Quantcast
Channel: Daily Dark Web
Viewing all articles
Browse latest Browse all 868

Threat Actor Claims to Sell Extensive Crypto Database Containing 19,396 Rows of Data

$
0
0

A threat actor has announced the sale of a crypto database, allegedly containing 19,396 rows of data, along with access to the database itself.

Threat Actor’s Announcement:

Database: Crypto-DB
Deals: Processed through BF Escrow Only
Solo DB Price: $1,500
DB + Access Price: $2,500
Total DB Rows: 19,396
Contact: PM on Telegram or via the provided contact method

Database Tables:

The database includes various tables such as ha_account_otp, ha_accounts, ha_admin_notifications, ha_admins, ha_agent_logins, ha_agents, ha_analytics, ha_application_history, ha_application_history_backlog, ha_applied_coupons, ha_brands, ha_categories, ha_cities, ha_countries, ha_country, ha_country_calling_codes, ha_coupons, ha_coupons_categories, ha_coupons_history, ha_customer_assets, ha_customer_liabilities, and ha_customer_other_income.

Sample Columns from Selected Tables:

In the “ha_accounts” table, columns include id, user_id, account_number, account_status, account_type, account_balance, account_blockchain_address, and account_private_key. The “ha_wallet_deposits” table contains columns such as id, user_id, order_id, method_code, amount, method_currency, final_amo, btc_wallet, and eth_wallet. The “ha_withdrawals” table includes columns like id, method_id, seller_id, amount, currency, rate, final_amount, and status. In the “ha_virtual_accounts” table, columns include VAccountId, AccountName, AccountNumber, Currency, BankName, Customer, TotalBalance, and PaymentCycle. The “ha_user_payment_account” table comprises BankAccountId, BankAccountNumber, BankAccountName, BankCode, and BankAccountStatus. The “ha_transfer_recipient” table includes id, AccountNumber, RecipientCode, BankCode, and TransferProvider. The “ha_transactions” table consists of id, sender_id, receiver_id, amount, transaction_type, trx, and details. Lastly, the “ha_orders” table includes id, user_id, order_number, order_details, and payment_status, while the “ha_users” table contains id, firstname, lastname, username, email, mobile, profileImage, status, email_verified, and two_factor_status.

The threat actor has listed the database for sale at $1,500 for the database alone, or $2,500 for the database along with access. The transactions are to be conducted through BF Escrow for security. The database’s extensive content makes it a potentially valuable asset for malicious activities, underscoring the ongoing risks associated with data breaches in the crypto industry.

The post Threat Actor Claims to Sell Extensive Crypto Database Containing 19,396 Rows of Data appeared first on Daily Dark Web.


Viewing all articles
Browse latest Browse all 868

Trending Articles