After accessing the database of Daniel’s Hosting (one of the largest free web hosting for Darkweb services) on March 10, 2020, and simultaneously deleting the data from Daniel’s Hosting, a hacker recently leaked all the data online. The breach was previously reported, but the public data leak is new information. This was not the first time Daniel’s hosting was breached. In November of 2018, an intruder breached the site and again deleted all the data. Due in part to this, Daniel’s Hosting has temporarily shut down its services, although they plan to return once they’ve upgraded all of their services several months from now.
According to a rough analysis by ZDNet, the leaked data includes 3,671 email addresses, 7,205 account passwords, and 8,580 private keys for .onion domains. Binary Defense analysts reviewed the leaked data and found some of the Tor hidden website addresses suggested illegal activities—for example, one .onion address started with “pedohub” and another started with “mydrugs,” while other site addresses suggested that they sold guns. This information will be useful for law enforcement to identify people taking part in illegal activities but could also be used by governments attempting to crack down on political dissidents.
For more information, please read: https://www.zdnet.com/article/hacker-leaks-database-of-dark-web-hosting-provider/