Security News > 2020 > June > Hacker posts database stolen from Dark Net free hosting provider DH
Back in March, Daniel Winzen, the German software developer who runs DH, originally said that his portal was kaput, at least for the foreseeable future which he also said, more or less, after DH suffered an earlier attack in September 2018.
DarkOwl - a darknet intelligence, tools, and cybersecurity outfit that keeps an eye on DH and other dark web goings-on and which analyzed the September 2018 breach - had spotted Winzen's post acknowledging the most recent attack and shared it on Twitter on 10 March.
Who is KingNull - the hacker who went on to post DH's database - and who else has it in for DH? Since they first spotted Winzen's March tweet, DarkOwl analysts have looked for answers and published their take on the involved parties, which dark-net subcultures they can be traced to, and online chats about the attack.
While many darknet site owners pulled up stakes and parked with new hosting providers, they could be vulnerable to hackers taking over the new accounts if they didn't change their old passwords, ZDNet points out, if in fact their leaked, hashed passwords get cracked.
Will those improvements finally include database backups? or, in keeping with the suspicion that DH is actually running a honeypot, will the relaunch include a way to penetrate the dark web in order to collect IP addresses of hidden services?