3 Billion Social Security Numbers Leaked On The Dark Web

Mental Outlaw
10 Aug 202410:55

Summary

TLDRA massive data breach has exposed nearly 3 billion people's personal information, including names, addresses, and social security numbers. The data, initially for sale at $3.5 million, was released for free on a hacker forum. It originated from National Public Data, which scraped data without consent. The breach could lead to identity theft and unauthorized financial transactions. The video discusses the potential risks and advises viewers to be vigilant about their personal information.

Takeaways

  • 😱 A data breach exposed personal data of nearly 3 billion people, totaling 277 GB of data.
  • 💸 Initially, hackers attempted to sell the database for $3.5 million but later decided to give it away for free to gain reputation.
  • 📚 The leaked data includes sensitive information such as names, dates of birth, addresses, phone numbers, and social security numbers.
  • 🇺🇸 In the United States, social security numbers are crucial for financial transactions and security verifications.
  • 🏠 The data could be misused to shut off utilities, open new accounts, or even facilitate SIM swapping attacks.
  • 🔄 The data was stolen from National Public Data, which aggregates information through web scraping and data purchases without consent.
  • 🔒 The breach highlights the importance of securing personal data and the potential consequences of inadequate data protection.
  • 🔎 Upon analysis, it appears that the same individual's data is repeated multiple times in the leaked database.
  • 👤 Individuals with minimal online presence or who used data opt-out services were less likely to be found in the leak.
  • 📉 The actual number of unique individuals affected might be less than initially reported, but still represents a significant portion of the US population.
  • 💡 The incident underscores the need for better security practices and potential legal repercussions for companies that mishandle personal data.

Q & A

  • What was the size of the data leak mentioned in the script?

    -The data leak mentioned in the script was 277 GB uncompressed.

  • How many people's personal data was supposedly included in the data leak?

    -The data leak supposedly contained personal data of almost 3 billion people.

  • What kind of data points were included in the leaked database?

    -The data points included first name, last name, date of birth, address, phone number, and social security number.

  • What was the initial asking price for the stolen database?

    -The hackers initially tried to sell the database for $3.5 million.

  • Why did the hackers decide to give the database away for free?

    -The hackers decided to give the database away for free to earn reputation within the hacker forum.

  • How could the leaked social security numbers be misused according to the script?

    -The leaked social security numbers could be used to shut off utilities, open new utility accounts, or perform SIM swapping attacks to gain access to personal accounts.

  • What is SIM swapping and how does it work?

    -SIM swapping is a type of attack where an attacker tricks a mobile carrier into transferring a phone number to a SIM card they control, allowing them to intercept calls and text messages, including two-factor authentication codes.

  • Where was the data stolen from, as mentioned in the script?

    -The data was stolen from National Public Data, which provides an API service for background check services.

  • How did National Public Data obtain the data?

    -National Public Data obtained the data through web scraping across public and non-public sources and by purchasing data from data brokers, all without consent.

  • What was the actual number of unique individuals affected by the data leak according to the script?

    -The actual number of unique individuals affected by the data leak is likely to be an order of magnitude less than 3 billion, possibly around 200 million.

  • What was the observation regarding people whose records were not found in the data leak?

    -People whose records were not found in the data leak often used data opt-out services or had a minimal online footprint, suggesting they might be 'off-grid'.

  • What was the script's suggestion for people to do in response to the data leak?

    -The script suggested that people should keep an eye out for identity theft, monitor for unauthorized credit cards or utility accounts opened in their name, and follow the outcome of the class-action lawsuit against National Public Data.

Outlines

00:00

🔒 Massive Data Breach Exposed

The video discusses a significant data breach where a hacker posted a database containing personal information of nearly 3 billion people on a dark web forum. The data, weighing 277 GB, includes sensitive information such as names, dates of birth, addresses, phone numbers, and social security numbers. Initially, the hackers sought to sell the data for $3.5 million but later decided to give it away for free to gain reputation. The video highlights the potential misuse of social security numbers for identity theft, such as shutting off utilities, opening new accounts, or conducting SIM swapping attacks. The data was stolen from National Public Data, a company that provides API services for background checks and aggregates data through web scraping and purchasing from data brokers without consent.

