Exploring Profitable Doxing: A Dark World

Tech Read Team
3 Min Read

Unveiling the Dark World of Doxing: Profits, Extortion, and Threats

Since the early 1990s, the malicious act of doxing has been used to strip away people’s online anonymity and expose their identities. But in recent years, this toxic practice has evolved, with individuals being doxed and extorted for cryptocurrency, and even facing potential physical violence.

Security researcher Jacob Larsen, who was a victim of doxing himself a decade ago, has spent the past year monitoring doxing groups, studying their techniques, and interviewing key figures in the community. According to Larsen, doxing activities can generate substantial incomes, with some individuals making “well over six figures annually” utilizing tactics such as submitting fake law enforcement requests for data.

The primary motive behind doxing, especially when it involves extortion, is financial gain, as explained by Larsen, who leads an offensive security team at CyberCX.

In a series of online chat sessions last year, Larsen spoke with two prominent figures in the doxing community known as “Ego” and “Reiko.” While their real identities remain unknown, both individuals have played significant roles in various doxing groups and platforms.

According to Bree Anderson, a digital criminologist, doxing can have severe consequences, ranging from immediate risks to personal safety to long-term anxieties over future information disclosures.

Larsen’s research highlights the profit-oriented nature of many doxing activities, with platforms like Doxbin hosting thousands of public and private doxes containing sensitive personal information. The doxing landscape is driven by extortion schemes, although other motivations, including seeking notoriety, also exist.

One of the interviewed doxers emphasized the importance of personal internet privacy, stating that users must be vigilant about securing their online presence. However, the reality remains that despite precautions, individuals can still be tracked down online.

The Dark Tactics of Doxing: Impersonation and Violence as a Service

Achieving complete anonymity online is almost impossible, as many individuals willingly share personal details on various platforms. Doxing techniques, as outlined in legal charges against members of groups like ViLe, can involve exploiting common passwords, breaching databases, and engaging in social engineering tactics.

Emergency data requests (EDRs) can also be manipulated for malicious purposes, allowing unauthorized access to people’s information. These requests, typically intended for law enforcement use in genuine emergencies, pose a risk when abused by individuals seeking to dox others.

Share This Article
Leave a comment