Massive leak: 267 million Facebook accounts for sale on the Dark Web and how to protect yourself

  • More than 267 million Facebook accounts have been sold on the Dark Web, including sensitive personal data.
  • Compromised data enables phishing scams, identity theft, and other cybercrimes.
  • The oversupply of leaked information has reduced the value of personal data on the black market.
  • Strengthening passwords, enabling two-factor authentication, and monitoring privacy are essential steps to protecting your accounts.

Facebook accounts sold on the Dark Web

La massive Facebook data leak has once again put the spotlight on the vulnerability of personal information on social media. More than 267 million Facebook accounts have been put up for sale in the Dark Web and in private cybercrime forums for alarmingly low prices, raising concerns among users, cybersecurity experts, and international organizations. Below, we comprehensively address everything this leak entails, the risks it exposes you to, and key recommendations for protecting your digital identity.

What happened to the 267 million leaked Facebook accounts?

Facebook data leak

According to research by the security firm Cyble, personal data Of 267 million Facebook users, most of them residing in different countries, were found for sale on the Dark Web, packaged for just about 600 dollarsThis database was detected both in underground internet markets and in clandestine cybercriminal forumsThe compromised information did not include passwords, but it did contain enough personal data to be used in criminal activities such as phishing, identity theft, and online scams.

The credentials offered to cybercriminals include:

  • Full names and surnames
  • Email addresses
  • Telephone numbers
  • Facebook IDs
  • Dates of birth
  • Age

This type of leak is not an isolated situation, since previous data thefts have affected millions of profiles on the social network and other popular services, demonstrating that cybersecurity should be a priority for all users.

What is the Dark Web and why is data sold there?

Dark Web and cybercrime

La Dark Web It is a hidden part of the Internet that cannot be accessed using conventional methods or common search engines. There are clandestine markets where illegal items can be found, such as stolen personal data, login credentials for various platforms, credit cards, drugs, and all kinds of illicit goods and services. The anonymity offered by the Dark Web facilitates the trade of sensitive information without leaving any obvious traces.

In this context, information stolen from millions of Facebook profiles becomes an attractive product for those looking to exploit vulnerabilities and commit cybercrimes. Unlike the Deep Web, which is a broader section of the Internet not indexed by search engines and containing legal and legitimate material, the Dark Web is specifically associated with illegal or high-risk activities.

How did the data breach happen? Analysis of the methods used

Facebook Filtration Methods

The exact origin of this leak of 267 million accounts is still under analysis, but there are two main hypotheses:

  1. Facebook API AbuseSeveral researchers suggest the information was obtained through improper exploitation of Facebook's API, likely before the company strengthened its security measures on the platform. This allowed third parties to access users' personal information without sufficient authorization, extracting large volumes of data using bots or applications with excessive permissions.
  2. Massive Web ScrapingOther analyses point to the use of scraping techniques, where automated programs collect publicly posted information from Facebook user profiles. Although privacy restrictions may limit access, if a user's data is public or if vulnerabilities exist, information from millions of accounts could be collected in an automated process.

In both cases, the lack of passwords in the database does not eliminate the risk, as attackers can carry out phishing campaigns and personalized frauds taking advantage of the information obtained.

Impact and risks for affected users

Risks and threats from the Facebook leak

The low-cost sale of personal data on the Dark Web means that a large number of cybercriminals can easily access it. The main risks for those affected include:

  • Social engineering and phishing: The exposed data allows for targeted attacks to be launched via emails, SMS messages, or even phone calls disguised as legitimate communications to steal more information or infect devices.
  • Extortion and blackmailCriminals may use the information to threaten victims with the publication of certain data or attempt to trick them into obtaining payments.
  • Impersonation: With enough information, an attacker can impersonate the victim to third parties, causing economic or reputational damage.
  • Theft of associated accountsIf any of the credentials match login details for other services, attackers can also access other linked accounts and applications.
  • Malware spreadThrough phishing campaigns, criminals can distribute malicious software that takes control of personal devices.

Furthermore, it's important to keep in mind that this data can be stored and circulated for years, remaining a potential long-term threat. Even if you change your password or strengthen your account security, the stolen information can be used in other types of fraud.

Comparison: Other massive leaks and the price of data on the Dark Web

More data leaks on the Dark Web

The low prices The mass sale of personal data isn't a phenomenon exclusive to Facebook. For example, leaks have been reported where:

  • 500.000 Zoom accounts They sold for just a few cents each on the Dark Web, demonstrating that the value of personal information has fallen due to oversupply.
  • Leaks on other platforms Such as Disney+, Netflix, HBO, and email services have been marketed at bargain prices, highlighting the sheer volume of cyberattacks and the increasing amount of stolen data available for sale.
  • Databases with have been detected up to 419 million phone numbers from Facebook previously exposed, although in that case the company reported a smaller number of users actually affected after the investigation.

