babylon<\/td>\n<td>14<\/td>\n<td>55<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<\/tr>\n<tr>\n<td>CanadaHQ<\/td>\n<td>125<\/td>\n<td>2,886<\/td>\n<td>4,271<\/td>\n<td>$241,656.00<\/td>\n<\/tr>\n<tr>\n<td>Cartel<\/td>\n<td>44<\/td>\n<td>487<\/td>\n<td>61,604<\/td>\n<td>$31,280,508.00<\/td>\n<\/tr>\n<tr>\n<td>Corona<\/td>\n<td>95<\/td>\n<td>2,979<\/td>\n<td>19,149<\/td>\n<td>$1,553,850.00<\/td>\n<\/tr>\n<tr>\n<td>Cypher<\/td>\n<td>56<\/td>\n<td>2,472<\/td>\n<td>123<\/td>\n<td>$20,009.00<\/td>\n<\/tr>\n<tr>\n<td>Dark<\/td>\n<td>248<\/td>\n<td>8,679<\/td>\n<td>19,783<\/td>\n<td>$571,512.00<\/td>\n<\/tr>\n<tr>\n<td>Dark0de<\/td>\n<td>52<\/td>\n<td>487<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<\/tr>\n<tr>\n<td>DarkBay\/Lime<\/td>\n<td>101<\/td>\n<td>10,004<\/td>\n<td>72<\/td>\n<td>$60,076.00<\/td>\n<\/tr>\n<tr>\n<td>Darkfox<\/td>\n<td>159<\/td>\n<td>2,040<\/td>\n<td>15,929<\/td>\n<td>$74,057.00<\/td>\n<\/tr>\n<tr>\n<td>DeepMart<\/td>\n<td>23<\/td>\n<td>218<\/td>\n<td>37,095<\/td>\n<td>$9,156,025.00<\/td>\n<\/tr>\n<tr>\n<td>DeepSea<\/td>\n<td>141<\/td>\n<td>4,437<\/td>\n<td>11,905<\/td>\n<td>$116,962.00<\/td>\n<\/tr>\n<tr>\n<td>Elite<\/td>\n<td>52<\/td>\n<td>691<\/td>\n<td>22,079<\/td>\n<td>$147,245.00<\/td>\n<\/tr>\n<tr>\n<td>Icarus<\/td>\n<td>88<\/td>\n<td>557<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<\/tr>\n<tr>\n<td>Liberty<\/td>\n<td>19<\/td>\n<td>189<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<\/tr>\n<tr>\n<td>Neptune<\/td>\n<td>160<\/td>\n<td>6,507<\/td>\n<td>1,140<\/td>\n<td>$23,696.00<\/td>\n<\/tr>\n<tr>\n<td>Royal<\/td>\n<td>13<\/td>\n<td>54<\/td>\n<td>0<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>Silk Road*<\/td>\n<td>28<\/td>\n<td>38<\/td>\n<td>490<\/td>\n<td>$15,053.00<\/td>\n<\/tr>\n<tr>\n<td>Tor2Door<\/td>\n<td>52<\/td>\n<td>1,908<\/td>\n<td>207<\/td>\n<td>$1,796.00<\/td>\n<\/tr>\n<tr>\n<td>Torrez<\/td>\n<td>85<\/td>\n<td>1,707<\/td>\n<td>5,189<\/td>\n<td>$145,198.00<\/td>\n<\/tr>\n<tr>\n<td>Versus<\/td>\n<td>99<\/td>\n<td>3,959<\/td>\n<td>6,532<\/td>\n<td>$125,363.00<\/td>\n<\/tr>\n<tr>\n<td>ViceCity<\/td>\n<td>101<\/td>\n<td>1,776<\/td>\n<td>3,150<\/td>\n<td>$57,018.00<\/td>\n<\/tr>\n<tr>\n<td>WhiteHouse<\/td>\n<td>306<\/td>\n<td>11,184<\/td>\n<td>56,950<\/td>\n<td>$2,146,730.00<\/td>\n<\/tr>\n<tr>\n<td>World<\/td>\n<td>24<\/td>\n<td>749<\/td>\n<td>223<\/td>\n<td>$3,280.00<\/td>\n<\/tr>\n<tr>\n<td>Yakuza<\/td>\n<td>48<\/td>\n<td>411<\/td>\n<td>5<\/td>\n<td>$8,200.00<\/td>\n<\/tr>\n<tr>\n<td>YellowBrick<\/td>\n<td>39<\/td>\n<td>140<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<\/tr>\n<tr>\n<td colspan=\"5\">Data source: Christian Jordan Howell<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Recognizing the role of darknet markets in trafficking stolen data, we conducted the largest systematic examination of stolen data markets that we are aware of to better understand the size and scope of this illicit online ecosystem. To do this, we first identified 30 darknet markets advertising stolen data products.<\/p>\n<p>Next, we extracted information about stolen data products from the markets on a weekly basis for eight months, from September 1, 2020, through April 30, 2021. We then used this information to determine the number of vendors selling stolen data products, the number of stolen data products advertised, the number of products sold, and the amount of revenue generated.<\/p>\n<p>In total, there were 2,158 vendors who advertised at least one of the 96,672 product listings across the 30 marketplaces. Vendors and product listings were not distributed equally across markets. On average, marketplaces had 109 unique vendor aliases and 3,222 product listings related to stolen data products. Marketplaces recorded 632,207 sales across these markets, which generated $140,337,999 in total revenue. Again, there is high variation across the markets. On average, marketplaces had 26,342 sales and generated $5,847,417 in revenue.<\/p>\n<p>After assessing the aggregate characteristics of the ecosystem, we analyzed each of the markets individually. In doing so, we found that a handful of markets were responsible for trafficking most of the stolen data products. The three largest markets\u2014Apollon, WhiteHouse, and Agartha\u2014contained 58 percent of all vendors. The number of listings ranged from 38 to 16,296, and the total number of sales ranged from 0 to 237,512. The total revenue of markets also varied substantially during the 35-week period: It ranged from $0 to $91,582,216 for the most successful market, Agartha.