Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    One week at the Luigi Mangione media circus

    One week at the Luigi Mangione media circus

    December 5, 2025
    You can now use Pixel phones as a Switch 2 webcam

    You can now use Pixel phones as a Switch 2 webcam

    December 5, 2025
    Chamberlain blocks smart home integrations with its garage door openers — again

    Chamberlain blocks smart home integrations with its garage door openers — again

    December 5, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Inside the Dark World of Doxing for Profit
    Security

    Inside the Dark World of Doxing for Profit

    News RoomBy News RoomAugust 9, 20244 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Inside the Dark World of Doxing for Profit

    Since the early 1990s, people have used doxing as a toxic way to strike digital revenge—stripping away someone’s anonymity by unmasking their identity online. But in recent years, the poisonous practice has taken on new life, with people being doxed and extorted for cryptocurrency and, in the most extreme cases, potentially facing physical violence.

    For the past year, security researcher Jacob Larsen—who was a victim of doxing around a decade ago when someone tried to extort him for a gaming account—has been monitoring doxing groups, observing the techniques used to unmask people, and interviewing prominent members of the doxing community. Doxing actions have led to incomes of “well over six figures annually,” and methods include making fake law enforcement requests to get people’s data, according to Larsen’s interviews.

    “The primary target of doxing, particularly when it involves a physical extortion component, is for finance,” says Larsen, who leads an offensive security team at cybersecurity company CyberCX but conducted the doxing research in a personal capacity with the support of the company.

    Over several online chat sessions last August and September, Larsen interviewed two members of the doxing community: “Ego” and “Reiko.” While neither of their offline identities is publicly known, Ego is believed to have been a member of the five-person doxing group known as ViLe, and Reiko last year acted as an administrator of the biggest public doxing website, Doxbin, as well as being involved in other groups. (Two other ViLe members pleaded guilty to hacking and identity theft in June.) Larsen says both Ego and Reiko deleted their social media accounts since speaking with him, making it impossible for WIRED to speak with them independently.

    People can be doxed for a full range of reasons—from harassment in online gaming, to inciting political violence. Doxing can “humiliate, harm, and reduce the informational autonomy” of targeted individuals, says Bree Anderson, a digital criminologist at Deakin University in Australia who has researched the subject with colleagues. There are direct “first-order” harms, such as risks to personal safety, and longer-term “second-order harms,” including anxiety around future disclosures of information, Anderson says.

    Larsen’s research mostly focused on those doxing for profit. Doxbin is central to many doxing efforts, with the website hosting more than 176,000 public and private doxes, which can contain names, social media details, Social Security numbers, home addresses, places of work, and similar details belonging to people’s family members. Larsen says he believes most of the doxing on Doxbin is driven by extortion activities, although there can be other motivations and doxing for notoriety. Once information is uploaded, Doxbin will not remove it unless it breaks the website’s terms of service.

    “It is your responsibility to uphold your privacy on the internet,” Reiko said in one of the conversations with Larsen, who has published the transcripts. Ego added: “It’s on the users to keep their online security tight, but let’s be real, no matter how careful you are, someone might still track you down.”

    Impersonating Police, Violence as a Service

    Being entirely anonymous online is almost impossible—and many people don’t try, often using their real names and personal details in online accounts and sharing information on social media. Doxing tactics to gather people’s details, some of which were detailed in charges against ViLe members, can include reusing common passwords to access accounts, accessing public and private databases, and social engineering to launch SIM swapping attacks. There are also more nefarious methods.

    Emergency data requests (EDR) can also be abused, Larsen says. EDRs allow law enforcement officials to ask tech companies for people’s names and contact details without any court orders as they believe there may be danger or risks to people’s lives. These requests are made directly to tech platforms, often through specific online portals, and broadly need to come from official law enforcement or government email addresses.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleNetflix’s Arcane, Terminator Zero, and other anime series leak
    Next Article Signal has been blocked by Venezuela and Russia

    Related Posts

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    The WIRED Guide to Digital Opsec for Teens

    The WIRED Guide to Digital Opsec for Teens

    December 2, 2025
    Our Picks
    You can now use Pixel phones as a Switch 2 webcam

    You can now use Pixel phones as a Switch 2 webcam

    December 5, 2025
    Chamberlain blocks smart home integrations with its garage door openers — again

    Chamberlain blocks smart home integrations with its garage door openers — again

    December 5, 2025
    If You Have a Heart So True, We Found the Best Pokémon Cyber Monday Deals for You

    If You Have a Heart So True, We Found the Best Pokémon Cyber Monday Deals for You

    December 5, 2025
    Trump Mobile’s refurbished iPhones are an unsurprisingly bad deal

    Trump Mobile’s refurbished iPhones are an unsurprisingly bad deal

    December 5, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Silk & Snow Seemingly Cannot Miss—So Don’t Skip This Sale That Ends in 2 Days Gear

    Silk & Snow Seemingly Cannot Miss—So Don’t Skip This Sale That Ends in 2 Days

    By News RoomDecember 5, 2025

    I try to test every individual product critically and neutrally, but sometimes a brand comes…

    Chrome can now autofill details from your Google account

    Chrome can now autofill details from your Google account

    December 5, 2025
    Wikipedia is getting in on the yearly wrapped game

    Wikipedia is getting in on the yearly wrapped game

    December 5, 2025
    OpenAI’s GPT-5.2 ‘code red’ response to Google is coming next week

    OpenAI’s GPT-5.2 ‘code red’ response to Google is coming next week

    December 5, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.