Russia's Efforts to Control Illicit Data Leaks Backfire as Regulations Fall Flat

Unraveling Russia’s Illicit Data Market: The Rise and Response

Russia is currently grappling with its expansive underground market for leaked personal data, an intricate network long exploited by investigative journalists, law enforcement, and criminal enterprises. Known as the probiv market, this shadowy ecosystem has thrived for over a decade, drawing its name from the verb meaning “to pierce” or “to search.” It has established itself as a parallel economy, built upon a web of corrupt officials, traffic police, bank employees, and low-level security workers willing to sell access to restricted government or corporate databases.

A Unique Phenomenon

The prevalence and everyday use of probiv are distinctly Russian, emerging from the country’s deeply flawed governance structures. This underground market has become essential for individuals aiming to exploit the system, as well as for those attempting to uncover its misdeeds. For a modest fee—sometimes as low as $10—buyers can acquire sensitive information such as passport numbers, home addresses, travel records, vehicle registrations, and even internal police documentation. For those willing to spend more, comprehensive dossiers on individuals, including call metadata and movement details, are available for purchase.

Investigations and Utility

Despite its controversial nature, probiv has been pivotal in high-profile investigations, such as tracing the FSB’s role in the poisoning of opposition leader Alexei Navalny. Ironically, even the police and intelligence services have found utility in this black market, frequently relying on it to monitor activists, dissenters, and individuals who are not in the state’s good graces. “It’s a paradox of modern Russia. While these services are illegal and depend on compromised data, they’re often more efficient for daily police operations than the multitude of official databases,” commented investigative journalist Andrei Zakharov, who recently authored a book focusing on probiv.

The Shift in Perspective

As the war in Ukraine has continued into its fourth year, the Kremlin’s perception of probiv has evolved. Once seen as a necessary albeit illicit convenience, it’s increasingly viewed as a potential threat. Phone scam syndicates are now exploiting leaked data on an industrial scale, while Ukrainian intelligence has adeptly utilized this open information landscape to locate and target military officials within Russia. In a notable moment during a nationwide call-in last year, President Vladimir Putin acknowledged that a close acquaintance had fallen prey to a phone scam, serving as a wake-up call for security services to intensify crackdowns on the probiv market.

Tightening the Grip

In response, Putin has implemented stricter laws targeting data leaks, with penalties reaching up to ten years of imprisonment for accessing or sharing such information. Security services have initiated a robust campaign against probiv operators, detaining several individuals involved in the trade and dismantling their operational frameworks. A high-profile arrest involved the team behind Usersbox, one of the most widely used and affordable services in the market.

The Unexpected Outcome

However, Zakharov argues that the Kremlin’s crackdown on probiv has achieved the opposite of its intended effect. Many prominent probiv brokers have relocated their operations abroad, free from the previous informal agreements with security forces or fears of immediate detention. “Previously, they would collaborate with security services or hesitate to release extremely sensitive information. Now, all restraint has been abandoned,” Zakharov noted, emphasizing the surge in alarming data leaks.

Significant Data Breaches

He highlighted the staggering Kordon-2023 leak from last year, which exposed an extensive FSB database containing information on individuals who had crossed Russia’s borders from 2014 to 2023—described by Zakharov as one of the largest and most impactful leaks to date. Services like Himera, once known for cooperating with authorities, have since shifted their stance, announcing they would no longer allow law enforcement access and have even relocated operations.

Activism Through Hacking

Ukrainian hackers have contributed to this chaotic landscape. Since the comprehensive invasion, various pro-Ukrainian hacker groups have breached both state and commercial Russian systems, making data available openly—often at no cost and largely driven by ideological motives. Last year, the Ukrainian hacker collective KibOrg released a database from Alfa Bank, Russia’s largest private bank, allegedly containing personal information of around 24 million individuals and over 13 million organizations.

Conclusion

In summary, the illicit data market in Russia, once a tool for convenience, is now a complex and volatile space that has seen drastic changes in both operation and enforcement. As authorities tighten their grasp, the market’s operators are adapting in ways that continue to expose sensitive data, making it increasingly accessible.

  • Russia’s probiv market has long facilitated access to sensitive personal information.
  • Corruption within various state institutions fuels the illicit data economy.
  • Security measures are tightening, yet many brokers have moved their operations abroad.
  • Recent leaks demonstrate the potential for large-scale exposure of personal data.

Por Newsroom

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *