Alleged Scraping of 330 Million Email IDs from SOCRadar.io

Published:

Security Concerns Arise After 332 Million Email Addresses Exposed Online

A significant security concern has emerged in the cyber world as a massive data dump of 332 million email addresses has been exposed online. The email addresses were allegedly scraped from the security intelligence platform SOCRadar.io and posted on a cybercrime forum by a threat actor known as Dominatrix.

According to reports from Hackread, the data dump was originally scraped by another actor named “USDoD,” who has a history of involvement in previous data breaches. The leaked data, extracted from “stealer logs and combolists,” suggests that malware infections played a role in the initial data collection, highlighting a broader issue of malware distribution and system exploitation.

The incident took place in July 2024, with the data initially being sold for $7,000 by USDoD on a hacker forum. However, Dominatrix later made the data public, stating that they had purchased it from USDoD and shared it with the hacker community.

While the incident technically only involved email addresses and not passwords, it raises concerns for individuals and organizations whose email addresses may be included. The exposed data could be used for malicious purposes such as phishing attacks, brute-force attacks, and credential stuffing.

This incident underscores the importance of strong cybersecurity measures for both individuals and organizations. Recommendations include using unique passwords, enabling multi-factor authentication, and being vigilant against suspicious emails and links. As the cybersecurity community awaits further clarification from SOCRadar.io, the incident serves as a reminder of the ongoing threats in the digital landscape.

Related articles

Recent articles