05:03

🔎 Debunking the '3 Billion People Affected' Claim

The video script analyzes the claim that the data breach affected 3 billion people by examining a sample of the leaked data. The presenter uses Libre Office to organize the data into labeled columns and notices that multiple records refer to the same individual, suggesting that the actual number of affected individuals is likely less than reported. The presenter also discusses the potential reasons why some people, including themselves, are not found in the data leak, such as using data opt-out services or having a minimal online presence. The summary concludes by advising viewers to be vigilant against identity theft and to monitor for unauthorized activities under their names.

10:05

📢 Call for Accountability and Security Improvement

The final paragraph of the script addresses the legal action taken against National Public Data for their failure to secure the massive amount of sensitive data and for scraping data unethically without consent. The presenter calls for severe punishment to deter companies with poor security practices and data hoarding tendencies. The video ends with a call to action for viewers to like, share, and support the presenter's online store, offering a discount for using Monero at checkout.

Mindmap

Keywords

💡Data breach

A data breach refers to an incident where unauthorized individuals gain access to sensitive information, often with malicious intent. In the video, the theme revolves around a massive data breach where nearly 3 billion personal records were exposed. The script mentions the hackers initially tried to sell this data for $3.5 million before deciding to give it away for free to gain reputation within hacker forums.

💡Dark web

The dark web is a part of the internet that is not indexed by traditional search engines and requires specific software, configurations, or authorization to access. It's often associated with illegal activities, including the buying and selling of stolen data. The video script describes the discovery of the data breach on a 'dark web hacker forum', emphasizing the clandestine nature of such transactions.

💡Personal data

Personal data includes any information that can be used to identify an individual, such as names, addresses, phone numbers, and social security numbers. The video discusses a database containing personal data of billions of people, highlighting the scale and sensitivity of the information compromised in the breach.

💡Social Security number (SSN)

A Social Security number is a unique identifier issued by the U.S. government to track individuals for Social Security benefits and taxation. In the script, the SSN is highlighted as a critical piece of personal data included in the breach, which can be used for identity theft and financial fraud, such as taking control of phone numbers or opening new utility accounts.

💡Hashing

Hashing is a process that converts data into a string of characters, typically for security purposes. It's used in the video to protect the privacy of individuals by transforming personal information into a form that cannot be reversed to the original data. The script mentions hashing to ensure that the data displayed does not reveal any personally identifiable information.

💡Web scraping

Web scraping is the practice of extracting data from websites, often without permission. The video script explains that the data was obtained through web scraping across public and non-public sources, indicating a violation of privacy and consent.

💡Data broker

A data broker is a company that collects and sells personal data. In the context of the video, data brokers are mentioned as one of the sources from which the stolen data was aggregated, raising ethical questions about the collection and sale of personal information without consent.

💡Identity theft

Identity theft occurs when someone uses another person's personal information without their permission to commit fraud or other crimes. The video warns viewers to be vigilant against identity theft as a potential consequence of the data breach, such as unauthorized credit card applications or utility account openings.

💡Sim swapping

Sim swapping is a type of fraud where an attacker convinces a mobile network provider to transfer a phone number to a new SIM card they control, gaining access to the victim's calls and messages. The video script uses sim swapping as an example of how the leaked SSNs could be exploited to compromise personal accounts and two-factor authentication codes.

💡Class action lawsuit

A class action lawsuit is a type of lawsuit where a large group of people collectively sue a defendant for similar harms. The video mentions a class action lawsuit filed against 'National Public Data' for their failure to secure the data and for scraping it in unethical ways, indicating potential legal consequences for such breaches.

