Jump to content

Doxbin (darknet): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Citation bot (talk | contribs)
Add: date. | Use this bot. Report bugs. | Suggested by Susmuffin | #UCB_toolbar
Vastcast (talk | contribs)
Entirely changed the main Doxbin. More notable website, while still maintaining the information that was there before.
Tags: Reverted Visual edit
Line 1: Line 1:
{{Update|inaccurate=yes|reason=Similarly named sites of notoriety have surfaced again|date=March 2022}}
{{Short description|Document sharing website}}
{{Short description|Document sharing website}}
{{Infobox website
{{Infobox website
| name = Doxbin
| name = Doxbin
| logo = Doxbin_logo.png
| logo = Doxbin Logo.png
| logo_size =
| logo_size =
| logocaption =
| logocaption =
| screenshot =
| screenshot = Doxbin Homepage.png
| caption =
| caption = Homepage of Doxbin on 26 April 2022
| collapsible =
| collapsible =
| collapsetext =
| collapsetext =
| commercial =
| commercial =
| type = [[Doxing|Dox]] publisher
| type = [[Doxing|Dox]] publisher
| registration =
| registration = Optional
| language =
| language =
| num_users =
| num_users =
Line 20: Line 19:
| editor =
| editor =
| launch_date = {{Start date|2011|5|30}}
| launch_date = {{Start date|2011|5|30}}
| current_status = Inactive
| current_status = Active
| revenue =
| revenue =
| alexa =
| alexa =
Line 26: Line 25:
}}
}}


'''Doxbin''' was a [[document sharing]] and publishing [[website]] which invites users to contribute [[personally identifiable information]], or "[[doxing|dox]]", of any [[person of interest]]. It was previously operated on the [[darknet (networking)|darknet]] as a [[Tor hidden service]], by a person known on the internet as ''nachash''.<ref>{{Cite journal|last=Keller|first=Kevin|title=The Tor browser: A forensic investigation study|journal=The Tor Browser: A Forensic Investigation Study}}</ref> Since its takedown in 2014, ''nachash'' has stepped down and relinquished his ownership to a predecessor that used the username "King Oren" when interviewed. He said in an interview that he is hosting Doxbin on the [[World Wide Web]], as well as on [[Darknet]] and [[Tor hidden service]] websites. He declined to release the link to either of them, saying, "The people that use the service know how to find it, that's what keeps it secure and out of the reach of incompetent people using it for malice things".{{Citation needed|date=August 2021}}
'''Doxbin''' is a [[document sharing]] and publishing [[website]] which invites users to contribute [[personally identifiable information]], or "[[doxing|dox]]", of any [[person of interest]]. It was previously operated on the [[darknet (networking)|darknet]] as a [[Tor hidden service]], by a person known on the internet as ''nachash''.<ref>{{Cite journal|last=Keller|first=Kevin|title=The Tor browser: A forensic investigation study|journal=The Tor Browser: A Forensic Investigation Study}}</ref> Since its takedown in 2014, ''nachash'' has stepped down and relinquished his ownership to a predecessor that used the username "King Oren" when interviewed. He said in an interview that he is hosting Doxbin on the [[World Wide Web]], as well as on [[Darknet]] and [[Tor hidden service]] websites. He declined to release the link to either of them, saying, "The people that use the service know how to find it, that's what keeps it secure and out of the reach of incompetent people using it for malice things".{{Citation needed|date=August 2021}}


Due to the illegal nature of much of the information it published (such as [[Social Security number|social security numbers]], bank routing information, and credit card information, all in plain-text), it was one of many sites seized during ''[[Operation Onymous]]'', a multinational police initiative, in November 2014.<ref name=":0">{{Cite news |last=Fox-Brewster |first=Tom |date=2014-12-09 |title=The darkweb's nihilistic vigilante sees the light |language=en-GB |work=The Guardian |url=https://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |access-date=2020-11-06 |issn=0261-3077 |archive-date=2021-03-23 |archive-url=https://web.archive.org/web/20210323184534/http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |url-status=live }}</ref>
Due to the illegal nature of much of the information it published (such as [[Social Security number|social security numbers]], bank routing information, and credit card information, all in plain-text), the old Doxbin was one of many sites seized during ''[[Operation Onymous]]'', a multinational police initiative, in November 2014.<ref name=":0">{{Cite news |last=Fox-Brewster |first=Tom |date=2014-12-09 |title=The darkweb's nihilistic vigilante sees the light |language=en-GB |work=The Guardian |url=https://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |access-date=2020-11-06 |issn=0261-3077 |archive-date=2021-03-23 |archive-url=https://web.archive.org/web/20210323184534/http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online |url-status=live }}</ref> Even though this type of material was technically not illegal, it was still taken down which lawyers responded to as "because they could."

