Trending

HomeBlog
Around 7 Million User Records of Dave.com Leaked on Darknet for Free by ShinyHunters Group

Around 7 Million User Records of Dave.com Leaked on Darknet for Free by ShinyHunters Group

According to a research report, around 8.4 billion records have been exposed in the first quarter of the year 2020 which shows a 273% increase from the first half of the year 2019 which saw only 4.1 billion exposed.

During the process of our continuous darkweb and deepweb monitoring, the Cyble Research Team identified a known threat actor “ShinyHunters” who leaked 7 million user records Dave.com – a leading US challenger bank on a mission to put everyone’s financial mind at ease with free overdraft cash, budgeting, and side gigs. They have been helping 7 million Americans to thrive between paychecks. As of September 09, 2019, the company was valued at $1 Billion.

Cyble learnt about the breach on June 28 and notified Dave’s leadership on July 2. The database was initially on an auction, by the alias ‘hasway’ at the hacking forum exploit, and later was removed on auction. Cyble believes the alias belongs to ShinyHunters.

Leaked database of Dave

On July 24, things took an interesting turn when ‘ShinyHunters’ leaked the database of Dave.com and others. The leaked user records have been put up for free.

Some of the personal information data fields of the leaked users records from the lot are mentioned below-:

  • User ID
  • Phone Number
  • Email Address
  • Full Name
  • Date of Birth
  • Residential Address
  • Risepay ID
  • Synapsepay ID

During our research process, Cyble Research & Intelligence Labs got hold of some informative details related to this leak-:

report-ad-banner
  • Below is the table structure containing the user details of Dave.com.
  • This database seems to be have dumped through sending Github phishing emails to Dave.com employees. Threat actor appears to have found employee details by searching for developers in the organization on LinkedIn / Crunchbase / Angel online platforms.

Cyble has been reporting these types of breaches to aware individuals of the risks associated with using online services.

One of the users with the alias ‘Sheep’ put some interesting comments on the forum –

While the identities of the group are unconfirmed, based on the interviews Cyble conducted, along with the references made by the alias “Sheep” (as above), there is a similarity – ShinyHunters group is known to target GitHub accounts and use that to steal access tokens and so forth. Below is the list of IOCs shared by Github – which appears to be linked with ShinyHunters – as below:

aws-update[.]net
corp-github[.]com
ensure-https[.]com
git-hub[.]co
git-secure-service[.]in
githb[.]co
glt-app[.]net
glt-hub[.]com
glthub[.]co
glthub[.]info
glthub[.]net
glthubb[.]info
glthube[.]app
glthubs[.]com
glthubs[.]info
glthubs[.]net
glthubse[.]info
slack-app[.]net
ssl-connection[.]net
sso-github[.]com
sts-github[.]com
tsl-github[.]com
data-github[.]com
gilthub[.]com
gïthub[.]com
githube[.]app
githubs[.]info
gltgub[.]net
glthhubs[.]net
gthub[.]co
xn--gthub-cta[.]com

Ref – https://github.blog/2020-04-14-sawfish-phishing-campaign-targets-github-users/

We recommend people to:

About Cyble

Cyble is an Atlanta, US-based, global premium cyber-security firm with tools and capabilities to provide near real-time cyber threat intelligence. 

Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.

This monitoring and notification platform give the average consumer insights into their personal cybersecurity issues, allowing them to take action then as needed. It has recently earned accolades from Forbes as being the top 20 cyber-security companies to watch in 2020. 

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading