Stolen crypto accounts sell on the dark web for an average price of $105. The data is collected from phishing attacks and is considered the first step in a complexStolen crypto accounts sell on the dark web for an average price of $105. The data is collected from phishing attacks and is considered the first step in a complex

Stolen crypto accounts trade for $105 on the dark web

Stolen crypto accounts sell on the dark web for an average price of $105. The data is collected from phishing attacks and is considered the first step in a complex supply chain of thievery.

The price of a single crypto account ranges between $60 and $400, according to SecureList. Hackers capture crypto data, monetize it immediately, or keep it in a database. The final destination depends on the type and quality of the captured data.

How stolen crypto data leaves phishing sites

The captured crypto data leaves a phishing page in three ways: email delivery, Telegram bot delivery, or admin panel upload.

The attackers also abuse legitimate services to hide their activity. These include Google Forms, Microsoft Forms, GitHub, Discord, and other similar platforms.

In email delivery, the data is collected from fake HTML forms and then sent to a server-side script, usually PHP. The script then forwards the stolen details to an attacker-controlled email address.

A phishing kit has a file to host the fake login page, a script to process the form, and a third file containing the attacker’s email address. However, email delivery is declining because of delays, provider blocking, and poor scalability.

Instead of email, many kits now send data directly to Telegram bots. The malicious script calls the Telegram API using a bot token and chat ID. Sometimes the API call is embedded directly in the HTML code.

Telegram has become a preferred channel for hackers. Stolen data arrives instantly. Operators get real-time alerts. Bots are disposable and hard to trace. And hosting does not matter much.

Advanced attackers prefer admin panels. They are part of a framework or a skeleton that captures crypto data and sends it to a database. The attacker manages the data via a web interface.

Admin panels provide live stats by time and country. Automated checks for credentials are included. The framework also exports data for resale or reuse. These panels are essential for organized phishing operations.

Selling stolen crypto data

Crypto data is valuable because it often leads to funds. The stolen data could be sold in real time or enter a resale pipeline, according to Kaspersky’s SecureList.

Hackers go after exchange logins, wallet access, and fiat onramp accounts. Other targeted data includes account credentials, phone numbers, and personal details.

Wallet logins with one-time codes or accounts linked to fiat onramps qualify for real-time sales. The remaining data is used for follow-up attacks.

Phone numbers could be used for SMS scams or 2FA interception. Personal data is utilized for social engineering. Identification documents, voice, facial data, or selfies with documents are used for high-risk abuse.

The resale pipeline starts with dump sales. Data is bundled into large archives or dumps. These contain millions of records from phishing attacks. Middlemen buy dumps for as low as $50.

Stolen crypto data is sold on the dark web for $105.Offers of hacked crypto social media data. Source: SecureList.

Once a dump is acquired, middlemen filter and test the data. Then, automated scripts check whether credentials still work or not. The code also sees where else they can be reused.

Password reuse makes old data valuable. A login stolen years ago can still unlock a different account today. Then, the data from multiple attacks is merged. A password, phone number, and old employer record can create a single user profile.

Once the stolen data is cleaned and organized, it’s ready for resale to scammers. The verified data is sold on dark web forums and Telegram channels.

Telegram often acts as a storefront with pricing and buyer feedback. Prices vary based on account age, balance, linked payments, and 2FA status.

Typical price ranges:

  • Crypto accounts: $60 – $400.

  • Social media: cents to hundreds of dollars.

  • Messaging apps: cents to $150.

  • Personal documents: $0.5–$125.

Kaspersky’s analysis showed that 88.5% of attacks target account credentials. Around 9.5% steal personal identity data, while a mere 2% collect bank card details. The cybersecurity firm analyzed phishing attacks from January to September 2025.

Stolen crypto data is a valuable asset to cybercriminals. It is stored, evaluated, traded, and reused. One phishing mistake can lead to major crypto hacks, even years later.

The smartest crypto minds already read our newsletter. Want in? Join them.

Market Opportunity
Polytrade Logo
Polytrade Price(TRADE)
$0.05178
$0.05178$0.05178
+2.29%
USD
Polytrade (TRADE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Solana Co-Founder Predicts Stablecoin Supply Could Top $1T by 2026

Solana Co-Founder Predicts Stablecoin Supply Could Top $1T by 2026

The post Solana Co-Founder Predicts Stablecoin Supply Could Top $1T by 2026 appeared on BitcoinEthereumNews.com. Solana co-founder Anatoly Yakovenko predicts stablecoin
Share
BitcoinEthereumNews2025/12/29 02:32
Forbes Top Lawyers Nominations FAQ

Forbes Top Lawyers Nominations FAQ

The post Forbes Top Lawyers Nominations FAQ appeared on BitcoinEthereumNews.com. Q: How were candidates selected for the recognition? A: Candidates were selected through nominations as well as independent editorial review and research. Please see our Methodology posts for more details. Q: Are those selected to the list required to pay to publicize results? A: As with all Forbes lists, there is no payment required to participate in the nomination process, to be on the list, to publicize the fact that you have been selected for the list, or any other point in the process. Lawyers cannot pay to be on the list and our lists are not sponsored. Q: Will there be a write up for all attorneys on the list, or just their names and firms? A: The list will include basic information on all the attorneys including firm, practice area, city, state, and bullet points of accomplishments. Q: Is there a limit on how many lawyers a firm can submit? A: We are looking for the superstars so best practice would be no more than five submissions per firm. Q: Will there be any limit on the number of individuals you may recognize from one firm? A: We don’t have a limit, but as we are only acknowledging a fraction of elite attorneys from across the country we are seeking to produce a balanced list. Q: Could you confirm whether the nomination and information submitted will be considered on the record? A: Please mark any information that is sent for our team to utilize for evaluation and consideration that is confidential as such. Source: https://www.forbes.com/sites/lianejackson/2025/09/22/forbes-top-lawyers-nominations-faq/
Share
BitcoinEthereumNews2025/09/23 06:39
Tokenization and AI: The emergence of orbital cloud infrastructure | Opinion

Tokenization and AI: The emergence of orbital cloud infrastructure | Opinion

Evaluating key energy requirements to support the growth in AI-driven tokenization necessitating orbital cloud data centers.
Share
Crypto.news2025/12/29 02:04