The new Doxbin is operated by people on the internet known as "Brenton" and "kt".


== History ==
== History ==
Doxbin was established to act as a secure, [[anonymity|anonymous]] venue for the publication of dox first established by people by the usernames of ''nachash'', ''king oren'', ''CGOD'', and ''Phocus''. Dox being a term in [[Internet culture]] which refers to personally identifiable information about individuals, including [[social security number]]s, [[street address]]es, [[username]]s, [[email]]s, and [[password]]s, obtained through a variety of legal and illegal means.<ref name="dailydot">{{Cite news |last=Howell O'Neill |first=Patrick |date=10 November 2014 |title=Dark Net hackers steal seized site back from the FBI |work=Daily Dot |url=http://www.dailydot.com/politics/doxbin-dark-net/ |access-date=25 January 2015 |archive-date=17 November 2014 |archive-url=https://web.archive.org/web/20141117042505/http://www.dailydot.com/politics/doxbin-dark-net/ |url-status=live }}</ref>
The original (onion based) Doxbin was established to act as a secure, [[anonymity|anonymous]] venue in May 30, 2011 for the publication of dox first established by people by the usernames of ''nachash'', ''king oren'', ''CGOD'', and ''Phocus''. Dox being a term in [[Internet culture]] which refers to personally identifiable information about individuals, including [[social security number]]s, [[street address]]es, [[username]]s, [[email]]s, and [[password]]s, obtained through a variety of legal and illegal means.<ref name="dailydot">{{Cite news |last=Howell O'Neill |first=Patrick |date=10 November 2014 |title=Dark Net hackers steal seized site back from the FBI |work=Daily Dot |url=http://www.dailydot.com/politics/doxbin-dark-net/ |access-date=25 January 2015 |archive-date=17 November 2014 |archive-url=https://web.archive.org/web/20141117042505/http://www.dailydot.com/politics/doxbin-dark-net/ |url-status=live }}</ref>


