The Underground Economist: Volume 5, Issue 6
by ZeroFox Intelligence

Access to Law Enforcement CarFax Accounts Advertised on DDW
On March 24, 2025, threat actor "DataSec" posted in the hacking forum BreachForums, advertising a new access-as-a–service. According to DataSec, buyers are able to request reports from automobile organization CarFax, obtainable through access to an alleged U.S. and Canadian law enforcement (LE) account. The service is priced at USD 175 “per account”, but it is not clear exactly what buyers of the service receive for this price.
The threat actor claims the service enables unlimited searches on a database that contains up to 34 billion vehicle history records, which include crash reports, ownership changes with address updates, driving habits, and vulnerabilities (among other details) that can be used for “stalking victims or rivals.”
- CarFax, a part of S&P Global, provides detailed vehicle history information that helps people make informed decisions when buying, selling, servicing, or shopping for cars. Its comprehensive reports include key information on accidents, ownership, service history, and more.
- The actor urges potential buyers to make contact via the encrypted messaging channel Session. At the time of writing, some interest had been generated in the thread, though it is unclear if and how payments are taking place.
DataSec is a newly registered, positively trending threat actor that first appeared in BreachForums in February 2025. The actor, who has a “God Tier” status in the forum, has previously been observed advertising forged subpoena templates (a pre-designed, fillable template) and EDRs (Emergency Data Requests) as a service.
- According to their bio, DataSec specializes in selling access to sensitive government emails, leaking confidential information, and facilitating illicit data requests from various platforms.
There is a very likely chance that the services offered by DataSec are legitimate and as advertised. Given that DataSec also advertises the sale of EDRs, access to a U.S. and Canadian LE CarFax account was most likely achieved via the compromised credentials of an LE member. There is also a less likely chance that DataSec represents an LE insider with access to platforms associated with EDRs.
Some of the information allegedly obtainable is very likely to appeal to a variety of threat actors. Financially motivated actors may seek to re-sell this information in deep and dark web (DDW) forums or on instant-messaging platforms, as well as acquire personally identifiable information (PII) for purposes of conducting targeted social engineering activity. The ability to link vehicle registration numbers (VRNs) to names and locations may also appeal to criminals interested in engaging in auto theft.
While DataSec’s advertisement specifies the alleged ability to obtain official, government, and LE documentation such as crash reports and driver exchange forms, it is not clear the extent to which these can be leveraged in fraudulent claims; this will likely differ significantly between cases.
IntelBroker’s Atypical Activity Causes Suspicion Within Dark Web Forums
On March 22, 2025, the user “mzkz” started a discussion on the deep web forum BreachForums regarding rumors surrounding the threat actor “IntelBroker”. According to the thread, IntelBroker has allegedly either been apprehended or recruited by the U.S. Federal Bureau of Investigations (FBI).
- IntelBroker is a notorious threat actor known for conducting a wide array of malicious cyber activity against diverse targets. IntelBroker is also thought to have fulfilled an administrative role within BreachForums and has also very likely operated under different pseudonyms.
One of the conversations likely referenced by mzkz was initiated by user “Dark Web Informer”, who posted an article in the Xcancel community claiming that IntelBroker’s Telegram account had been deleted. Other users within the discussion thread claimed that IntelBroker has been “acting different lately.”
As of the writing of this report, there is an unlikely chance that IntelBroker is operating in conjunction with the FBI. This is primarily due to the substantial lack of corroborating information. Such speculation surrounding IntelBroker has long occurred, beginning with the May 2024 LE seizure of BreachForums and continuing through a period of moderator changes. ZeroFox notes that the lack of any observable activity from IntelBroker during the past 45 days is highly unusual; however, the actor has stated on numerous occasions that they do not operate a Telegram account.
Pro-Palestinian Hacktivist Group Targets Israel
On March 15, 2025, threat actor “blackfield” announced on the dark web forum RAMP that they had gained access to sensitive documents associated with high-ranking Israeli Defense Forces (IDF) officers, Israeli political figures, and an Israel-based healthcare organization with an annual revenue of USD 1 billion.
- Blackfield is part of the pro-Palestinian, anti-Israel hacktivist group Shadow, a collective responsible for numerous cyberattacks exclusively targeting Israeli infrastructure.
- The actor joined RAMP on February 5, 2023, where they have a “well-known member” reputation status.
No price for the full data set was observed; instead, prospective buyers were urged to make contact. Blackfield did specify, however, that prices would correlate to the “name + rank”—almost certainly alluding to that of the victim.
The advertisement included samples of the data allegedly stolen, very likely as an attempt to demonstrate legitimacy and encourage prospective buyers. These included 11 separate links leading to downloadable archives.
The nature of the data related to the IDF and Israeli political figures is not specified in the advertisement, though there is a very likely chance that it comprises primarily PII such as names, addresses, and contact information rather than classified government information.
Blackfield specified that information related to an Israel-based healthcare organization is associated with employees that have ties to the IDF and includes “personal information.” Unspecified information related to “hundreds of Israeli settlers” is also allegedly available.
On March 17 and 18, 2025, blackfield made subsequent posts proclaiming themselves a cyber espionage collective that targets only high-profile victims, unlike other collectives that target “women’s haircut stores and car washes.” A separate post warned that upcoming attacks would target U.S.-based entities and would appear to have been conducted by China, Iran, or North Korea.
Like other pro-Palestinian hacktivist groups, blackfield displays an overt hostility towards Israel and Israeli-based entities, which almost certainly extends to allies such as the United States, European nations, the European Union (EU), the North Atlantic Treaty Organization (NATO), and the West in general. Future activity from blackfield is very likely to target those perceived as misaligned with the interests of Palestine and Iran. Despite the clear ideological motivation, blackfield very likely also seeks to simultaneously financially profit from their attacks.
Information such as that advertised by blackfield almost certainly appeals primarily to other ideologically and politically motivated threat actors that would seek to leverage PII in further disruptive cyberattacks or in the planning of physical targeting.
ZeroFox Intelligence Recommendations
- Develop a comprehensive incident response strategy.
- Deploy a holistic patch management process, and ensure all IT assets are patched with the latest software updates as quickly as possible.
- Adopt a Zero-Trust cybersecurity architecture based upon a principle of least privilege.
- Implement network segmentation to separate resources by sensitivity and/or function.
- Ensure critical, proprietary, or sensitive data is always backed up to secure, off-site, or cloud servers at least once per year—and ideally more frequently.
- Implement secure password policies, phishing-resistant MFA, and unique credentials.
- Configure email servers to block emails with malicious indicators, and deploy authentication protocols to prevent spoofed emails.
- Proactively monitor for compromised accounts and credentials being brokered in DDW forums.
- Leverage cyber threat intelligence to inform the detection of relevant cyber threats and associated tactics, techniques, and procedures (TTPs).
Appendix A: Traffic Light Protocol for Information Dissemination
Appendix B: ZeroFox Intelligence Probability Scale
All ZeroFox intelligence products leverage probabilistic assessment language in analytic judgments. Qualitative statements used in these judgments refer to associated probability ranges, which state the likelihood of occurrence of an event or development. Ranges are used to avoid a false impression of accuracy. This scale is a standard that aligns with how readers should interpret such terms.
Tags: Threat Intelligence