Resurgence of Doxxing: A Toxic Practice
Since the early 1990s, doxxing has been a notorious tool for digital revenge, stripping individuals of their anonymity by exposing their identities online. However, in recent years, this toxic practice has experienced a resurgence, with people being doxxed and extorted for cryptocurrency, and in extreme cases, facing physical violence.
Financial Motivations Behind Doxxing
Security researcher Jacob Larsen has been monitoring doxing groups for the past year, revealing that doxxing practices generate significant revenue, often well over six figures annually. The primary goal behind doxxing is financial gain, especially in cases of physical extortion. Larson’s research sheds light on the sophisticated techniques employed by doxing groups, including filing false law enforcement requests to obtain individuals’ data.
The Impact and Methods of Doxing
Doxxing can have devastating consequences, ranging from harassment in online games to incitement of political violence. Australian digital criminologist, Bree Anderson, emphasizes the harmful effects of doxxing, highlighting how it can humiliate, harm, and compromise the information autonomy of targeted individuals. There are immediate risks to personal safety and long-term anxieties associated with future revelations.
One of the central platforms for doxing campaigns is Doxbin, hosting a vast array of public and private doxings, including sensitive information like names, social media details, addresses, and more. Most doxing activities on Doxbin are driven by extortion campaigns, with information remaining on the site unless it breaches the terms of service. Responsibility for maintaining privacy online is emphasized, although doxxers’ formidable skills can still lead to successful tracking.
Impersonating Police Officers and Violence as a Service
Remaining completely anonymous online is nearly impossible, as individuals often use their real names and personal details in online accounts and social media profiles. Doxing tactics involve various methods, such as reusing common passwords, accessing databases, and launching SIM swapping attacks through social engineering.
Emergency Data Requests (EDRs) are another avenue for abuse in doxing. Law enforcement officials can request individuals’ names and contact information from tech companies without a court order, citing potential risks to lives. These requests typically go directly to technology platforms and must come from official law enforcement email addresses.