In November 2012, Doxbin's [[Twitter]] handle ''@Doxbin'' was attributed to an attack on [[NortonLifeLock|Symantec]], coordinated with [[Anonymous (hacker group)|Anonymous]]' ''Operation Vendetta''.<ref name=":0" />
In November 2012, Doxbin's [[Twitter]] handle ''@Doxbin'' was attributed to an attack on [[NortonLifeLock|Symantec]], coordinated with [[Anonymous (hacker group)|Anonymous]]' ''Operation Vendetta''.<ref name=":0" />
Line 39: Line 40:
Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative ''Operation Onymous''.<ref name="deepdot1">{{Cite news |last=Rauhauser |first=Neal |date=11 November 2014 |title=Doxbin's Nachash On Operation Onymous (P.1) |work=[[DeepDotWeb]] |url=http://www.deepdotweb.com/2014/11/11/doxbins-nachash-operation-onymous-1/ |url-status=dead |access-date=25 January 2015 |archive-url=https://web.archive.org/web/20150128114214/http://www.deepdotweb.com/2014/11/11/doxbins-nachash-operation-onymous-1/ |archive-date=28 January 2015}}</ref><ref name="ars">{{Cite web |last=Gallagher |first=Sean |date=9 November 2014 |title=Silk Road, other Tor "darknet" sites may have been "decloaked" through DDoS |url=https://arstechnica.com/security/2014/11/silk-road-other-tor-darknet-sites-may-have-been-decloaked-through-ddos/ |website=Ars Technica |access-date=14 June 2017 |archive-date=22 April 2017 |archive-url=https://web.archive.org/web/20170422031926/https://arstechnica.com/security/2014/11/silk-road-other-tor-darknet-sites-may-have-been-decloaked-through-ddos/ |url-status=live }}</ref><ref name="dotonymous">{{Cite web |last=O'Neill |first=Patrick Howell |date=17 November 2014 |title=Tor eyes crowdfunding campaign to upgrade its hidden services |url=http://www.dailydot.com/technology/tor-crowdfunding-hidden-services/ |access-date=25 January 2015 |website=Daily Dot |archive-date=12 February 2015 |archive-url=https://web.archive.org/web/20150212134909/http://www.dailydot.com/technology/tor-crowdfunding-hidden-services/ |url-status=live }}</ref> Shortly thereafter, one of the site's operators who avoided arrest shared the site's logs and information about how it was compromised with the Tor developers email list, suggesting it could have either been the result of a specialized [[distributed denial of service attack]] (DDoS) or exploited mistakes in its [[PHP]] code.<ref name=deepdot1/><ref name=ars/><ref name="deepdot2">{{Cite news |last=Muadh |first=Zubair |date=12 November 2014 |title=Doxbin's Nachash On Operation Onymous (P.2) |work=Deepdotweb |url=http://www.deepdotweb.com/2014/11/12/doxbins-nachash-on-operation-onymous-p-2/ |url-status=dead |access-date=25 January 2015 |archive-url=https://web.archive.org/web/20150128115155/http://www.deepdotweb.com/2014/11/12/doxbins-nachash-on-operation-onymous-p-2/ |archive-date=28 January 2015}}</ref><ref name="supervillain">{{Cite web |last=nachash [handle] |title=[tor-dev] yes hello, internet supervillain here |url=https://lists.torproject.org/pipermail/tor-dev/2014-November/007731.html |website=[tor-dev] mailing list archive |access-date=2015-01-25 |archive-date=2015-02-04 |archive-url=https://web.archive.org/web/20150204042240/https://lists.torproject.org/pipermail/tor-dev/2014-November/007731.html |url-status=live }}</ref> However, the site could still be restored easily by setting up a new domain.<ref>{{Cite web|date=2014-12-09|title=The darkweb's nihilistic vigilante sees the light|url=http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online|access-date=2021-04-28|website=the Guardian|language=en|archive-date=2021-03-23|archive-url=https://web.archive.org/web/20210323184534/http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online|url-status=live}}</ref>
Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative ''Operation Onymous''.<ref name="deepdot1">{{Cite news |last=Rauhauser |first=Neal |date=11 November 2014 |title=Doxbin's Nachash On Operation Onymous (P.1) |work=[[DeepDotWeb]] |url=http://www.deepdotweb.com/2014/11/11/doxbins-nachash-operation-onymous-1/ |url-status=dead |access-date=25 January 2015 |archive-url=https://web.archive.org/web/20150128114214/http://www.deepdotweb.com/2014/11/11/doxbins-nachash-operation-onymous-1/ |archive-date=28 January 2015}}</ref><ref name="ars">{{Cite web |last=Gallagher |first=Sean |date=9 November 2014 |title=Silk Road, other Tor "darknet" sites may have been "decloaked" through DDoS |url=https://arstechnica.com/security/2014/11/silk-road-other-tor-darknet-sites-may-have-been-decloaked-through-ddos/ |website=Ars Technica |access-date=14 June 2017 |archive-date=22 April 2017 |archive-url=https://web.archive.org/web/20170422031926/https://arstechnica.com/security/2014/11/silk-road-other-tor-darknet-sites-may-have-been-decloaked-through-ddos/ |url-status=live }}</ref><ref name="dotonymous">{{Cite web |last=O'Neill |first=Patrick Howell |date=17 November 2014 |title=Tor eyes crowdfunding campaign to upgrade its hidden services |url=http://www.dailydot.com/technology/tor-crowdfunding-hidden-services/ |access-date=25 January 2015 |website=Daily Dot |archive-date=12 February 2015 |archive-url=https://web.archive.org/web/20150212134909/http://www.dailydot.com/technology/tor-crowdfunding-hidden-services/ |url-status=live }}</ref> Shortly thereafter, one of the site's operators who avoided arrest shared the site's logs and information about how it was compromised with the Tor developers email list, suggesting it could have either been the result of a specialized [[distributed denial of service attack]] (DDoS) or exploited mistakes in its [[PHP]] code.<ref name=deepdot1/><ref name=ars/><ref name="deepdot2">{{Cite news |last=Muadh |first=Zubair |date=12 November 2014 |title=Doxbin's Nachash On Operation Onymous (P.2) |work=Deepdotweb |url=http://www.deepdotweb.com/2014/11/12/doxbins-nachash-on-operation-onymous-p-2/ |url-status=dead |access-date=25 January 2015 |archive-url=https://web.archive.org/web/20150128115155/http://www.deepdotweb.com/2014/11/12/doxbins-nachash-on-operation-onymous-p-2/ |archive-date=28 January 2015}}</ref><ref name="supervillain">{{Cite web |last=nachash [handle] |title=[tor-dev] yes hello, internet supervillain here |url=https://lists.torproject.org/pipermail/tor-dev/2014-November/007731.html |website=[tor-dev] mailing list archive |access-date=2015-01-25 |archive-date=2015-02-04 |archive-url=https://web.archive.org/web/20150204042240/https://lists.torproject.org/pipermail/tor-dev/2014-November/007731.html |url-status=live }}</ref> However, the site could still be restored easily by setting up a new domain.<ref>{{Cite web|date=2014-12-09|title=The darkweb's nihilistic vigilante sees the light|url=http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online|access-date=2021-04-28|website=the Guardian|language=en|archive-date=2021-03-23|archive-url=https://web.archive.org/web/20210323184534/http://www.theguardian.com/technology/2014/dec/09/nachash-doxbin-dox-online|url-status=live}}</ref>


Since ''nachash''<nowiki/>'s raid, he has gone on to write a [[darknet market]] vendor guide entitled "''So, You Want To Be a Darknet Drug Lord…''".<ref>{{Cite news |last=DeepDotWeb |date=15 April 2015 |title=So, You Want To Be a Darknet Drug Lord… |url=https://www.deepdotweb.com/2015/04/15/so-you-want-to-be-a-darknet-drug-lord/ |url-status=dead |access-date=21 September 2015 |archive-url=https://web.archive.org/web/20151019034721/https://www.deepdotweb.com/2015/04/15/so-you-want-to-be-a-darknet-drug-lord/ |archive-date=19 October 2015}}</ref>
Since ''nachash''<nowiki/>'s raid, he has gone on to write a [[darknet market]] vendor guide entitled "''So, You Want To Be a Darknet Drug Lord…''".<ref>{{Cite news |last=DeepDotWeb |date=15 April 2015 |title=So, You Want To Be a Darknet Drug Lord… |url=https://www.deepdotweb.com/2015/04/15/so-you-want-to-be-a-darknet-drug-lord/ |url-status=dead |access-date=21 September 2015 |archive-url=https://web.archive.org/web/20151019034721/https://www.deepdotweb.com/2015/04/15/so-you-want-to-be-a-darknet-drug-lord/ |archive-date=19 October 2015}}</ref> and is claimed to have gone [[Missing in action|MIA]] in 2015

The new Doxbin claimed nachash shared a Doxbin template-like code on GitHub, which people have since been using inefficiently and that have been taken down after short periods of time. The new Doxbin claims to overcome these issues standing for "highest availability possible".

== New Doxbin ==
[[File:Doxbinseized-640x383.png|thumb|271x271px|The onion Doxbin seized by the FBI when Operation Onymous occurred.]]
[[File:Doxbin logo.png|thumb|Onion based Doxbin logo]]
In late 2018, a new Doxbin site on the [[World Wide Web]], which has since been up and the current one being used.<ref>{{Cite web |title=Wayback Machine |url=https://web.archive.org/web/20180901000000*/doxbin.org |access-date=2022-04-26 |website=web.archive.org}}</ref>

The new service, claims to "stand for the highest availability possible." and that "your submitted doxes will stay up" (as long as they follow the site's [[privacy policy]] and [[Terms of service|TOS]]). The site also has multiple domain mirrors (alternatives) in the case of a domain takedown. Additionally claiming to not store any access logs or [[Internet Protocol|IP's]] but only a browser [[User-agent string|user agent string]].

== Legality ==
Because it is hosted in Europe, Doxbin has to follow the GDPR law.

Doxbin does not allow any minor, illegally obtained or harassing/threatening info. It is legal as of GDPR law. Using [[Section 230 of the Communications Decency Act]] to be immune to liability and cyberstalking/stalking law, it has an email for law enforcement which this all makes it legally immune.

The privacy section about the illegal information, mentions that they do not allow illegally obtained material and instigates by saying "Can anybody prove it? Not unless you brag about it.", it also says that "Doxbin was not made for harassment, intimidation or to cause nuisance." but also mentions that "It is impossible for some php code to harass somebody."