💡Data opt-out services

Data opt-out services allow individuals to prevent their information from being collected and sold by data brokers. The script suggests that people who used data opt-out services or had minimal online presence were less likely to be found in the leaked database, illustrating one way individuals can protect their data.

Highlights

A data breach has exposed personal data of nearly 3 billion people.

The leaked data is 277 GB uncompressed, equivalent to the size of Call of Duty Black Ops 6 4K texture packs.

Data points include first name, last name, date of birth, address, phone number, and social security number.

Hackers initially attempted to sell the database for $3.5 million but later decided to give it away for free.

The data breach could enable attackers to shut off utilities or open new accounts in victims' names.

Social security numbers are used for financial transactions and security verifications in the United States.

The data could be used for SIM swapping attacks, compromising online accounts.

The data was stolen from National Public Data, which provides an API service for background checks.

Data was obtained through web scraping and purchasing from data brokers without consent.

Background check services often provide a poor user experience, asking for payment after long load times.

The actual number of affected individuals may be less than reported, possibly around 200 million.

Some individuals could not be found in the leak, possibly due to using data opt-out services or having minimal online presence.

The data leak includes repeated entries of the same person at different addresses.

The video creator hashes personal data to protect privacy while demonstrating the breach's impact.

There are examples of the same person being repeated multiple times in the database.

A class action lawsuit has been filed against National Public Data for their failure to secure the data.

The video concludes with a call to action for viewers to protect themselves from identity theft and stay informed about the lawsuit's outcome.

The video encourages viewers to like, share, and support the creator's online store for merchandise.

