Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » ’15 billion credentials are sold on the dark web’
2 min Security

’15 billion credentials are sold on the dark web’

Jouri AltorfJuly 10, 2020 3:19 pmJuly 10, 2020
’15 billion credentials are sold on the dark web’

Credentials of 15 billion accounts are being sold on the dark web, according to research by Digital Shadows. The price ranges from under ten euros for access to streaming websites to about 100.000 euros for access to large companies.

The research ‘From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover‘ was the result of an eighteen-month study by security researchers from Digital Shadows. The team eventually found 15 billion credentials that had been obtained through 100.000 data breaches, of which 5 billion were unique.

The research also revealed that the number of stolen usernames and passwords in circulation has increased by 300 percent since the last research was conducted in 2018. The log-in data of customers turned out to be the most common with an average selling price of 13.62 euros. Credentials for financial institutions such as banks were the most valuable with an average selling price of 62.59 euros. Of all the advertisements on the dark web, 25 percent belongs to this category.

08.07-image-5

Access to antivirus programs also proved popular with an average price of 19.13 euros, but access to media streaming sites, social media, file sharing, and VPNs was sold for less than ten euros.

Access to large companies

Credentials for essential business systems of large (and smaller) companies are also traded on the dark web, but prices are much higher. These credentials are sold at an auction to the highest bidder and researchers at Digital Shadows came across figures ranging from 441 euros to 106.000 euros with an average of 2770 euros.

A new noteworthy development is that of the ‘account takeover-as-a-service’ where criminals can rent the login details of an account for a certain period of time, often for less than 10 euros.

Digital Shadows finds the number of available login details shocking. “Some of these exposed accounts can (or do have access to) incredibly sensitive information. Details uncovered by one breach can be re-used to compromise accounts used elsewhere.”

Tip: Why cybercriminals use forums and the dark web on a large scale

Tags:

account takeover / credential / Dark web / data breach / Login

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Dutch telco refuses to pay ransom, hackers to publish customer data

Data breach involving 16 billion credentials is not what it seems

Bots now generate majority web traffic

Cloud credentials leaked in plaintext inside popular apps

Editor picks

Securing AI agents: Okta’s approach to identity governance

As artificial intelligence agents are set to become more autonomous i...

Observability warehouses, the next structural evolution for telemetry

Observability has been a prevalent trend throughout the last decadeâ€...

All shook up, IFS unlocks asset-based pricing for enterprise AI

We've often talked about the (perhaps fabled) future land where softw...

Microsoft Copilot Cowork takes on multi-step AI automation

Microsoft has launched Copilot Cowork within the Microsoft 365 Fronti...

Techzine.tv

What sets Vultr apart from the hyperscalers and neoclouds?

What sets Vultr apart from the hyperscalers and neoclouds?

NetApp balances sovereignty with AI infrastructure needs

NetApp balances sovereignty with AI infrastructure needs

How to migrate from Redis to Valkey with zero downtime

How to migrate from Redis to Valkey with zero downtime

How Capgemini transformed HR for 400,000 employees globally

How Capgemini transformed HR for 400,000 employees globally

Read more on Security

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios supply chain attack victim posts postmortem to prevent a repeat

Another supply chain security threat emerged this week with the compromise of Axios. It is a popular JavaScri...

Erik van Klinken 2 days ago
Securing AI agents: Okta’s approach to identity governance
Top story

Securing AI agents: Okta’s approach to identity governance

As artificial intelligence agents are set to become more autonomous in enterprise environments, organizations...

Sander Almekinders 3 days ago
JFrog Artifactory: how to secure binaries in the AI era
Top story

JFrog Artifactory: how to secure binaries in the AI era

The explosion of AI-generated code is creating a security crisis that traditional manual approaches simply ca...

Coen van Eenbergen 2 days ago
IGEL brings ‘Smarter, Zero Trust’ approach Contextual Access to endpoints

IGEL brings ‘Smarter, Zero Trust’ approach Contextual Access to endpoints

IGEL announces Contextual Access, an extension to its existing platform that makes endpoints context-aware an...

Berry Zwets April 1, 2026

Expert Talks

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe, the most influential information security event...

Better connected business technology is essential for prosperity in the Netherlands 

Better connected business technology is essential for prosperity in the Netherlands 

According to PwC, the Netherlands ranks fourth in Europe for producin...

The zero-drift frontier: modern edge demands on Kubernetes

Edge computing has come to the fore. Too often, edge computing gets c...

When is an SBOM not an SBOM? CISA’s Minimum Elements

In August 2025, CISA (the US Cybersecurity Infrastructure & Infra...

Tech calendar

GITEX ASIA 2026

April 8, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

GISEC GLOBAL 2026

May 5, 2026 DUBAI

Red Hat Summit

May 11, 2026 Atlanta

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement