Deep Web

Genesis Store black marketplace offers more than 60k+ stolen bot profiles

Security experts at Kaspersky Lab reported that over 60,000 stolen profiles are offered for sale on an private marketplace called Genesis Store.

More than 60,000 stolen profiles are offered for sale in the underground marketplace Genesis Store, it includes browser fingerprints, web site user logins and passwords, cookies, and credit card information. The seller is offering the stolen data at a price per profile that ranges from $5 to $200.

“Genesis Store is an online cybercriminal invitation-based private market for stolen digital fingerprints. At the moment it offers more than 60k+ stolen bot profiles.” reads the post published by Kaspersky. “The profiles include: browser fingerprints, website user logins and passwords, cookies, credit card information. The price varies from 5 to 200 dollars per profile – it heavily depends on the value of the stolen information.”

Operators behind the marketplace explained that the price for the good they are selling is calculated automatically using a unique algorithm, for example, online bank account credentials have a higher price.

Genesis Store is the biggest online underground market for stolen data, it is easy to use and allows users to select specific bots by searching for credentials from a specific website, the victim’s country, operating system, and also the date the profile first appeared in the market.

Genesis StoreGenesis Store

The Genesis Store provides users a special .crx plugin for Chromium-based browsers that allows them to install of stolen digital profiles with a single click.

“The plugin allows installing stolen digital profiles into the cybercriminal’s own browser with a single mouse click for him to become a doppelganger of the victim.” continues Kaspersky. “After that the bad guy only needs to connect to a proxy server with an IP address from the victim’s location and he can bypass the anti-fraud systems’ verification mechanisms, pretending to be a legitimate user.”

An option implemented in Genesis Store allows customers to generate unique fingerprints, that could be used to enter stolen bank card information into online store forms. The use of unique browser fingerprints allows bypassing anti-fraud system.

Experts at Kaspersky also described another tool widely used to bypass anti-fraud systems, the Tenebris Linken Sphere browser.

Crooks could leverage the Tenebris Linken Sphere browser to bypass anti-fraud systems and remain anonymous, this tool is used for carding for years. 

“Unlike the Genesis plugin, Sphere is a fully functional browser with advanced fingerprint configuration capabilities, automatic proxy server validity testing and usage options, etc. It even features a user activity emulator – cybercriminals can program it to open the desired websites, follow links, stay on websites for a given length of time, etc.” continues Kaspersky. “Simply put, to trick the anti-fraud systems’ behavior analysis modules. The Tenebris Linken Sphere developers have also created a marketplace of unique fingerprints that can be used with Sphere browsers. “

This browser is offered as part of a subscription-based licensing system that goes for $100 per month. Cybercriminals that want to access the fingerprints market have to pay a fee of $500 per month.

Antifraud systems are rapidly developing. They introduce new protection mechanisms to fend off fraudsters, while fraudsters develops new tools to break through the protection layers.” the experts conclude.”The sums of money lost to carding attacks are huge, and cybercriminals are most certain to scale up these malicious activities.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – fingerprints, Genesis Store)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…

3 hours ago

UK’s Legal Aid Agency discloses a data breach following April cyber attack

The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…

6 hours ago

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

Cybersecurity Observatory of the Unipegaso's malware lab published a detailed analysis of the Sarcoma ransomware.…

8 hours ago

Mozilla fixed zero-days recently demonstrated at Pwn2Own Berlin 2025

Mozilla addressed two critical Firefox vulnerabilities that could be potentially exploited to access sensitive data…

21 hours ago

Japan passed a law allowing preemptive offensive cyber actions<gwmw style="display:none;"></gwmw>

Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…

1 day ago