Transcripts

play00:00

I've covered a lot of data breaches on

play00:02

this channel and usually the number of

play00:04

personal records that get released in

play00:06

any odd data leak are in the thousands

play00:09

or sometimes in the millions but today

play00:11

when I was browsing my friendly

play00:13

neighborhood dark web hacker Forum I

play00:16

stumbled upon a post titled national

play00:18

public data full DB 2024 which

play00:23

supposedly has the personal data of

play00:26

almost 3 billion people in it that's

play00:29

right folks folks this text Data weighs

play00:32

in at

play00:33

277 GB uncompressed that takes up about

play00:37

as much space as Call of Duty Black Ops

play00:40

6 4K texture packs and all and it has

play00:43

data points in it like first name last

play00:47

name date of birth address phone number

play00:50

and social security number now at first

play00:54

the hackers that stole this database

play00:56

were trying to sell it for $3.5 million

play01:00

but then they decided H you know what

play01:02

I'm feeling generous today I'm going to

play01:04

just give it away for free to all of my

play01:08

hacker Forum buddies so I can earn

play01:10

myself a lot of reputation and as far as

play01:13

the leak itself goes it's pretty much

play01:15

structured like a phone book but with

play01:18

social security numbers included as well

play01:21

and that SSN data point is especially

play01:24

disturbing because I don't know about

play01:26

other countries but here in the United

play01:29

States Social Security numbers are used

play01:32

when you apply for a loan when you open

play01:34

a bank account credit card account

play01:36

credit reports and pretty much any other

play01:39

financial transaction involves your

play01:42

social security number and the last four

play01:44

digits of a person's social security

play01:46

number are often used for security

play01:49

verifications whenever you call up your

play01:51

internet provider to interact with your

play01:54

account or your utility provider or your

play01:57

cellular company so the data in this

play01:59

leag could be used by somebody to shut

play02:02

off your power or open up new utility

play02:05

accounts in your name at different

play02:06

houses that they're squatting in or

play02:08

trying to rent out to people like hey

play02:10

you want to stay in this abandoned house

play02:12

and get some free Power sure just come

play02:14

in here and I don't know give me a 100

play02:16

bucks a month or they could call your

play02:18

cellular provider and use your social

play02:20

security number to pull off a Sim

play02:23

swapping attack so this is where an

play02:25

attacker basically takes control of your

play02:27

phone number by getting the carrier to

play02:30

program their sim card with it they

play02:32

would just call your carrier pretend to

play02:34

be you or someone authorized on your

play02:36

account and say that they lost their

play02:38

phone and now they've got a new one and

play02:39

they need the phone number back and then

play02:42

after they do that the attacker is able

play02:44

to get all of your calls and all of your

play02:47

text messages on their phone and that

play02:51

includes temporary codes that Google or

play02:54

Facebook sends you for changing your

play02:57

password and two-factor Authentication

play03:00

which means that those accounts could be

play03:03

compromised too who would have thought

play03:05

that a nine-digit number assigned to you

play03:08

at Birth could cause so much Havoc if it

play03:10

fell into the wrong hands and speaking

play03:13

of wrong hands you're probably wondering

play03:16

who this data was stolen from because

play03:19

most people don't just have 300 gabyt of

play03:23

social security numbers and names and

play03:26

addresses and stuff laying around so the

play03:29

data in question was stolen from

play03:32

national public data which provides an

play03:35

API service for background check

play03:38

services and they got the data through

play03:41

web scraping across public and

play03:44

non-public sources without anyone's

play03:48

consent and from purchasing the data

play03:51

from data Brokers again without the

play03:54

consent of the person who the data

play03:57

pertains to national public data then

play04:00

combines these different sources and

play04:02

packages it together in a format that

play04:05

XML apis can read easily and then the

play04:09

different background check services

play04:10

online create a front end for their

play04:13

customers to do these background checks

play04:15

and these different kinds of lookups

play04:17

often in a not so convenient way that

play04:20

takes artificially long to load the data

play04:22

only to ask you to pay a fee at the very

play04:25

end when you thought it was free so I

play04:28

guess one upside to this data breach is

play04:31

that now I can do background checks

play04:33

locally with grep instead of having to

play04:35

go through that nonsense anymore now I

play04:39

haven't been able to look through this

play04:41

data too extensively since it's

play04:44

basically a compressed CoD game worth of

play04:46

information that takes a long time to

play04:48

download since it's probably hosted on a

play04:50

remote server in Vietnam somewhere and

play04:52

it has to pass through the onion Network

play04:55

to get to its destination but based on

play04:57

the limited amount of grepping that I've

play04:59

been able to do on the two SS sn. txt

play05:03

files I can confirm that this breach

play05:07

doesn't actually affect 3 billion people

play05:10

and I can actually demonstrate why

play05:12

that's the case and hopefully I can do

play05:14

so without doxing anyone so here in

play05:18

Libre office I've copied over a sample

play05:21

of the data leak and I've organized it

play05:24

into labeled columns so we've got ID

play05:27

first name last name middle name Etc

