Doxbin

From HandWiki
Doxbin
Doxbin logo.png
Type of site
Pastebin
Available inEnglish
OwnerCorrie (KT)
Founder(s)Corrie & Nachash
RegistrationOptional
Users50,000
LaunchedMay 30, 2011; 12 years ago (2011-05-30)
Written inPHP


Doxbin was a pastebin primarily used by people posting personal data of any person of interest. This act is referred to as doxing. It was run as a hidden service on the Tor network.[1]

Due to the illegal nature of much of the information it published (such as social security numbers, bank routing information, and credit card information, all in plain-text), it was one of many sites seized during Operation Onymous, a multinational police initiative, in November 2014.[2]

Legality

Although morally and ethically questionable, Doxbin has seemed to avoid any heavy attention from law enforcement due to their rules and regulations for using/uploading to the website.

Doxbin does not allow any minor, illegally obtained or harassing/threatening info. Using Section 230 of the Communications Decency Act to be immune to liability of cyberstalking laws globally.

The privacy policy, mentions that they do not allow illegally obtained material and instigates by saying "Can anybody prove it? Not unless you brag about it.", it also states that "Doxbin was not made for harassment, intimidation or to cause nuisance." but also mentions that "It is impossible for some php code to harass somebody."

"Any pastes directly threatening and/or attempt to injure or hurt any particular individuals will be swiftly removed."

Doxbin vs Lapsus$

"White" was a founding leader of a new ransomware group named Lapsus$ which had a list of notable data leaks, such as ones from Nvidia or T-Mobile.

The feud between the Doxbin owner "kt" and "White" had been ongoing since he leaked the Doxbin database.[3]

"kt" had eventually doxed "White", one of the founding leaders on January 8th 2022; and published his personal details onto Doxbin.[4]

White's house was raided on the morning of April 1st, 2022 and earlier in December 2021, both for relations to Lapsus$.[5]

He was charged with:[6]

  • Three counts of unauthorized access to a computer with intent to impair the reliability of data.
  • One count of fraud by false representation.
  • One count of unauthorized access to a computer with intent to hinder access to data.
  • One count of causing a computer to perform a function to secure unauthorized access to a program.

History

Doxbin was established to act as a secure, anonymous venue for the publication of dox, first established by an individual known as nachash. Dox being a term in Internet culture which refers to personally identifiable information about individuals, including social security numbers, street addresses, usernames, emails, and passwords, obtained through a variety of legal and illegal means.[7]

In November 2012, Doxbin's Twitter handle @Doxbin was attributed to an attack on Symantec, coordinated with Anonymous' Operation Vendetta.[2]

It first attracted attention in March 2014 when its then-owner hijacked a popular Tor hidden service, The Hidden Wiki, pointing its visitors to Doxbin instead as a response to the maintenance of pages dedicated to child pornography links.[8][9][10] In June 2014, their Twitter account was suspended, prompting the site to start listing the personal information of the Twitter founders and CEO.[11] In October 2014, Doxbin hosted personal information about Katherine Forrest, a federal judge responsible for court rulings against the owner of Tor-based black market Silk Road, leading to death threats and harassment.[7][12]

Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative Operation Onymous.[13][14][15] Shortly thereafter, one of the site's operators who avoided arrest shared the site's logs and information about how it was compromised with the Tor developers email list, suggesting it could have either been the result of a specialized distributed denial of service attack (DDoS) or exploited mistakes in its PHP code.[13][14][16][17] However, the site could still be restored easily by setting up a new domain.[18]

See also

References

  1. Keller, Kevin. "The Tor browser: A forensic investigation study". The Tor Browser: A Forensic Investigation Study. 
  2. 2.0 2.1 Fox-Brewster, Tom (2014-12-09). "The darkweb's nihilistic vigilante sees the light" (in en-GB). The Guardian. ISSN 0261-3077. https://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online. 
  3. "A Closer Look at the LAPSUS$ Data Extortion Group – Krebs on Security" (in en-US). https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/. 
  4. Peters, Jay (2022-03-23). "A teen is reportedly the mastermind behind the Lapsus$ hacking group" (in en). https://www.theverge.com/2022/3/23/22993731/lapsus-hacking-group-teenager-mastermind. 
  5. "Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal" (in en-GB). BBC News. 2022-03-24. https://www.bbc.com/news/technology-60864283. 
  6. Page, Carly (April 2, 2022). "UK police charge 2 teenagers in connection with Lapsus$ hacks". https://techcrunch.com/2022/04/01/uk-police-teenagers-lapsus/. 
  7. 7.0 7.1 Howell O'Neill, Patrick (10 November 2014). "Dark Net hackers steal seized site back from the FBI". Daily Dot. http://www.dailydot.com/politics/doxbin-dark-net/. 
  8. Howell O'Neill, Patrick (12 March 2014). "Deep Web hub hacked and shut down over child porn links". http://www.dailydot.com/news/hidden-wiki-deep-web-hacked-intangir/. 
  9. Mead, Derek (13 March 2014). "A Hacker Scrubbed Child-Porn Links from the Dark Web's Most Popular Site". https://www.vice.com/read/a-hacker-scrubbed-child-porn-links-from-the-dark-webs-most-popular-site-mb-test. 
  10. "Twitter Founders' Personal Information Released on Doxbin". 12 June 2014. http://darkwebnews.com/news/twitter-founders-personal-information-released-doxbin/. 
  11. Tarquin (June 12, 2014). "Twitter Founders' Personal Information Released on DOXBIN". http://darkwebnews.com/news/twitter-founders-personal-information-released-doxbin/. 
  12. "Site Doxx'es Judge of Silk Road Case – Calls To "Swat" Her". 13 October 2014. http://www.deepdotweb.com/2014/10/13/site-doxxes-judge-of-silk-road-case-calls-to-swat-her/. 
  13. 13.0 13.1 Rauhauser, Neal (11 November 2014). "Doxbin's Nachash On Operation Onymous (P.1)". DeepDotWeb. http://www.deepdotweb.com/2014/11/11/doxbins-nachash-operation-onymous-1/. 
  14. 14.0 14.1 Gallagher, Sean (9 November 2014). "Silk Road, other Tor "darknet" sites may have been "decloaked" through DDoS". https://arstechnica.com/security/2014/11/silk-road-other-tor-darknet-sites-may-have-been-decloaked-through-ddos/. 
  15. O'Neill, Patrick Howell (17 November 2014). "Tor eyes crowdfunding campaign to upgrade its hidden services". http://www.dailydot.com/technology/tor-crowdfunding-hidden-services/. 
  16. Muadh, Zubair (12 November 2014). "Doxbin's Nachash On Operation Onymous (P.2)". Deepdotweb. http://www.deepdotweb.com/2014/11/12/doxbins-nachash-on-operation-onymous-p-2/. 
  17. nachash [handle]. "[tor-dev yes hello, internet supervillain here"]. https://lists.torproject.org/pipermail/tor-dev/2014-November/007731.html. 
  18. "The darkweb's nihilistic vigilante sees the light" (in en). 2014-12-09. http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online.