"Any pastes directly threatening and/or attempt to injure or hurt any particular individuals will be swiftly removed."

== "Hall of Autism" ==
The Hall of Autism is a page on Doxbin that has a list of notorious doxes, and that is used to insult people based on their regrettable pasts and things they've done, such as "script kiddies". It also has pedophiles and other like-minded people.

It's mostly big notorious doxes in the community that are added there.

== Database Leak ==
In November 2021, Doxbin was sold to a person under the alias "White". According to kt and Brenton, he proceeded to do nothing but break the site and get bullied. He then put the site up for sale again.

Brenton and kt offered to buy Doxbin back and White agreed, but due to him not being a part of the project anymore, he got demoted in Doxbin's community [[Discord Server|Discord server]].

White then got "upset" and tried to steal Doxbin's Discord server vanity invite (a custom public server invitation link) and attempted to also take back the domains and [[Telegram (software)|Telegram]] group.

White refused to hand over Doxbin's [[Twitter account]], but kt hacked into it. Though he couldn't change the email or password. "kt" then used that account to tweet something against Twitter's TOS and Guidelines, which ended up getting the account banned. In Doxbin's official post, they wrote a statement saying "If we can't have it, nobody can."

Between 9th November 2021 - January 4th 2022, anyone who logged into Doxbin had their account credentials leaked in plain text. Bcrypt hashed passwords (before White owned Doxbin), blacklist information, 2FA secret codes, also got leaked with it.

kt and Brenton say "The compromised data is an issue, and will impact our reputation heavily; but it happened and we cannot change it."
{{Warning|text=The sources used in this section may be biased or unverifiable. Update if possible.|reason=The sources use cheek and negativity towards entities mentioned.}}

== White and Lapsus$ ==
White was doxxed, but he was also a member of a new ransomware group called [[Lapsus$]] which had a list of notable breaches, such as ones from [[Nvidia]] or [[T-Mobile]].

White's house got raided on the morning of April 1, 2022 and earlier in December 2021, both for relations to Lapsus$

However, when Lapsus$ got caught, White got charged with:

* Three counts of unauthorized access to a computer with intent to impair the reliability of data.
* One count of fraud by false representation.
* One count of unauthorized access to a computer with intent to hinder access to data.
* One count of causing a computer to perform a function to secure unauthorized access to a program.

The [[U.K. National Health Service|UK National Health Service]] confirmed that the dox was used in the police investigation. ("The UK National Health Service has confirmed this paste helped in the police investigation.")

== Notes ==

# The "White and Lapsus$" section contains info from a source that violates Wikipedia's privacy guidelines. Therefore no citations will be added. Same for section "Legality"{{Note}}
# The sources in "Database Leak" section use impudence and trash talk and come from a blacklisted source{{Note}}
# Do not add links to the site itself, as it is blacklisted.
{{Notelist}}


== See also ==
== See also ==

Revision as of 18:17, 26 April 2022

Doxbin
File:Doxbin Logo.png
Homepage of Doxbin on 26 April 2022
Type of site
Dox publisher
RegistrationOptional
LaunchedMay 30, 2011 (2011-05-30)
Current statusActive
Written inPHP

Doxbin is a document sharing and publishing website which invites users to contribute personally identifiable information, or "dox", of any person of interest. It was previously operated on the darknet as a Tor hidden service, by a person known on the internet as nachash.[1] Since its takedown in 2014, nachash has stepped down and relinquished his ownership to a predecessor that used the username "King Oren" when interviewed. He said in an interview that he is hosting Doxbin on the World Wide Web, as well as on Darknet and Tor hidden service websites. He declined to release the link to either of them, saying, "The people that use the service know how to find it, that's what keeps it secure and out of the reach of incompetent people using it for malice things".[citation needed]

Due to the illegal nature of much of the information it published (such as social security numbers, bank routing information, and credit card information, all in plain-text), the old Doxbin was one of many sites seized during Operation Onymous, a multinational police initiative, in November 2014.[2] Even though this type of material was technically not illegal, it was still taken down which lawyers responded to as "because they could."

The new Doxbin is operated by people on the internet known as "Brenton" and "kt".

