Search TorNews

Find cybersecurity news, guides, and research articles

Popular searches:

Home » News » Cyber Threats » The Dark Web’s Disturbing New Frontier: Selling Human Control Capabilities

The Dark Web’s Disturbing New Frontier: Selling Human Control Capabilities

By:
Last updated:November 28, 2025
Human Written
  • Cybersecurity professionals evaluated more than 3,500 dark web adverts providing dossiers on certain people, labeled as “probv”, with 21% providing extensive user profiles compiled from databases and data leaks.

  • The services comprise regular identity checks, border crossings, detailed data on banking, and illegal geolocation and call logs, all priced €20–€40.

  • Threat actors usually exploit compromised public data, bribe company workers, and then use social engineering, which increases the risks of cyber fraud and identity theft.

The Dark Web's Disturbing New Frontier Selling Human Control Capabilities

In a rather disturbing development in the dark space, threat actors are growing a market for “controlling” individuals via the sale of comprehensive surveillance capabilities and personal dossiers. A November 28th report from BI.ZONE found that this darknet economy, also called finding services or “probiv,” allows purchasers to access sensitive personal credentials of victims, enabling fraud, manipulation, and extortion. These services are commonly advertised on the same top dark web markets that host other illicit goods, making them easily accessible to a wide range of criminals.

Notably, the study analyzed more than 3,500 advert posts on dark web forums, highlighting how readily available compromised data are used for profit.

The Probiv Market Structure and Offerings

It is worth stating that the probiv market functions via targeted ads where sellers promise quick compilation of personal details. As per the report, basic services commence with identity verification through minimal inputs, such as email or phone number, to obtain dates of birth and full names. More sophisticated offerings, which even dominate over 75% of the advertisements, cost at least €20. They usually come from various databases, which include classified registries, to develop dossiers.

The report also noted that premium offerings even increase the price and scope, costing from €33 to €350 for access to “turnkey” user profiles. These profiles include details of border crossings, associations with legal parties, and records of bank transactions. Darknet sellers further provide illegal access to telecommunications data, which includes SMS and call logs, averaging at €250. However, more pricey offerings, such as a single geolocation “flash” scan, cost way more than that.

Comprehensive geolocated logs, pinpointing transitions while communication, cost about €400. Also, the report found that 20% of the illegal offers guarantee a comprehensive profile and collate data from every prominent source.

It is worth noting that hackers obtain these details by scouring paid and public data leaks posted on dark web forums and sites. Also, these threat actors advertise recruitment ads aimed at company workers possessing sensitive details, and offer incentives for insider compromises and leaks.

However, employees who indulge in such are liable to criminal charges under regulations resisting unlicensed information disclosure.

Methods, Risks, and Professional Insights

Threat actors weaponize a vast range of publicly available user data on nearly every individual, further fueled by existing data breaches. Notably, scammers are exploiting these exposed credentials for their personal gain, even by using social engineering techniques.

Cybersecurity researchers observed that scammers can target virtually anyone; thus, it is crucial for individuals to keep watch and be very attentive. Experts warn individuals to ignore alluring chats, even when the person contacting them on social media or by phone shares personal or seemingly confidential details.

This growing frontier highlights the darknet’s transition from mere exchange of stolen data to empowering direct human influence. Experts warn that the growing rate of “probv” services poses greater threats to security and privacy; thus, government and security agencies should employ more protective measures.

Share this article

About the Author

Joahn G

Joahn G

Cyber Threat Journalist

Joahn is a cyber threat journalist dedicated to tracking the evolving landscape of digital risks. His reporting focuses on ransomware gangs, data breach incidents, and state-sponsored cyber operations. By analyzing threat actor motives and tactics, he provides timely intelligence that helps readers understand and anticipate the security challenges of tomorrow.

View all posts by Joahn G >
Comments (0)

No comments.