These ridiculous prices are explained by the competition among cybercriminals themselves, the ease of accessing large amounts of data in massive breaches, and the loss of value caused by the age of the information or its previous use in other frauds.

How do I know if I've been a victim of a leak?

Given the magnitude of a leak like this, concerns arise among users about How to check if your data has been compromisedThere are tools to verify this safely:

  • Verification platforms: Services such as HaveIBeenPwned y AmIBreached They allow you to enter your email address and check if it's part of any known leaked databases. These platforms are managed by cybersecurity experts and constantly update their records.
  • Official alertsIn some cases, the platforms themselves announce if your account has been compromised through notifications or emails. However, this doesn't always happen, or it may take a while for the alert to arrive.

However, access the Dark Web directly It is highly inadvisable, as it is a hostile environment, with technical and legal risks, and exposes your digital identity to greater dangers.

Protective measures against personal data leaks

After learning of a leak of this magnitude, it is essential to adopt a series of preventive and corrective actions to mitigate potential risks:

  1. Change your passwords immediately on Facebook and all other services where you use the same password. Try to create strong passwords, combining letters, numbers, and symbols, and avoid reusing them across different sites.
  2. Enable two-factor authentication (2FA) whenever possible. This method adds an extra layer of security that prevents attackers from accessing your account with just your password.
  3. Check the privacy settings from your social networks. Limit the visibility of your personal information and restrict access to sensitive data to trusted individuals only.
  4. Be wary of suspicious messages Received via email or messaging that requests personal information or login credentials. Never click on direct links or download attachments from unknown sources.
  5. Use password managers to securely store your keys and generate combinations that are difficult to crack.
  6. Keep an eye on your accounts banking and other sensitive services in response to suspicious activity. If you notice unusual activity, contact the appropriate support team immediately.
  7. Keep your operating system and applications updated, as the updates fix vulnerabilities that can be exploited by cybercriminals.
  8. Avoid posting sensitive information publicly on social media and limit the data you share on open platforms.

Facebook's role and response to leaks

Facebook's response to leaks

Facebook has responded to this and other incidents by reiterating its commitment to the security of its users' data. In public statements, the company has noted that breaches like the 267 million account breaches are, in many cases, due to actions carried out before the introduction of new layers of security, such as mandatory phone number verification and restrictions on developer API access.

However, experience shows that Security improvements often come after high-profile episodes., which generates distrust among users. Therefore, the Responsibility for protecting information lies with both the platform and the users themselves., who must be informed and proactive in the face of any alert or irregular activity.

Additional recommendations from cybersecurity experts

Experts from companies such as Check Point, Proofpoint and Wallix insist that the best way to minimize the impact of leaks is to awareness and constant training of the user. The key points highlighted by the specialists are:

  • Update passwords periodically, even if there is no direct evidence of a leak on a platform.
  • Do not reuse passwords in different services.
  • Use dedicated email addresses for registration on social networks or other less critical platforms.
  • Review privacy and permissions settings granted to third-party applications associated with Facebook and other networks.
  • Learn about how the Dark Web works and current threats, but avoiding exploring them directly without the appropriate experience or resources.

Furthermore, many times the attacks are not only aimed at obtaining access data, but also at obtaining enough information to prepare much more sophisticated and difficult to detect attacks, using social engineering techniques advanced.

Why are prices for stolen data so low?

The sale of databases containing millions of accounts at low prices is due to several reasons:

  • Data oversupplyCyberattacks and leaks have proliferated, occupying clandestine forums and black markets with millions of registrations, causing prices to plummet simply by the law of supply and demand.
  • Black market competitivenessCybercriminals seek to quickly sell records before they lose value due to being too old or due to blocking and notification actions by the affected platforms.
  • Ease of acquisitionThe proliferation of automated tools has allowed hackers to collect, store, and distribute large amounts of data with little effort and cost.
  • Low perception of individual valueAlthough each user's information is valuable, for those who trade in personal data, the goal is to profit from the quantity, not the quality, of records.

Other recent leaks and the global trend in cybersecurity

The exposure of data on Facebook is not an isolated case, but rather part of a growing trend of cyberattacks worldwide. Among the most significant incidents are:

  • Unauthorized access to 540 million Facebook accounts in previous breaches.
  • Massive leaks of Zoom, Netflix, and Disney+ accounts, accompanied by the sale of credentials on the Dark Web.
  • Growth of attacks during periods of increased online activity, such as the rise of teleworking and the consumption of streaming services, where the speed and volume of breached records has increased exponentially.

These incidents have underlined the need for governments, businesses and end users adopt coordinated cybersecurity measures, prioritizing prevention and rapid response to any breach.

The importance of digital education and prevention

Beyond technology, the digital education It's the greatest shield against cybercrime. Knowing how to identify suspicious messages, avoid downloading unknown files, and stay up-to-date on the latest threats is crucial to protecting your digital identity. The shared responsibility between platforms, users, and service providers means everyone must stay informed and prepared to react immediately to potential incidents.

Additionally, it is advisable to:


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*