play05:30

these are all of the same columns that

play05:32

came from the database leak it's just

play05:35

comma separated values you know there's

play05:37

a nicer way to display all the

play05:39

information um now the reason why the

play05:44

data in these cells looks like a bunch

play05:46

of random letters and numbers instead of

play05:49

a legible name is because I hashed all

play05:53

of the personally identifying

play05:56

information here to protect this

play05:58

person's privacy see um the only one

play06:01

that's not hashed is this ID column here

play06:04

which is just the line number from the

play06:07

data set so this isn't really considered

play06:10

pii uh so you can see here that this is

play06:15

eight different

play06:17

records and if we start looking through

play06:20

each of the columns here for first name

play06:23

all of these hashes are the same um and

play06:26

if you're not familiar with hashing

play06:29

algorith

play06:30

they basically take input of a string

play06:34

and they crunch it down into something

play06:35

that can't be reversed so there's no way

play06:37

to actually get the person's first name

play06:40

from what you're seeing here that's why

play06:42

it's safe to show it um but also any two

play06:46

strings that are the same if you feed

play06:49

them into a hashing algorithm the hash

play06:51

is going to be the same and if those

play06:54

strings deviate just a little bit and a

play06:56

string can be an entire novel mind you

play06:58

so like if you literally just change one

play07:00

letter in a novel and then you pass that

play07:03

into a hashing algorithm you're going to

play07:05

get two completely different hashes from

play07:07

that so the fact that these are the same

play07:11

proves that the input strings I fed were

play07:13

the same as well uh so we have the same

play07:15

thing going on with last name okay all

play07:17

of this is the same middle name or

play07:20

really just middle initial um or

play07:23

sometimes it's a middle name you know

play07:24

it's if if you actually look through the

play07:26

raw data um it's mostly middle initials

play07:29

and sometimes middle names but anyway

play07:31

that's all the same dates of birth are

play07:33

the same now with addresses there's a

play07:35

little bit of differences here but I've

play07:37

actually highlighted in different colors

play07:39

the ones that match so these two

play07:41

addresses are the same um I think yeah

play07:45

the green ones match this orange one is

play07:48

unique and then these purple ones match

play07:52

up as well uh so there's only four

play07:54

unique addresses here out of um eight

play07:58

records all the cities uh County names

play08:03

State and zip codes are all the

play08:06

same so you know maybe this guy owns

play08:09

multiple condos in one building or maybe

play08:11

he moved around town a few times I'm not

play08:14

exactly sure uh what's up with that

play08:16

there and if there were any doubts that

play08:20

this is all the same

play08:23

person in the SSN

play08:25

column these are all the same too so

play08:27

it's all the same social security number

play08:30

it's all the same person repeated eight

play08:33

times in the database leak and there's

play08:35

several different examples of this um if

play08:38

you actually look at the raw database

play08:40

leak of the same person being repeated

play08:43

or being repeated at different addresses

play08:46

um I've seen a few PO Box entries for

play08:49

people and another positive observation

play08:54

is that I wasn't able to find records

play08:57

for several people who authoriz me to

play09:00

look them up in this database leak

play09:02

including myself and I think the Common

play09:06

Thread here with people I wasn't able to

play09:08

find where these people either used data

play09:11

optout services or they just have a very

play09:15

very minimal online footprint to begin

play09:17

with they don't really have any uh

play09:19

subscription services that they pay for

play09:22

they don't have any social media um or

play09:25

you know anything like that I guess

play09:26

they're kind of off- grid you could say

play09:29

so if I had to guess the actual number

play09:31

of people in this leak is probably an

play09:35

order of magnitude or possibly a little

play09:37

less than what some media Outlets are

play09:40

saying with 2.9 billion uh but still you

play09:44

know that's over 200 million people's

play09:47

Social Security numbers leaked which is

play09:50

most of America so yeah keep an eye out

play09:53

for identity theft uh people opening up

play09:56

new credit cards or new utilities new

play09:59

lines with the cell phone company and

play10:01

stuff like that under your name and keep

play10:04

an eye out for the outcome of this class

play10:09

action lawsuit that's been filed against

play10:12

national public data because of their

play10:14

failure to secure this massive Trove of

play10:17

data that they had and also the fact

play10:19

that they scraped this data in some

play10:22

really shady ways without anyone's

play10:24

consent in the first place hopefully

play10:27

their punishment is severe enough to to

play10:29

compel all these companies that have

play10:32

poor security practices and data

play10:34

hoarding fetishes to stop it and get

play10:37

some help if you enjoyed this video

play10:40

please like and share it to hack the

play10:41

algorithm and check out my online store

play10:43

base. when where you can get awesome

play10:45

merch like the tie-dye Tor te or the

play10:48

come and finded hoodie 10% discount for

play10:50

using Monero XMR at checkout have a

play10:53

great rest of your day

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
Data BreachCybersecurityHacker ForumSocial SecurityIdentity TheftOnline PrivacyData ScrapingAPI ServicesClass ActionCyber Threats
¿Necesitas un resumen en inglés?