RUSSIA’S CRACKDOWN ON DATA BLACK MARKET FUELS NEW WAVE OF LEAKS

by Emilie Lopes

A state campaign to dismantle Russia’s vast underground market for personal information has backfired, inadvertently flooding the web with sensitive data and empowering foreign intelligence operations. The illicit trade, known locally as “probiv,” has for years functioned as a shadow economy where, for a small fee, individuals could purchase passport details, travel histories, police records, and comprehensive personal dossiers.

This parallel information system, built on networks of corrupt officials and low-level security personnel, became a routine tool for journalists, law enforcement, and criminal syndicates alike. It represented a paradox of modern Russian governance: an illegal service that was simultaneously indispensable for both exposing and enforcing the state’s will.

However, the ongoing conflict in Ukraine has shifted the Kremlin’s perspective. The market is now seen as a critical vulnerability. Ukrainian intelligence agencies have reportedly used these data channels to identify and target military personnel within Russia. Furthermore, a surge in industrial-scale phone fraud, which even ensnared a close associate of the president, prompted a legislative and security crackdown.

New laws now carry severe penalties, including up to a decade in prison, for accessing or distributing leaked data. Security services have arrested prominent brokers and targeted the infrastructure supporting these services.

Yet, these measures have produced unintended consequences. Instead of shutting down, major operators have relocated their businesses abroad, freeing themselves from informal agreements with Russian authorities and the threat of immediate detention. Analysts note that this exodus has removed previous restraints, leading to a dramatic increase in the volume and sensitivity of data being released publicly.

In a significant escalation, one group recently published a massive border control database spanning nearly a decade. Other established services, once known to cooperate with law enforcement, have publicly severed those ties and moved staff overseas.

The landscape has been further transformed by external actors. Pro-Ukrainian hacker collectives, operating largely on ideological grounds, have repeatedly breached Russian state and commercial systems. They now regularly publish stolen data—often free of charge—adding to the torrent of information available. A major leak last year, attributed to Ukrainian hackers, exposed data from a leading private bank, affecting millions of individuals and organizations.

The combined effect of these shifts is a data environment more porous and volatile than ever. The very crackdown intended to secure information has instead catalyzed its widespread dissemination, creating new opportunities for espionage and fraud while rendering private Russian data increasingly accessible on the open market.

You may also like