The Dark Web and Stolen Identity Data: What Gets Sold and How

The dark web functions as a structured marketplace for stolen personal data, operating beyond the reach of standard search engines and accessible only through specialized anonymizing software such as the Tor network. Identity-related data represents one of the highest-volume commodity categories traded on these platforms, ranging from individual credential pairs to packaged identity dossiers. Understanding the structure of this underground economy — what data gets sold, how it is priced, and how it reaches end buyers — is foundational to navigating the identity theft services landscape and understanding why professional remediation exists as a distinct sector.

Definition and scope

The dark web is a segment of the internet hosted on overlay networks that require specific software, configurations, or authorization to access. For identity data purposes, the relevant infrastructure consists of hidden service marketplaces, encrypted forums, and automated vending platforms (sometimes called "autoshops") that facilitate the sale of stolen personal information.

The scope of traded data falls into four major classification categories:

  1. Authentication credentials — username/password combinations, often sold in bulk "combo lists" containing millions of entries. These are frequently harvested via phishing campaigns, credential-stuffing attacks, or direct database breaches.
  2. Financial account data — credit card numbers with associated card verification values (CVVs), expiration dates, and billing addresses, referred to as "fullz" when the bundle includes the cardholder's name and Social Security Number. The FBI's Internet Crime Complaint Center (IC3) tracks financial fraud originating from these data types.
  3. Government-issued identifier data — Social Security Numbers, driver's license numbers, passport data, and Medicare or Medicaid identifiers. The Federal Trade Commission (FTC) classifies SSN exposure as among the highest-severity identity theft vectors due to its use across tax, credit, and benefit systems.
  4. Synthetic identity components — partial records sold specifically to be combined with fabricated elements, enabling synthetic identity fraud, a category the Consumer Financial Protection Bureau (CFPB) has identified as a growing segment of financial fraud.

Pricing on these markets is tiered by data freshness, completeness, and geographic origin. A single credit card record with CVV has historically sold for between $5 and $20 on dark web markets, while a complete "fullz" package containing SSN, date of birth, and financial account data commands higher prices — figures documented in reports from sources including Experian's public security research and the Verizon Data Breach Investigations Report (DBIR).

How it works

The pipeline from data breach to dark web sale follows a consistent structure across threat actor types:

  1. Acquisition — Data is obtained through phishing attacks, malware (particularly keyloggers and infostealers), exploitation of unpatched vulnerabilities, or insider compromise. NIST's National Cybersecurity Framework classifies these as initial access tactics within the broader threat lifecycle.
  2. Aggregation and validation — Stolen records are cleaned, deduplicated, and verified. Automated credential-checking tools ("checkers") test credentials against live services to identify active accounts, significantly increasing resale value.
  3. Provider and vending — Validated data is verified on dark web marketplaces or sold wholesale to resellers. Marketplaces operate with reputation systems, escrow mechanisms, and seller ratings that mirror surface-web e-commerce platforms.
  4. Purchase and exploitation — End buyers use data for account takeover, new account fraud, tax refund fraud, or medical identity theft. The IRS's Identity Theft Tax Refund Fraud program addresses the tax refund vector specifically.
  5. Re-sale and secondary markets — Partially used data sets are re-sold at lower prices, meaning a single breach can produce exploitation cycles lasting 18 months or longer after initial exposure.

Common scenarios

The most operationally common exploitation patterns documented by the FTC and IC3 fall into three categories:

Account takeover (ATO) contrasts with new account fraud (NAF) in a structurally important way: ATO relies on existing verified credentials and targets already-established financial or utility accounts, while NAF uses SSN and date-of-birth combinations to open entirely new credit lines. The FTC's IdentityTheft.gov reporting framework distinguishes these as separate case types with different remediation pathways. Professionals verified in networks such as the identity theft providers frequently specialize in one category over the other.

Medical identity theft represents a distinct scenario in which Medicare or insurance identifiers are used to bill for fraudulent services. The HHS Office of Inspector General (HHS OIG) documents this as a federal healthcare fraud offense under 18 U.S.C. § 1347.

Tax identity theft — filing fraudulent returns using a victim's SSN — is tracked separately by the IRS Identity Protection Specialized Unit, which issued over 1.1 million Identity Protection PINs in fiscal year 2022 (IRS 2022 Annual Report to Congress).

Decision boundaries

The identity-theft-provider network-purpose-and-scope framework separates response professionals by the type of exposure involved. Dark web-specific exposures require a different remediation path than, for example, physical document theft.

Key classification boundaries that determine appropriate professional engagement:

Professionals engaged through the how-to-use-this-identity-theft-resource framework segment their practice areas precisely along these classification lines.

📜 1 regulatory citation referenced  ·   · 

References