A hacker has released the databases of Utah-based gun exchange, hunting, and kratom sites for liberate on a cybercrime forum.
On august 10th, a threat actor posted databases that they claim contain 195,000 user records for the utahgunexchange.com, 45,000 records for their video site, 15,000 records from the hunting site muleyfreak.com, and 24,000 user records from the Kratom site deepjunglekratom.com.
Databases posted to a cybercrime forum
Databases posted to a cybercrime forum
All of these sites are based out of Utah, USA and samples of the databases shared by cybersecurity intelligence firm Cyble show that each database was hosted on the same amazon AWS server
The latest date on user records in each database is July 16th, which indicates that is when the data was stolen.
Samples of one of the database
Samples of one of the database
The exposed data is different on each site, but consists of email addresses, login names, and hashed passwords.
BleepingComputer has attempted to contact all three sites to sustain and alert them of the breach, but have not received a response.
We were able to affirm that many of the email addresses listed in the databases belong to registered users of the sites.
While this does not provide 100% verification of posted data, it does trail us to believe that there was a breach of some kind.
What should affected user do?
As we said, it not confirmed that all of the exposed data is legitimate, but experience confirmed that many of the emails listed in the databases are in usage at the listed sites.
Therefore, it is better to be safe than sorry and do under the assumption that your account credentials have been exposed.
To live safe, if you are a user of one of these sites, it is strongly advised that you change your watchword immediately.
If you apply the same word at another site, you should also vary the password to a unique and strong i that you only use for that site.
Using unique passwords prevents a data breach at one site from affecting you at other websites you use.
To serve you in keeping tracking of unique and strong passwords, it is suggested that you expend a password manager application.
Furthermore, as each site has a narrow scope of interest, it is important that all affected users be on the lookout for targeted phishing attacks abusing this data.