History

The original (onion based) Doxbin was established to act as a secure, anonymous venue in May 30, 2011 for the publication of dox first established by people by the usernames of nachash, king oren, CGOD, and Phocus. Dox being a term in Internet culture which refers to personally identifiable information about individuals, including social security numbers, street addresses, usernames, emails, and passwords, obtained through a variety of legal and illegal means.[3]

In November 2012, Doxbin's Twitter handle @Doxbin was attributed to an attack on Symantec, coordinated with Anonymous' Operation Vendetta.[2]

It first attracted attention in March 2014 when its then-owner hijacked a popular Tor hidden service, The Hidden Wiki, pointing its visitors to Doxbin instead as a response to the maintenance of pages dedicated to child pornography links.[4][5][6] In June 2014, their Twitter account was suspended, prompting the site to start listing the personal information of the Twitter founders and CEO.[7] In October 2014, Doxbin hosted personal information about Katherine Forrest, a federal judge responsible for court rulings against the owner of Tor-based black market Silk Road, leading to death threats and harassment.[3][8]

Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative Operation Onymous.[9][10][11] Shortly thereafter, one of the site's operators who avoided arrest shared the site's logs and information about how it was compromised with the Tor developers email list, suggesting it could have either been the result of a specialized distributed denial of service attack (DDoS) or exploited mistakes in its PHP code.[9][10][12][13] However, the site could still be restored easily by setting up a new domain.[14]

Since nachash's raid, he has gone on to write a darknet market vendor guide entitled "So, You Want To Be a Darknet Drug Lord…".[15] and is claimed to have gone MIA in 2015

The new Doxbin claimed nachash shared a Doxbin template-like code on GitHub, which people have since been using inefficiently and that have been taken down after short periods of time. The new Doxbin claims to overcome these issues standing for "highest availability possible".

New Doxbin

The onion Doxbin seized by the FBI when Operation Onymous occurred.
Onion based Doxbin logo

In late 2018, a new Doxbin site on the World Wide Web, which has since been up and the current one being used.[16]

The new service, claims to "stand for the highest availability possible." and that "your submitted doxes will stay up" (as long as they follow the site's privacy policy and TOS). The site also has multiple domain mirrors (alternatives) in the case of a domain takedown. Additionally claiming to not store any access logs or IP's but only a browser user agent string.

Legality

Because it is hosted in Europe, Doxbin has to follow the GDPR law.

Doxbin does not allow any minor, illegally obtained or harassing/threatening info. It is legal as of GDPR law. Using Section 230 of the Communications Decency Act to be immune to liability and cyberstalking/stalking law, it has an email for law enforcement which this all makes it legally immune.

The privacy section about the illegal information, mentions that they do not allow illegally obtained material and instigates by saying "Can anybody prove it? Not unless you brag about it.", it also says that "Doxbin was not made for harassment, intimidation or to cause nuisance." but also mentions that "It is impossible for some php code to harass somebody."

"Any pastes directly threatening and/or attempt to injure or hurt any particular individuals will be swiftly removed."

"Hall of Autism"

The Hall of Autism is a page on Doxbin that has a list of notorious doxes, and that is used to insult people based on their regrettable pasts and things they've done, such as "script kiddies". It also has pedophiles and other like-minded people.

It's mostly big notorious doxes in the community that are added there.

Database Leak

In November 2021, Doxbin was sold to a person under the alias "White". According to kt and Brenton, he proceeded to do nothing but break the site and get bullied. He then put the site up for sale again.

Brenton and kt offered to buy Doxbin back and White agreed, but due to him not being a part of the project anymore, he got demoted in Doxbin's community Discord server.

White then got "upset" and tried to steal Doxbin's Discord server vanity invite (a custom public server invitation link) and attempted to also take back the domains and Telegram group.

White refused to hand over Doxbin's Twitter account, but kt hacked into it. Though he couldn't change the email or password. "kt" then used that account to tweet something against Twitter's TOS and Guidelines, which ended up getting the account banned. In Doxbin's official post, they wrote a statement saying "If we can't have it, nobody can."

Between 9th November 2021 - January 4th 2022, anyone who logged into Doxbin had their account credentials leaked in plain text. Bcrypt hashed passwords (before White owned Doxbin), blacklist information, 2FA secret codes, also got leaked with it.

kt and Brenton say "The compromised data is an issue, and will impact our reputation heavily; but it happened and we cannot change it."

