All original content is created in Ukrainian. Not all content has been translated yet. Some posts may only be available in Ukrainian.Learn more
This content has been automatically translated from Ukrainian.
Doxing (sometimes found as "doxing") (from English "doxing" or "doxxing") — is the practice of collecting, publishing and distributing private information about a person without his consent, with the aim of causing harm, intimidation or creating inconvenience. The word "doxing" comes from the term "documents" ("documents"), which indicates the disclosure of personal data. Doxing has gained popularity on the Internet, where confidential information can be quickly distributed and used against victims.

How does doxing work?

Doxing may include collecting various information: real (full) name, address, phone number, email, place of work, financial data, photos or other personal data. In some cases, doxers may even find or publish details about the victim's family. Using this information, attackers can threaten, blackmail, discredit or even physically endanger their targets.
A popular example of doxing (in the west): In 2014, during a conflict in the gamer community called "Gamergate", several women who spoke out against sexism in the video game industry were victims of doxing. Their personal data, including addresses and telephone numbers, were publicly released, leading to threats and attacks.

Doxing tools and techniques

  • Social networks: Doxer can find information on Facebook, Twitter, LinkedIn and other platforms. By viewing publications, photos or geolocation tags, an attacker can collect a lot of private data.
  • Search engines: A simple search on Google or other search engines can reveal a lot of information if it has been previously released online. For example, old posts on forums or comments on news sites.
  • Account hacking: Using phishing or other hacking techniques, the doxer can access the victim's personal mail or social networks, where a lot of sensitive information is often stored.
  • Databases and search sites: There are special sites that collect and sell personal data. Some of them even specialize in searching for people by last name, phone number or other characteristics.
  • Metadata analysis: Sometimes the metadata of images or documents may contain information that the user did not intend to release, such as the coordinates of the location of the shooting.

How to protect yourself from doxing?

clay-banks-h4elZPxUXLU-unsplash Large.jpeg
  • Privacy in social networks: Restrict access to your profiles only to friends or a select circle of people. Avoid publishing information that may be used against you, such as your address, phone number or place of work.
  • Password security: Use complex passwords and two-factor authentication to protect your accounts. This reduces the risk of hacking and unauthorized access to your data.
  • Limitation of publication of personal data: Try to avoid sharing your personal data online. It is important to be aware that any information posted in the public domain can be used against you.
  • Monitoring your data: Regularly check what information about you is available online and take steps to remove or protect it. You can use special services that report data leaks or the appearance of new information about you on the Internet.
  • Encryption: Use encryption to protect sensitive data such as emails or files containing important information. This will help prevent unauthorized access to your data in the event of its theft.
If simplified, do not publicly post what may be used against you. Even information from private correspondence can be obtained by attackers (any of the parties to the correspondence process can be hacked or compromised).

Doxing in the cryptosphere

kanchanara-A1y4og_hIgs-unsplash Large.jpeg
The cryptosphere is one of the most sensitive and secure areas, as anonymity is key for many participants. However, even here, cases of doxing are not uncommon.
For example, in 2014, a well-known developer behind a popular cryptocurrency project became a victim of doxing. The anonymous hacker was able to find out the real name of the developer, his place of residence and other personal data. After that, the hacker published this information on the network, which led to threats against the developer. It is important to note that in the cryptosphere, such cases can not only harm the reputation, but also endanger the security of the entire platform developed by the person who became a victim of doxing.
Doxing in the cryptosphere can also have serious consequences for users, as hackers can try to access crypto wallets using information obtained during attacks. In cryptocurrency transactions where transactions are irreversible, this can lead to significant financial losses.
But it can work the other way around. For example, when an anonymous project decides to run away with money (make a rug pull), investigators can doxit these same fraudsters and try to return the investors' money.

Doxing of owners of erotic content

charlesdeluvio-xgvJlaGnJIw-unsplash Large.jpeg
Cryators (creators) of erotic content who work on platforms such as OnlyFans or similar often face the risk of doxing. Disclosure of their personal data can have catastrophic consequences, including public condemnation, loss of employment, or even physical danger.
For example, in 2020, there was a massive attack on the OnlyFans platform, during which personal data and photos of thousands of users were leaked. This data fell into the hands of the perpetrators, who then began blackmailing the victims by threatening to release the information to their relatives or at work. Many models have experienced severe emotional distress, and some have even ceased their activities for fear of further attacks.
This kind of doxing is usually intended to discredit or even ruin the victim's life by exploiting moral and social prejudices against the erotic industry.

