-
A dark web vendor is selling alleged gambling databases tied to users in Germany, the Netherlands, Vietnam, Indonesia, and other countries.
-
The listing claims millions of records containing names, emails, phone numbers, deposit history, and cryptocurrency transaction data.
-
Security researchers warn that gambling datasets carry elevated risk because they combine financial, identity, and behavioral data in one place.

A vendor on an underground forum is offering what they claim to be large-scale gambling and casino databases for sale, and the scope of the listing covers multiple countries and two categories of gambling activity: traditional FIAT-based platforms and cryptocurrency gambling ecosystems.
Vendor Prices Millions of Records at $500 per 100,000 on Underground Forum
The seller, “Mister777,” is marketing the data at $500 per 100,000 records and claims the overall volume can give millions in return. The listing targets peddlers from Germany, Vietnam, the Netherlands, and Indonesia, with other unspecified countries. To purchase, the buyer would go through Telegram.
So far, no official breach confirmation has come from any gambling platform; thus, independent validation is paramount. Without a doubt, listings on dark web forums can exaggerate the scope or come from recycled old data.
However, looking at the sample entries from the vendor, the data on sale carries structured records with specific timestamps, device metadata, as well as transaction details.
The Listing Covers Financial Records, Crypto Activity, and User Identities
The vendor shared two sample datasets to support the listing. The first covers traditional gambling platforms and includes names, registration dates, email addresses, phone numbers, deposit amounts, and withdrawal records.
The second focuses specifically on crypto gambling activity and includes registration dates, last update timestamps, phone numbers, country tags, deposit records, device models, and crypto wallet identifiers.
Together, the two samples illustrate what makes gambling databases particularly attractive to threat actors. These records do not simply expose one category of personal information.
They tie a real identity to financial behavior, transaction history, device usage, and in the crypto sample, wallet activity. That combination gives a buyer enough to build a detailed profile of each individual in the dataset.
Gambling Data Gives Attackers More than Just a Name and Password
Cybersecurity researchers flag gambling datasets as high-value targets for reasons that go beyond the obvious. Most data breaches expose credentials or contact information. Gambling databases expose something more useful to a criminal: a map of financial behavior.
An attacker working from this kind of dataset can attempt financial fraud and account takeover using the deposit and withdrawal history as verification leverage. They can run cryptocurrency-targeted phishing campaigns against users whose wallet activity appears in the records.
They can attempt SIM swapping attacks using phone numbers tied to verified identities. It can pursue extortion campaigns against individuals whose gambling activity they now hold evidence of. They can also run credential stuffing attacks across other platforms, relying on the assumption that many users reuse the same login details.
Gambling platforms also tend to present structural vulnerabilities that make their data particularly rich. The threat of data leaks and extortion extends far beyond gambling platforms. A ransomware group recently targeted Frost Bank and Citizens Bank, threatening to leak sensitive customer data within six days if their demands weren’t met, demonstrating that financial institutions are also prime targets for extortion-based cyberattacks that weaponize stolen personal and financial information.
They collect payment information, handle crypto exposure, store identity documents for KYC (Know Your Customer) compliance, and accumulate detailed behavioral analytics over time.
When a platform with weak KYC implementation suffers a breach, or when its data ends up on a forum like this, every one of those data categories becomes a tool in an attacker’s hands.