<\/p>\n<p>For comparison, most midsize companies operating in the US earn between $10 million and $1 billion annually. Both Agartha and Cartel earned enough revenue within the 35-week period we tracked them to be characterized as midsize companies, earning $91.6 million and $32.3 million, respectively. Other markets like Aurora, DeepMart, and WhiteHouse were also on track to reach the revenue of a midsize company if given a full year to earn.<\/p>\n<p>Our research details a thriving underground economy and illicit supply chain enabled by darknet markets. As long as data is routinely stolen, there are likely to be marketplaces for the stolen information. <\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>These darknet markets are difficult to disrupt directly, but efforts to thwart customers of stolen data from using it offers some hope. We believe that advances in artificial intelligence can provide law enforcement agencies, financial institutions, and others with information needed to prevent stolen data from being used to commit fraud. This could stop the flow of stolen data through the supply chain and disrupt the underground economy that profits from your personal data.<\/p>\n<p><em><a href=\"https:\/\/theconversation.com\/profiles\/christian-jordan-howell-1384875\">Christian Jordan Howell<\/a> is assistant professor in cybercrime, <a href=\"https:\/\/theconversation.com\/institutions\/university-of-south-florida-1359\">University of South Florida<\/a>, and <a href=\"https:\/\/theconversation.com\/profiles\/david-maimon-1032927\">David Maimon<\/a> is professor of criminal justice and criminology, <a href=\"https:\/\/theconversation.com\/institutions\/georgia-state-university-957\">Georgia State University<\/a>.<\/em><\/p>\n<p><em>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data-supply-chain-study-finds-193506\">original article<\/a>.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34101\/Darknet-Markets-Generate-Millions-In-Revenue-Selling-Stolen-Personal-Data.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49559,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[6928],"class_list":["post-49558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacycybercrimedata-lossfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-03T14:27:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/hax04-800x335.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data\",\"datePublished\":\"2022-12-03T14:27:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/\"},\"wordCount\":909,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg\",\"keywords\":[\"headline,hacker,privacy,cybercrime,data loss,fraud\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/\",\"name\":\"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg\",\"datePublished\":\"2022-12-03T14:27:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg\",\"width\":800,\"height\":335},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,cybercrime,data loss,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacycybercrimedata-lossfraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/","og_locale":"en_US","og_type":"article","og_title":"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-12-03T14:27:31+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/hax04-800x335.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data","datePublished":"2022-12-03T14:27:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/"},"wordCount":909,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg","keywords":["headline,hacker,privacy,cybercrime,data loss,fraud"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/","url":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/","name":"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg","datePublished":"2022-12-03T14:27:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data.jpg","width":800,"height":335},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,cybercrime,data loss,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacycybercrimedata-lossfraud\/"},{"@type":"ListItem","position":3,"name":"Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49558"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49559"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}