Useful doxing (perhaps even ethical)

Sometimes doxing can have a positive effect. Bot farms — are automated account networks used to spread misinformation, spam or manipulate public opinion on social networks. Owners and operators of such farms usually try to remain anonymous because their activities are illegal or morally condemnable.
In Ukraine, OSINT (open source intelligence) and doxing are sometimes used as a powerful tool to combat enemy propaganda. A vivid example is the video of the Toronto Television project about "General Pekingeseek" (be careful, Pekingeseek is a euphemism).
Doxing can be part of investigative journalism to expose corruption or criminal activity. Good examples are the bihus.info and Our Money projects.

An example of using doxing software

Let's imagine a situation where an attacker tries to find confidential information about a certain person who actively blogs in the crypto community. Its purpose — is to reveal the identity of a blogger who was previously anonymous for the purpose of blackmail or discrediting.
Using OSINT tools (Open Source Intelligence):
An attacker starts by gathering information from open sources using tools such as Maltego or Recon-ng. These applications allow data to be extracted from social networks, forums and other open sources to compile a complete profile of the victim. The collected information may include aliases, email addresses, and even geolocation from photos.
Search by email:
If an attacker finds the victim's email address, he can use services such as Have I Been Pwned or Dehashed, to check whether this data has been compromised in previous leaks. This may provide additional information such as passwords or other related accounts. After checking on Dehashed the attacker discovers that the victim's email has been compromised in several data breaches. Using this information, it accesses old accounts that the victim no longer uses, but which may contain important data.
Use of social engineering:
By gathering enough information, an attacker can use social engineering to force the victim to reveal more details. This can be, for example, a phone call or an email that looks like an official request from a bank or other institution.
For example, under the guise of a crypto platform support staff member, an attacker calls the victim using the information collected and forces them to reveal more personal data, such as their date of birth or full address.
Access to private accounts through password leaks:
After collecting a large amount of information, the attacker uses tools to automatically select passwords (for example, Hydra or John the Ripper) to the victim's accounts. Using a combination of cracked passwords and matching, the attacker gains access to the victim's accounts on various platforms where sensitive information is stored.
Analysis of cryptocurrency transactions:
If the victim actively uses cryptocurrency, the attacker can use blockchain analyzers such as Chainalysis or CipherTrace, to track transactions and identify a real person by anonymous wallets. An attacker can use Chainalysis to analyze the victim's transactions to find connections between anonymous addresses and real identifiers, such as exchanges or other services where the victim's real data is specified.

This post doesn't have any additions from the author yet.

What is Smombie?
22 May 07:34

What is Smombie?

jargoniist
jargoniist@jargoniist
Що означає UPD (Update)?
24 May 08:23

Що означає UPD (Update)?

jargoniist
jargoniist@jargoniist
What does Anthropomorphism mean?
26 May 12:47

What does Anthropomorphism mean?

jargoniist
jargoniist@jargoniist
What is Release?
26 May 13:25

What is Release?

jargoniist
jargoniist@jargoniist
What is septum and why is it called?
28 Jul 17:29

What is septum and why is it called?

jargoniist
jargoniist@jargoniist
Що таке  Кайфабе (kayfabe)?
07 Aug 19:03

Що таке Кайфабе (kayfabe)?

jargoniist
jargoniist@jargoniist
What is Post-Internet?
03 Oct 11:25

What is Post-Internet?

jargoniist
jargoniist@jargoniist
Що таке Токпоккі?
11 Oct 17:01

Що таке Токпоккі?

jargoniist
jargoniist@jargoniist
Генерики та оригінальні препарати: у чому різниця та що вибрати
23 Dec 11:40

Генерики та оригінальні препарати: у чому різниця та що вибрати

jargoniist
jargoniist@jargoniist
How to choose the best books for children?
03 Jan 08:52

How to choose the best books for children?

jargoniist
jargoniist@jargoniist
Найкращі застосунки для гри в Судоку: мобільні та десктопні варіанти
10 Jun 11:11

Найкращі застосунки для гри в Судоку: мобільні та десктопні варіанти

jargoniist
jargoniist@jargoniist
What is a recursive acronym (backronym)?
16 Jul 09:43

What is a recursive acronym (backronym)?

jargoniist
jargoniist@jargoniist