A notification published on the site on Tuesday states that international law enforcement agencies have taken control of a dark web market place that is well-liked by cybercriminals.
Dark web by cybercriminals
The FBI had confiscated Genesis Market domains, according to a banner that was plastered across the company’s website.
Along with the logo of cybersecurity company Qintel, other enforcement organisations from Europe, Canada, and Australia were also prominently displayed on the website.

Both the FBI and Qintel did not respond to requests for comment right away.
Although it acknowledged “participating in an international law enforcement operation targeting cyber criminals,” Britain’s National Crime Agency, whose logo was also on the website, said it would not make any further comments before a statement scheduled for Tuesday.
They were unable to find the managers of the Genesis Market’s contact information right away.
In its seizure notice, the FBI indicated that anyone who had gotten in contact with them should “Email us, we’re interested,” indicating that they were also interested in learning more about them.
According to Louise Ferrett, an analyst at the British cybersecurity company Searchlight Cyber, Genesis specialised in the selling of digital goods, particularly “browser fingerprints” gathered from devices carrying malicious software.
These fingerprints can be used by criminals to get around anti-fraud measures like multi-factor authentication or device fingerprinting because they frequently contain credentials, cookies, internet protocol addresses, and other browser or operating system information, she said.
Since 2018, the portal has been operational.
The Institute of Space Technology (IST) was the target of a ransomware assault earlier this month, and the hackers demanded $500,000 in exchange for the data they had taken.
Passport information, salary stubs, information about analyses, and other private employee information apparently made up this whole information.
This information has now been made available to the public on a Telegram channel, ostensibly as a result of non-compliance, albeit there is no evidence of this.
Hacker Leaked Data on Telegram
The hacker collective known as Medusa has updated their site to indicate that the IST information they acquired has been made available to the general public.
Several 3.89 GB downloads are available on the Telegram channel, however it is yet unknown which information was made available to the general public.
To read our blog on “Alleged Indian hackers group found behind hacking Govt. websites,” click here













