Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web

Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web

Outpost24’s threat intelligence researchers have uncovered the operations of Lionishackers, a financially motivated cyber threat actor specializing in the exfiltration and illicit sale of corporate databases.

This group employs an opportunistic approach to target selection, with a notable preference for entities in Asian countries such as Thailand, Syria, and India.

While primarily driven by profit, Lionishackers exhibits secondary ideological motivations, potentially linked to professed Muslim affiliations, leading to limited involvement in hacktivist activities like coordinated Distributed Denial-of-Service (DDoS) attacks against Ukrainian and Israeli targets.

Unveiling the Threat Actor’s Modus Operandi

The actor maintains extensive collaborations, particularly with the pro-Palestine and pro-Russian group Hunt3r Kill3rs, where Lionishackers served as an administrator on their Telegram channel, facilitating database sales and joint DDoS campaigns.

Post on Telegram listing some of the countries that Lionishackers would be specialized in

Beyond database exfiltration, the group diversifies its offerings, including penetration testing services, commercialization of the Ghost botnet for Layer 4 and Layer 7 attacks, and the short-lived Stressed Forums project launched in August 2024 amid disruptions to major underground platforms like Breach Forums.

Lionishackers
Lionishackers commercializing the Ghost botnet in Telegram

Lionishackers likely leverage SQL injection vulnerabilities for initial access and data exfiltration, with observed references to automation tools like SQLMap in Telegram discussions.

This method enables the compromise of databases without deploying malware or encrypting data, simplifying attacks while maximizing profitability through direct sales.

The group targets a broad spectrum of sectors, including gambling sites as a stated preference, alongside government, pharmaceutical, telecommunications, education, and retail organizations.

Exploitation Techniques

Databases sold often include credentials from social media and email services, suggesting possible use of stolen valid credentials for unauthorized entry.

Commercialization occurs exclusively via Telegram for negotiations, with advertisements spread across multiple underground forums using transient aliases to evade attribution.

Since September 2024, Lionishackers has created numerous forum accounts, many of which have been banned due to scam accusations, though posts consistently include evidentiary images or links to validate compromises.

According to the report, Active participation in Telegram channels like AKULA and B F R e p o V 3 C h a t bolsters their reputation, enabling sales of leaked data for credential stuffing, fraud, corporate espionage, or social engineering exploits.

The real risk extends beyond immediate financial losses, encompassing reputational damage when leaks gain media traction, amplifying exposure to further malicious activities by buyers with access to sensitive Personal Identifiable Information (PII) or financial details.

The proliferation of such database exfiltration underscores broader cyber threats, where increasing data volumes and regulatory pressures create vulnerabilities that actors like Lionishackers exploit for high returns.

Monitoring these underground entities is crucial, as their seemingly low-sophistication operations can cascade into significant breaches, facilitating advanced persistent threats or ransomware precursors.

Indicators of Compromise (IOCs)

Category Indicator Details
Forum Accounts CypherX691 (Breached, BreachForums) Registered various dates from September 2024
Forum Accounts ComplexData11 (BreachForums) Registered various dates from September 2024
Forum Accounts Hacker82828, Sussyba17 (crackingx) Registered September 3 and 23, 2024
Forum Accounts Sectornull101, Matadempo11 (Crackia) Registered September 19 and 24, 2024
Forum Accounts Fen888 (Leakzone) Registered April 2025
Forum Accounts datwkuvnj (Sinister) Registered June 21, 2025
Forum Accounts Datcomon23, Sudsyba17, Datajsbdj, Datahellosui, PremiumDataOnly (Banned), Captainfen (Banned), OfficialSalesMan (Banned), foreman, Datasellonly (DarkForums) Registered from September 22, 2024 to July 5, 2025
Telegram Accounts (LION Alias) t[.]me/Lionishacker (Unavailable), t[.]me/Lionishackers, t[.]me/Lionishackerrr Various creation dates
Telegram Channels (LION Alias) t[.]me/AboutTheLion (Jan 16), t[.]me/DataMarketZ (Apr 1), t[.]me/YourwaytoLion (Jul 5), t[.]me/DatabaseOnSell (Unavailable) Various creation dates
Telegram Accounts (CAPTAIN FEN Alias) t[.]me/CaptainFen Various creation dates
Telegram Channels (CAPTAIN FEN Alias) t[.]me/AboutCaptainFen (Mar 7), t[.]me/CaptainFenGroup (Unavailable) Various creation dates
Associated Groups/Channels Hunt3r Kill3rs Telegram Channel (Closed), AKULA, B F R e p o V 3 C h a t Used for collaboration and sales

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link