Criminal Marketplace, Genesis Market, Shut Down
In a coordinated global effort, law enforcement agencies have shut down one of the largest criminal marketplaces, Genesis Market, used by online fraudsters to purchase victims’ login details, IP addresses, and other personal data. Law enforcement agencies from 17 countries, including the UK, US, and Australia, participated in the raids that led to 120 arrests and the seizure of the Genesis website. The marketplace, operating since 2017, had 80 million sets of credentials and digital fingerprints for sale, enabling fraudsters to access bank, email, and shopping accounts without triggering security alerts.
The UK’s National Crime Agency (NCA) arrested 24 individuals suspected of using the site, including two men in Grimsby, Lincolnshire, who were detained on suspicion of fraud and computer misuse. The operation, dubbed “Operation Cookie Monster,” was led by the FBI and the Dutch National Police, who collaborated with agencies from Europe and Australia. Robert Jones, director general of the National Economic Crime Centre at the NCA, emphasised the need for criminals to fear that their own credentials were compromised.
Genesis Market, notable for its user-friendly, English-language interface, operated on both the open and dark web, providing customers with a purpose-built browser to mimic victims’ computers. The marketplace sold login information for various accounts, including Facebook, PayPal, Netflix, and Amazon, and even notified criminals if the purchased passwords changed. Victims’ data, which could be used for fraud or ransomware attacks, typically sold for less than £1 or up to hundreds of Pounds. The data that led to the 2021 hack of gaming giant Electronic Arts (EA) was sold for just $10 on the website.
The NCA estimates that there were about two million victims worldwide, with tens of thousands in the UK. Businesses (and members of the public) are advised to keep their device software up-to-date, use multi-factor authentication where possible, and ensure they use strong passwords which include random words, numbers and special characters and do not use the same passwords for multiple accounts. We also suggest the use of a password manager which is also protected by multi-factor authentication or is linked into a business’s existing single-sign-on solution.
If you want to find out if your credentials have been leaked on the dark web full out the form at the link below to request for a FREE one off Business Dark Web Scan, this can also be made available for businesses as a managed service to ensure that if any of your accounts do become available on the dark web, that you receive instant alerts and One2Call can assist you with making sure that your accounts remain secure.
Latest News Stories
Patient Images from Plastic Surgery Clinic threatened to be leaked on Dark Web
The BlackCat cyber crime syndicate, also known as ALPHV, has issued a threatening announcement regarding the release of sensitive patient images purportedly stolen from a Beverly Hills plastic surgery clinic. The controversial statement was published on the dark web...
Ransomware Attacks and their impact on the Healthcare System
In the autumn of 2021, the staff at Johnson Memorial Health in Franklin, Indiana, were looking forward to a respite from the recent surge of COVID-19 hospitalisations brought on by the delta variant. However, their hopes were dashed on October 1st, at 3 a.m. a...
Law firm Bryan Cave Leighton Paisner Victim of Major Cyber Attack
Law firm Bryan Cave Leighton Paisner (BCLP) has reported a significant cyber attack. In the attack, the sensitive data of more than 50,000 current and former employees of snack food conglomerate Mondelēz International was exposed. Mondelēz International, known for...
Our Customers
Testimonials
Molecular Dimensions
Brilliant Service, Quick Fixing, Wonderful Customer Service.
Danielle, Tremark Associates Ltd
Jordan dealt with both my issues quickly and were both sorted within the hour.
Claire H, MSP PLC
Made a call into day, to arrange an engineer visit and was able to get there before 12noon and solve the issue.