Deep Web

Hackers are offering for sale O2 customer data on the dark web

O2 customer data that was reportedly first stolen from the gaming site XSplit in November 2013 are now offered for sale on the Dark Web.

In the dark web it is possible to find any kind of illegal product and services, from weapons to payment card data, last disconcerting discovery is related to the availability of O2 customer data in the dark web.

According to the Victoria Derbyshire programme the data are offered for sale, it seems that belong to the trove of information stolen from the gaming website XSplit three years ago. The data include login credentials, phone numbers, emails, and dates of birth.

The O2 customers that shared the same credentials with the gaming website are potentially exposed to the hackers that could access their data. Unfortunately, this is a bad habit that allows hackers to take over all the accounts of the victims that share the same credentials. You have also to consider that there are software that automate the process of testing dump of stolen data against multiple online web services, including Twitter and Facebook, stolen credentials, the Shard tool is one of them.

The O2 company has already alerted the law enforcement and it is supporting investigations.

“Credential stuffing is a challenge for many businesses. We have reported all the details passed to us about the seller to law enforcement and we continue to help with their investigations. ” states the official statement issued by O2. “We act immediately if we are given evidence of personal credentials being taken from the internet and used to try and compromise a customer’s account.”

The news was also reported by the BBC that with the support of an ethical hacker purchased a set of O2 customer data to investigate the case.

“It was shown to the BBC by an ethical hacker, who found the information listed for sale on a dark net market. The dark net is a part of the internet that is only visible to people using specialist web browsers, and is often used for illegal activity.” reported the BBC. “BBC reporters purchased a small sample of customer details from the seller to investigate further and contacted O2. Together, the investigating teams believed it was the result of credential stuffing.”

O2 customer data sold on dark net (Source BBC)

The BBC cites Hasnain Shaw that was one of the people whose details the media broadcaster obtained, his data had already been abused to access more accounts registered on other web services. He confirmed to have shared the same credentials with O2.

“I was away from home when eBay contacted me to say there was some suspicious activity on my account. I checked and it looked like there were cars for sale on my account.” Shaw said. “Four weeks ago, I got a similar email from Gumtree. It looked like the same people had got access to that account because it was the same cars being advertised.”

As usual, let me suggest using strong passwords, a different password for each web service and enable two-factor authentication when available.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Dark Web, O2 customer data)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

16 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

17 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

22 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

1 day ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.