White and Lapsus$

White was doxxed, but he was also a member of a new ransomware group called Lapsus$ which had a list of notable breaches, such as ones from Nvidia or T-Mobile.

White's house got raided on the morning of April 1, 2022 and earlier in December 2021, both for relations to Lapsus$

However, when Lapsus$ got caught, White got charged with:

  • Three counts of unauthorized access to a computer with intent to impair the reliability of data.
  • One count of fraud by false representation.
  • One count of unauthorized access to a computer with intent to hinder access to data.
  • One count of causing a computer to perform a function to secure unauthorized access to a program.

The UK National Health Service confirmed that the dox was used in the police investigation. ("The UK National Health Service has confirmed this paste helped in the police investigation.")

Notes

  1. The "White and Lapsus$" section contains info from a source that violates Wikipedia's privacy guidelines. Therefore no citations will be added. Same for section "Legality"[[#ref_{{{1}}}|^]]
  2. The sources in "Database Leak" section use impudence and trash talk and come from a blacklisted source[[#ref_{{{1}}}|^]]
  3. Do not add links to the site itself, as it is blacklisted.

See also

References

  1. ^ Keller, Kevin. "The Tor browser: A forensic investigation study". The Tor Browser: A Forensic Investigation Study.
  2. ^ a b Fox-Brewster, Tom (2014-12-09). "The darkweb's nihilistic vigilante sees the light". The Guardian. ISSN 0261-3077. Archived from the original on 2021-03-23. Retrieved 2020-11-06.
  3. ^ a b Howell O'Neill, Patrick (10 November 2014). "Dark Net hackers steal seized site back from the FBI". Daily Dot. Archived from the original on 17 November 2014. Retrieved 25 January 2015.
  4. ^ Howell O'Neill, Patrick (12 March 2014). "Deep Web hub hacked and shut down over child porn links". Daily Dot. Archived from the original on 2015-04-02. Retrieved 2015-01-25.
  5. ^ Mead, Derek (13 March 2014). "A Hacker Scrubbed Child-Porn Links from the Dark Web's Most Popular Site". Vice. Archived from the original on 11 October 2016. Retrieved 26 August 2017.
  6. ^ "Twitter Founders' Personal Information Released on Doxbin". Darkweb News. 12 June 2014. Archived from the original on 27 January 2015. Retrieved 27 January 2015.
  7. ^ Tarquin (June 12, 2014). "Twitter Founders' Personal Information Released on DOXBIN". Archived from the original on 27 January 2015. Retrieved 20 August 2015.
  8. ^ "Site Doxx'es Judge of Silk Road Case – Calls To "Swat" Her". DeepDotWeb. 13 October 2014. Archived from the original on 24 March 2015. Retrieved 25 January 2015.
  9. ^ a b Rauhauser, Neal (11 November 2014). "Doxbin's Nachash On Operation Onymous (P.1)". DeepDotWeb. Archived from the original on 28 January 2015. Retrieved 25 January 2015.
  10. ^ a b Gallagher, Sean (9 November 2014). "Silk Road, other Tor "darknet" sites may have been "decloaked" through DDoS". Ars Technica. Archived from the original on 22 April 2017. Retrieved 14 June 2017.
  11. ^ O'Neill, Patrick Howell (17 November 2014). "Tor eyes crowdfunding campaign to upgrade its hidden services". Daily Dot. Archived from the original on 12 February 2015. Retrieved 25 January 2015.
  12. ^ Muadh, Zubair (12 November 2014). "Doxbin's Nachash On Operation Onymous (P.2)". Deepdotweb. Archived from the original on 28 January 2015. Retrieved 25 January 2015.
  13. ^ nachash [handle]. "[tor-dev] yes hello, internet supervillain here". [tor-dev] mailing list archive. Archived from the original on 2015-02-04. Retrieved 2015-01-25.
  14. ^ "The darkweb's nihilistic vigilante sees the light". the Guardian. 2014-12-09. Archived from the original on 2021-03-23. Retrieved 2021-04-28.
  15. ^ DeepDotWeb (15 April 2015). "So, You Want To Be a Darknet Drug Lord…". Archived from the original on 19 October 2015. Retrieved 21 September 2015.
  16. ^ "Wayback Machine". web.archive.org. Retrieved 2022-04-26.